Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
756ea3dee1e682bea18d1f8d859214de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
756ea3dee1e682bea18d1f8d859214de.exe
Resource
win10v2004-20231215-en
General
-
Target
756ea3dee1e682bea18d1f8d859214de.exe
-
Size
792KB
-
MD5
756ea3dee1e682bea18d1f8d859214de
-
SHA1
29476d2b75b26a9e9f8f342be76d4520306e97be
-
SHA256
dcb9ec0cea9a03396168c61b6c30fd2d2cf56ec347821fe1e6fe74d28eb62131
-
SHA512
e49098141e361c45cfb2c5bf05677cd569e1f3b4b3cc8aa814a2f7c340827ff34aecf86277b412b287d92f1b21b1182bd4358dcacf8073597a17a79221f59bee
-
SSDEEP
12288:OIOAV7eqYhGMnDo7YNQ44WioPZicryGBWECTpizFeZauUPnIpm68rIH/Lu:O7tBhGMncwQBCicoEC85eMk4XIz
Malware Config
Extracted
amadey
4.15
http://185.215.113.68
-
install_dir
d887ceb89d
-
install_file
explorhe.exe
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Extracted
risepro
193.233.132.62:50500
Extracted
redline
@PixelsCloud
94.156.67.230:13781
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
redline
LiveTrafic
20.79.30.95:33223
Extracted
redline
@oni912
45.15.156.209:40481
Extracted
redline
1
92.222.212.74:1450
Extracted
redline
@oleh_ps
185.172.128.33:8924
Signatures
-
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023285-747.dat family_zgrat_v1 behavioral2/files/0x0008000000023285-755.dat family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
resource yara_rule behavioral2/files/0x0006000000023222-86.dat family_redline behavioral2/files/0x0006000000023222-99.dat family_redline behavioral2/files/0x0006000000023222-100.dat family_redline behavioral2/memory/3404-101-0x0000000000780000-0x00000000007D4000-memory.dmp family_redline behavioral2/memory/4596-299-0x0000000000400000-0x0000000000454000-memory.dmp family_redline behavioral2/files/0x000a00000002325d-428.dat family_redline behavioral2/files/0x0006000000023271-540.dat family_redline behavioral2/files/0x0006000000023271-564.dat family_redline behavioral2/files/0x000600000002327b-596.dat family_redline behavioral2/files/0x000600000002327b-604.dat family_redline behavioral2/files/0x0009000000023280-680.dat family_redline behavioral2/files/0x0009000000023280-679.dat family_redline behavioral2/files/0x0007000000023286-740.dat family_redline behavioral2/files/0x0008000000023285-747.dat family_redline behavioral2/files/0x0007000000023286-752.dat family_redline behavioral2/files/0x0008000000023285-755.dat family_redline behavioral2/files/0x0007000000023286-754.dat family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ladas.exe -
XMRig Miner payload 17 IoCs
resource yara_rule behavioral2/memory/2920-343-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2920-347-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2920-349-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2920-350-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2920-374-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2920-395-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2920-422-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/5080-423-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2920-430-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2920-426-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2920-433-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/5080-436-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2920-435-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/5080-411-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2920-384-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2920-368-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2920-362-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
flow pid Process 121 4816 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Stops running service(s) 3 TTPs
-
.NET Reactor proctector 5 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/3348-154-0x0000000002730000-0x00000000027AE000-memory.dmp net_reactor behavioral2/memory/3348-160-0x0000000002930000-0x00000000029AE000-memory.dmp net_reactor behavioral2/memory/3348-192-0x0000000002A30000-0x0000000004A30000-memory.dmp net_reactor behavioral2/memory/656-342-0x0000000004BB0000-0x0000000004C48000-memory.dmp net_reactor behavioral2/memory/656-346-0x0000000005210000-0x00000000052A8000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ladas.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ladas.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion moto.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion moto.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 756ea3dee1e682bea18d1f8d859214de.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation explorhe.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation dayroc.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation explorhe.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation leg221.exe -
Executes dropped EXE 30 IoCs
