Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe
Resource
win7-20231215-en
General
-
Target
48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe
-
Size
5.0MB
-
MD5
f181b08d7d06f955a53a2593b3596991
-
SHA1
c2af74c384c68491121799a8d89b5cd4322c41b2
-
SHA256
48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11
-
SHA512
5784992d21762b523176b3a35e5611916568366fc3abf06cff54c6c1a2b77792f5a50f040facc4b3c786edc31d71b1a41d26a3708483289b3867e949fd515731
-
SSDEEP
49152:lhUCgfFMiW4UnAnkOh9pjA7E9HgFRJ9Tp4mMeJmjMjK0JlUJkGf3yIGul:s9AdHBJmg1wJkGZl
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral1/memory/2436-423-0x00000000031C0000-0x00000000032F1000-memory.dmp family_fabookie behavioral1/memory/2436-443-0x00000000031C0000-0x00000000032F1000-memory.dmp family_fabookie -
Detect ZGRat V1 4 IoCs
resource yara_rule behavioral1/files/0x000600000001a032-433.dat family_zgrat_v1 behavioral1/memory/896-439-0x0000000001070000-0x000000000119C000-memory.dmp family_zgrat_v1 behavioral1/files/0x000700000001a3e4-467.dat family_zgrat_v1 behavioral1/memory/1928-473-0x0000000000FD0000-0x00000000010B8000-memory.dmp family_zgrat_v1 -
Glupteba payload 24 IoCs
resource yara_rule behavioral1/memory/1424-223-0x0000000002930000-0x000000000321B000-memory.dmp family_glupteba behavioral1/memory/1424-224-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1744-255-0x0000000002B40000-0x000000000342B000-memory.dmp family_glupteba behavioral1/memory/1744-256-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1424-261-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1744-262-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1976-267-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2576-270-0x0000000002A00000-0x00000000032EB000-memory.dmp family_glupteba behavioral1/memory/2576-271-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1976-275-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2576-280-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-284-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-363-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-403-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-404-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-410-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-413-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-416-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-419-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-428-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-431-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-445-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-464-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1076-516-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\X3Vl1a2etcHT5wClwnJoTE1w.exe = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\wntCyzr3qHIL6tUldKumctu5.exe = "0" wntCyzr3qHIL6tUldKumctu5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 444567.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 1516 netsh.exe 800 netsh.exe -
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t5SLA58Zu1qpgdLyY2Kf6bd7.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6OLo8il4PBaJmuiTMEm5GdjD.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\g583xpXMbXDAweF4IK0yZflu.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1Dj44lyWFgzSDFuWy9xgeD5.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rkKbpNnlp8ujbKdSIagY9rxa.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\F54z7L8C2yQs8eo0fIYMESH3.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GwabIcjSBiZ0m8kkIUf4T8wZ.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nle5YQPtTmudMgsZWy3teHAR.bat jsc.exe -
Executes dropped EXE 12 IoCs
pid Process 2436 m6dYrM2T3cof6chq7Mp3pZeG.exe 1424 wntCyzr3qHIL6tUldKumctu5.exe 1744 X3Vl1a2etcHT5wClwnJoTE1w.exe 1976 wntCyzr3qHIL6tUldKumctu5.exe 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 1076 csrss.exe 2480 crshGVZ0GExGt2oVbJCR7Uz7.exe 1056 crshGVZ0GExGt2oVbJCR7Uz7.tmp 1552 patch.exe 392 injector.exe 896 444567.exe 1928 Bezhajajalae.exe -
Loads dropped DLL 21 IoCs
pid Process 2588 jsc.exe 2588 jsc.exe 2588 jsc.exe 2588 jsc.exe 2588 jsc.exe 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 2588 jsc.exe 2480 crshGVZ0GExGt2oVbJCR7Uz7.exe 844 Process not Found 1056 crshGVZ0GExGt2oVbJCR7Uz7.tmp 1056 crshGVZ0GExGt2oVbJCR7Uz7.tmp 1552 patch.exe 1552 patch.exe 1056 crshGVZ0GExGt2oVbJCR7Uz7.tmp 1552 patch.exe 1552 patch.exe 1552 patch.exe 1076 csrss.exe 1056 crshGVZ0GExGt2oVbJCR7Uz7.tmp 896 444567.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\X3Vl1a2etcHT5wClwnJoTE1w.exe = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\wntCyzr3qHIL6tUldKumctu5.exe = "0" wntCyzr3qHIL6tUldKumctu5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" X3Vl1a2etcHT5wClwnJoTE1w.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" X3Vl1a2etcHT5wClwnJoTE1w.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" wntCyzr3qHIL6tUldKumctu5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 2588 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 30 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN wntCyzr3qHIL6tUldKumctu5.exe File opened (read-only) \??\VBoxMiniRdrDN X3Vl1a2etcHT5wClwnJoTE1w.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Diledawoga.exe 444567.exe File created C:\Program Files (x86)\Windows Defender\Sodyhohacu.exe 444567.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe X3Vl1a2etcHT5wClwnJoTE1w.exe File opened for modification C:\Windows\rss\csrss.exe wntCyzr3qHIL6tUldKumctu5.exe File created C:\Windows\Logs\CBS\CbsPersist_20240110185219.cab makecab.exe File opened for modification C:\Windows\rss X3Vl1a2etcHT5wClwnJoTE1w.exe File opened for modification C:\Windows\rss wntCyzr3qHIL6tUldKumctu5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2152 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-421 = "Russian Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-521 = "N. Central Asia Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" wntCyzr3qHIL6tUldKumctu5.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-551 = "North Asia Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" wntCyzr3qHIL6tUldKumctu5.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 040000000100000010000000acb694a59c17e0d791529bb19706a6e40f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47419000000010000001000000068cb42b035ea773e52ef50ecf50ec52920000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 444567.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 444567.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a42000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 444567.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 crshGVZ0GExGt2oVbJCR7Uz7.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 1400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a32000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 crshGVZ0GExGt2oVbJCR7Uz7.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 444567.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 crshGVZ0GExGt2oVbJCR7Uz7.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 crshGVZ0GExGt2oVbJCR7Uz7.tmp -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2188 powershell.exe 1424 wntCyzr3qHIL6tUldKumctu5.exe 1744 X3Vl1a2etcHT5wClwnJoTE1w.exe 1976 wntCyzr3qHIL6tUldKumctu5.exe 1976 wntCyzr3qHIL6tUldKumctu5.exe 1976 wntCyzr3qHIL6tUldKumctu5.exe 1976 wntCyzr3qHIL6tUldKumctu5.exe 1976 wntCyzr3qHIL6tUldKumctu5.exe 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe 392 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe Token: SeDebugPrivilege 2188 powershell.exe Token: SeDebugPrivilege 2588 jsc.exe Token: SeDebugPrivilege 1424 wntCyzr3qHIL6tUldKumctu5.exe Token: SeImpersonatePrivilege 1424 wntCyzr3qHIL6tUldKumctu5.exe Token: SeDebugPrivilege 1744 X3Vl1a2etcHT5wClwnJoTE1w.exe Token: SeImpersonatePrivilege 1744 X3Vl1a2etcHT5wClwnJoTE1w.exe Token: SeSystemEnvironmentPrivilege 1076 csrss.exe Token: SeDebugPrivilege 896 444567.exe Token: SeDebugPrivilege 1928 Bezhajajalae.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2188 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 28 PID 2360 wrote to memory of 2188 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 28 PID 2360 wrote to memory of 2188 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 28 PID 2360 wrote to memory of 2588 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 30 PID 2360 wrote to memory of 2588 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 30 PID 2360 wrote to memory of 2588 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 30 PID 2360 wrote to memory of 2588 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 30 PID 2360 wrote to memory of 2588 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 30 PID 2360 wrote to memory of 2588 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 30 PID 2360 wrote to memory of 2588 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 30 PID 2360 wrote to memory of 2588 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 30 PID 2360 wrote to memory of 2588 2360 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 30 PID 2588 wrote to memory of 2436 2588 jsc.exe 31 PID 2588 wrote to memory of 2436 2588 jsc.exe 31 PID 2588 wrote to memory of 2436 2588 jsc.exe 31 PID 2588 wrote to memory of 2436 2588 jsc.exe 31 PID 2588 wrote to memory of 1424 2588 jsc.exe 34 PID 2588 wrote to memory of 1424 2588 jsc.exe 34 PID 2588 wrote to memory of 1424 2588 jsc.exe 34 PID 2588 wrote to memory of 1424 2588 jsc.exe 34 PID 2588 wrote to memory of 1744 2588 jsc.exe 35 PID 2588 wrote to memory of 1744 2588 jsc.exe 35 PID 2588 wrote to memory of 1744 2588 jsc.exe 35 PID 2588 wrote to memory of 1744 2588 jsc.exe 35 PID 1976 wrote to memory of 3032 1976 wntCyzr3qHIL6tUldKumctu5.exe 43 PID 1976 wrote to memory of 3032 1976 wntCyzr3qHIL6tUldKumctu5.exe 43 PID 1976 wrote to memory of 3032 1976 wntCyzr3qHIL6tUldKumctu5.exe 43 PID 1976 wrote to memory of 3032 1976 wntCyzr3qHIL6tUldKumctu5.exe 43 PID 3032 wrote to memory of 1516 3032 cmd.exe 46 PID 3032 wrote to memory of 1516 3032 cmd.exe 46 PID 3032 wrote to memory of 1516 3032 cmd.exe 46 PID 2576 wrote to memory of 1140 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 48 PID 2576 wrote to memory of 1140 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 48 PID 2576 wrote to memory of 1140 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 48 PID 2576 wrote to memory of 1140 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 48 PID 1140 wrote to memory of 800 1140 cmd.exe 49 PID 1140 wrote to memory of 800 1140 cmd.exe 49 PID 1140 wrote to memory of 800 1140 cmd.exe 49 PID 2576 wrote to memory of 1076 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 50 PID 2576 wrote to memory of 1076 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 50 PID 2576 wrote to memory of 1076 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 50 PID 2576 wrote to memory of 1076 2576 X3Vl1a2etcHT5wClwnJoTE1w.exe 50 PID 2588 wrote to memory of 2480 2588 jsc.exe 51 PID 2588 wrote to memory of 2480 2588 jsc.exe 51 PID 2588 wrote to memory of 2480 2588 jsc.exe 51 PID 2588 wrote to memory of 2480 2588 jsc.exe 51 PID 2588 wrote to memory of 2480 2588 jsc.exe 51 PID 2588 wrote to memory of 2480 2588 jsc.exe 51 PID 2588 wrote to memory of 2480 2588 jsc.exe 51 PID 2480 wrote to memory of 1056 2480 crshGVZ0GExGt2oVbJCR7Uz7.exe 57 PID 2480 wrote to memory of 1056 2480 crshGVZ0GExGt2oVbJCR7Uz7.exe 57 PID 2480 wrote to memory of 1056 2480 crshGVZ0GExGt2oVbJCR7Uz7.exe 57 PID 2480 wrote to memory of 1056 2480 crshGVZ0GExGt2oVbJCR7Uz7.exe 57 PID 2480 wrote to memory of 1056 2480 crshGVZ0GExGt2oVbJCR7Uz7.exe 57 PID 2480 wrote to memory of 1056 2480 crshGVZ0GExGt2oVbJCR7Uz7.exe 57 PID 2480 wrote to memory of 1056 2480 crshGVZ0GExGt2oVbJCR7Uz7.exe 57 PID 1076 wrote to memory of 392 1076 csrss.exe 59 PID 1076 wrote to memory of 392 1076 csrss.exe 59 PID 1076 wrote to memory of 392 1076 csrss.exe 59 PID 1076 wrote to memory of 392 1076 csrss.exe 59 PID 1056 wrote to memory of 896 1056 crshGVZ0GExGt2oVbJCR7Uz7.tmp 63 PID 1056 wrote to memory of 896 1056 crshGVZ0GExGt2oVbJCR7Uz7.tmp 63 PID 1056 wrote to memory of 896 1056 crshGVZ0GExGt2oVbJCR7Uz7.tmp 63 PID 1056 wrote to memory of 896 1056 crshGVZ0GExGt2oVbJCR7Uz7.tmp 63 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe"C:\Users\Admin\AppData\Local\Temp\48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2360 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\Pictures\m6dYrM2T3cof6chq7Mp3pZeG.exe"C:\Users\Admin\Pictures\m6dYrM2T3cof6chq7Mp3pZeG.exe"3⤵
- Executes dropped EXE
PID:2436
-
-
C:\Users\Admin\Pictures\wntCyzr3qHIL6tUldKumctu5.exe"C:\Users\Admin\Pictures\wntCyzr3qHIL6tUldKumctu5.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Users\Admin\Pictures\wntCyzr3qHIL6tUldKumctu5.exe"C:\Users\Admin\Pictures\wntCyzr3qHIL6tUldKumctu5.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1516
-
-
-
-
-
C:\Users\Admin\Pictures\X3Vl1a2etcHT5wClwnJoTE1w.exe"C:\Users\Admin\Pictures\X3Vl1a2etcHT5wClwnJoTE1w.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Users\Admin\Pictures\X3Vl1a2etcHT5wClwnJoTE1w.exe"C:\Users\Admin\Pictures\X3Vl1a2etcHT5wClwnJoTE1w.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:800
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2152
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
-
-
-
C:\Users\Admin\Pictures\crshGVZ0GExGt2oVbJCR7Uz7.exe"C:\Users\Admin\Pictures\crshGVZ0GExGt2oVbJCR7Uz7.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\is-T9EFR.tmp\crshGVZ0GExGt2oVbJCR7Uz7.tmp"C:\Users\Admin\AppData\Local\Temp\is-T9EFR.tmp\crshGVZ0GExGt2oVbJCR7Uz7.tmp" /SL5="$E011E,140559,56832,C:\Users\Admin\Pictures\crshGVZ0GExGt2oVbJCR7Uz7.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\is-S8TFL.tmp\444567.exe"C:\Users\Admin\AppData\Local\Temp\is-S8TFL.tmp\444567.exe" /S /UID=lylal2205⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:896 -
C:\Users\Admin\AppData\Local\Temp\13-457e9-fc5-3219b-1ed097fa3f409\Bezhajajalae.exe"C:\Users\Admin\AppData\Local\Temp\13-457e9-fc5-3219b-1ed097fa3f409\Bezhajajalae.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240110185219.log C:\Windows\Logs\CBS\CbsPersist_20240110185219.cab1⤵
- Drops file in Windows directory
PID:2924
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
Filesize
893B
MD5d4ae187b4574036c2d76b6df8a8c1a30
SHA1b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA5121f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD52961a1608c50c3e7f0ac0ec4d6f8329a
SHA1d7f856a1a6e2d86b7d4ff37b87566c6ce77a4418
SHA25661efe571257ffc5e7a8e04fecc352b7993adf9104e96a7056dcc0a11e518f0a8
SHA512bb9e574ef0b1cfaafd85f11d3e77b52a9cbc03b0712f26799dc1dfe5ddea4e41d6fa93395d02697e4553d3d3af26a3226c80e5b42c3deee7bb42caa6139b62d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bde6fa882caf05031656f5e6113bbe6
SHA12839dd015633dd131869851ed9753d529789734f
SHA2568c75f59742d161c62297d5cec700c50943ffc54e383bd8b6beabfbd34f9c3ccb
SHA512064dcbed1fe0ae25a1f6d322b73b20ed02ea47d6cc26d8fe8d6c2d3dab4af7d446685d2d8a177fc4d988789f7ce93d2ecb84d761cb0f4e87446a028ec9598670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d8dfcfd0226b7186b5836f0a72d9894
SHA15df6b68a4a3016e3d63c9caeb68bea8244ad39d2
SHA256284d354e9a3c045c21a405ed4da2257102bebbb57706fbdea6b405ba270a3ac8
SHA5129b6d64b27b94609dfee17fe28c77d805643b619198ebe9898a81c716e3782b8aabff4d22d4683d166f9e56f8f5a7e618420cb467b01db1d6f7a441155e572ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5465fe992b12cc0c935e5b8960c6d1b9f
SHA10a3e64fb2564fc848cf37140aea6c752ce3b8b58
SHA256de73e0df71df77d0fef944d0624f5d52a5ce73bf193c87394dd6c8774ea2a3b9
SHA5126112f35a82a79858e1e0a3b2411ffd805db10ca7a0e4ec32016f449eb5e0e357ec0636c617fb71155bac7f5912015a41661452a33d71c6d8e55cd235af9f80cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57beb6b7e5d04ebb6d84dc8536039093f
SHA19d2b05dcb19a689a74ccc5abdf81697ea33db680
SHA25656dfd9c9000fe980de7d7b26c2eb04cd142243ed64e7ddfaf2951fbc13dedc3b
SHA51286e2768c20bdd76704e526d44171c12f8af5875f0bbbfc0a1d482232ab4ebdc2a12e642c3a0579ca991940fd08781df65ce3e21209cf64836daaa6df63cd58de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb4fe320d20fb30b67545185e8b6b8d7
SHA14e571daf544e8da42ad924d5f8a5ee4cbdc2d86a
SHA2561ea8220151b36ac444fade929205ad4a9b445aa99e35581953269cad667622a7
SHA512086bd37c56607b27a7cfef8aaafa771cbcf0d0355c8cb6ee804af64114559816a40e8f8e07b70ea1056b7f7fb06a575877844c0bbec7c3d12d0666348ae21724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5823e7e414f0708eda4771b131fa57717
SHA13653cc7a53c4d5823248ad7ed19a82d994df5b06
SHA2565f10c695e544d0af623e935b0d03fe42bbf29384b751d94888dc19e0621867d6
SHA512b7f9c5bd5fb1d411f7406868e3a4e3caa507372f4886000a5b16c052e9fda8de0bdd56d3ad4386664921814d153f4959bd5d26d5fc08e515c4aa320f53dc9fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f59ef5fd92eed8c19c02a6419fc0ff6
SHA1bf9e097f945df8ef7a7d4674c4e785fd5922b7a4
SHA256a99ee6d24826cc60f11972cd65269f27e670272226b9a6ccdca95700b99e1d8b
SHA51241572e231cb480f163803092f11b366fb0a4d9dda4e920bab2b8e9c6b4979c17f92d0ca2078b532b0e86b0d91cd6b3bf61e0cd00f730c341c7303c85e10e29d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540600496b983dbabcb266cf6182c85da
SHA1df4a3a100f412c1179ff96e1fa86dc3aae374900
SHA2563a2bbeac6c78935f582e54ce79255b3113bf78881c0337a9a5f96dbe4f2ca692
SHA512607b34252d3fa8a132c23c917b8082962ebd32d13938e7d3335cb974a36d78833ee801e6f3c7ccc8f40c7aca74f393709de16b7ff9ee3ff7cf4b7c3f88b70e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ee9894b2134433299937d0ae077ecd6
SHA105e4df521f2784261e479803980b2fef2e3b5728
SHA256516a7436bb84d1bf43364f4eeb6cfda4b03fb4109111cec9d64bd61d56e2efac
SHA512885d35016e41790663b69a02a1ce40cfe312ebb929c6914968d8ff87e5cd2d9065e93e55cbf214a0104baf4c50e616561a03fd1d487cdc7648de52afae5b46c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b69e35207e76b76c79eb00fd50afc64c
SHA1d029a3f6429872d9f40962d97f424e01b4429811
SHA25666b7b02da0bce2f16ed4f622b6fc2a52d35daee91f73e5b14415e0f97c77de3d
SHA512f317f2a386626aa49250a7730f98b9c83b6ffaafe694d2d04a0ac9cc833c548164de3c97fadb66d76b921f0862996b6976460068d491a6c703bc9611c3067724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Filesize252B
MD5250ad7493566a84983293b26f3ba3404
SHA157b4a42101bd64de3ed55f09425e2976e457e958
SHA25652bf707653b0d563dc223ad1923ca1c643e8670d80d845b8022a32f5a9024e34
SHA512d3a552c7325b4370f5d048f6b9197859706efeb010102b29ebb2730745b6c95bbbf7cd354e0d718e8f5820c1dcc90172a3ed43469228c852a5132da42781cd1c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
5.3MB
MD51afff8d5352aecef2ecd47ffa02d7f7d
SHA18b115b84efdb3a1b87f750d35822b2609e665bef
SHA256c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb
-
Filesize
212B
MD5963da09532e9758adedf9745c76ec700
SHA1bc976476358cffdbc3f22b6e491f94ccbf15308d
SHA2568720b9487cee7dae6db3f8f73273bcbbc56377400b830ca0f089473ebc9603f2
SHA5122da299bd10de6d425ee84fc2d17f514d003995f489946cdebafa0dcea4058419bcc38beabc2cbbd4546c2117fcf502292b97edffd57da555017762c4f05122f6
-
Filesize
4.1MB
MD527b271e426688635ca9e9266c0eeb049
SHA1b6da6283a93e1db174d2e9169ec9b8ebb146cde5
SHA2561c4d8b16551c776aaeb2a045ee4f15598a045841a6ceb2da7647a3e70253002d
SHA51220cc6e524c0addd6428c1bbfe412da390859562388c9fd4bff0d0c74deee477b27efa0b57c26f5f536af716e94d2ab926db1720426732ca8ae7a12759f8735a4
-
Filesize
380KB
MD5748d10a9f74335cb40b9d62a720bd9d5
SHA1ef91ce42b14e911a1c178e5cf8675b54922f8f88
SHA256a32365528f89268c7a0e8a8a8052612ffb72e2eda4c1c8a299cba656cbaf3889
SHA5129510690e4dff3efbe31fd8139f5694ecec0adeded536faefb4aef6b1eb7a572f7505746f6bbef9959a846e4fe3e63e5c8c7f4a726797c2c879cb7d4a0aa39961
-
Filesize
64KB
MD5c48c92c96eb7b40ee6a0a79e677b0e4b
SHA179496d8d518d0b0460c9ddbccf4d62df633bb86c
SHA25688303069ce86831b7e215e8fe91cbd33b43b979562edf0ebdf765c915a7fb164
SHA512c3f64d40bd151714d28e8794d1a2748d31fe41297b27cf0049137696dcec535271e52dcff6eaa17f29e7781131a7ec37dbfa2b1a4eda2a4a5cb316f120280a77
-
Filesize
904KB
MD50eead789edfb33caa9ddba1b2e6a7572
SHA18016335dd364714a734604183fd9f292dda6f534
SHA256d5b7c6dc1066046e391bae0c4d015bfb15898ebfdc3e79dd838b136abaa0aa85
SHA512fc50e6fb5d01cac36978a491e719254aa689dd5e6f369f51f3d35d29ee57f4588fbde431c549e8561b5b08f8f4098e2b14c88a51b55d09428fb5bb566c2d30b5
-
Filesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
Filesize
1.5MB
MD5f0616fa8bc54ece07e3107057f74e4db
SHA1b33995c4f9a004b7d806c4bb36040ee844781fca
SHA2566e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026
SHA51215242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c
-
Filesize
1.1MB
MD5d07e3daf854625fba172f348a00806ee
SHA101325f272466b9c0e6f2a595e122dca29a9a6ea0
SHA256579f517c548885bded8ce612e6d52a4bd82c27b3e25fbeeb37e69ae2ba57e434
SHA51229877bea6b2f29dbc910ab6e8670b2411b35050c9423700f9719bfd7f2e70886cebddef2741bf50308433afb7a5a86c4e07ebd1ff1348662953656be9b7e37d6
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
Filesize
694KB
MD5ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
Filesize
163KB
MD55c399d34d8dc01741269ff1f1aca7554
SHA1e0ceed500d3cef5558f3f55d33ba9c3a709e8f55
SHA256e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f
SHA5128ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d
-
Filesize
420KB
MD552a42e8f3eff90b15e87c12211d81f8b
SHA1e3aeb0295930086c159a27f0793d4af93da188a6
SHA2568d5e2a55410097c65243d3aaf1d9c0353254fce500e3f24f13a3aebaa42258f8
SHA5126e4f0d953cc312e86e3eaa527b8c6496db25f415e6090849680f1fe90a475b0c3006f3268ad0bed554044f99784f31f539e415414bdd00a64bdf4e093034258a
-
Filesize
4.1MB
MD584cf2ba0e78c2cd8fedf0416fc377b15
SHA1490dcae0d4f1db012f73dff61ac4cb21c52ea723
SHA25678e3303ec928c1593f98c8270609bf3859200b3f8595bce70519e6816865c47e
SHA51240231428b3ae763e806b2a18e35ff594d0da4d9f123a822afa32f61b8959c06ff36febbb266674348ef9cf08e2311616b8dcf9000b091a01771f30ffa7505f09
-
Filesize
2.7MB
MD5765668ea623d81dfe03d00a133a9001a
SHA1a7131cd160d8a38c038fa625537f1677eea251f0
SHA25663fe350288e6c6f4de21fa731cece6910e1f8068a240d18027b37f27b0cd4bd4
SHA51291ae278ff44f3807c841870cba224cb2bed82cf1b37ddf5f8681291d5a45efffd91a2d9b81df8cfa0cd3cad589a7c919d4a746252f9e8af16bc1c20e0d957a3a