pid Process 2872 explorhe.exe 904 ladas.exe 3168 explorer.exe 3872 milan1234.exe 3404 sadsadsadsa.exe 656 mrk1234.exe 3348 crptchk.exe 2092 55555.exe 4212 redline1234.exe 1412 moto.exe 4460 goldklassd.exe 2308 iojmibhyhiws.exe 656 mrk1234.exe 628 uwgxswmtctao.exe 2548 dayroc.exe 1416 CDAC.exe 4904 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4700 leg221.exe 5044 WerFault.exe 4068 toolspub1.exe 5064 BroomSetup.exe 4896 alex.exe 1272 1.exe 4012 nswFD2E.tmp 3904 1.exe 1328 lumma1234.exe 4120 1.exe 2172 WerFault.exe 4184 CDAC.exe 5264 qemu-ga.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Wine ladas.exe -
Loads dropped DLL 3 IoCs
pid Process 4816 rundll32.exe 5044 WerFault.exe 5044 WerFault.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 5924 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/5080-370-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5080-393-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5080-398-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5080-423-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5080-436-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5080-411-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5080-386-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5080-378-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Process not Found Key opened \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Process not Found Key opened \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Process not Found Key opened \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Process not Found Key opened \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Process not Found -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ladas.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000872001\\ladas.exe" explorhe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 api.ipify.org 124 api.2ip.ua 125 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 904 ladas.exe 2872 explorhe.exe 2872 explorhe.exe 2872 explorhe.exe 2872 explorhe.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 3348 set thread context of 3512 3348 crptchk.exe 101 PID 4460 set thread context of 4596 4460 goldklassd.exe 127 PID 2308 set thread context of 3188 2308 iojmibhyhiws.exe 175 PID 656 set thread context of 5052 656 mrk1234.exe 169 PID 628 set thread context of 5080 628 uwgxswmtctao.exe 167 PID 2308 set thread context of 2920 2308 iojmibhyhiws.exe 146 PID 4896 set thread context of 3944 4896 alex.exe 180 PID 1328 set thread context of 3636 1328 lumma1234.exe 181 -
Launches sc.exe 12 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2508 sc.exe 5072 sc.exe 3284 sc.exe 5824 sc.exe 3916 sc.exe 3836 sc.exe 4128 sc.exe 1068 sc.exe 1380 sc.exe 2244 sc.exe 5964 sc.exe 5504 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 12 IoCs
pid pid_target Process procid_target 1608 3512 WerFault.exe 101 2712 2092 WerFault.exe 105 1528 3904 WerFault.exe 164 2060 4904 WerFault.exe 153 5704 3636 WerFault.exe 181 4164 4012 WerFault.exe 161 5712 5052 WerFault.exe 169 5740 5052 WerFault.exe 169 8 5860 WerFault.exe 212 3692 1416 WerFault.exe 229 5992 1176 WerFault.exe 232 2512 1176 WerFault.exe 232 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4780 schtasks.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\Colors explorhe.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\GPU explorhe.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\GPU explorhe.exe -
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3336304223-2978740688-3645194410-1000\{A59F284D-7177-4870-A1F4-28ECE0AF3A1F} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" explorhe.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3336304223-2978740688-3645194410-1000\{782DC32C-581D-44FE-9DE9-466FC12C6667} explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\MuiCache explorhe.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei explorhe.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 904 ladas.exe 904 ladas.exe 3872 milan1234.exe 656 mrk1234.exe 3412 Process not Found 3412 Process not Found 1412 moto.exe 1412 moto.exe 1412 moto.exe 1412 moto.exe 1412 moto.exe 4212 redline1234.exe 4212 redline1234.exe 2308 iojmibhyhiws.exe 4212 redline1234.exe 4212 redline1234.exe 2308 iojmibhyhiws.exe 628 uwgxswmtctao.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 4068 toolspub1.exe 4068 toolspub1.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 4596 RegAsm.exe 4596 RegAsm.exe 4596 RegAsm.exe 4596 RegAsm.exe 2920 conhost.exe 2920 conhost.exe 4700 leg221.exe 4700 leg221.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 2920 conhost.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 2920 conhost.exe 2920 conhost.exe 3168 explorer.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 676 Process not Found 676 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3872 milan1234.exe 656 mrk1234.exe 4068 toolspub1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3412 Process not Found Token: SeCreatePagefilePrivilege 3412 Process not Found Token: SeShutdownPrivilege 3412 Process not Found Token: SeCreatePagefilePrivilege 3412 Process not Found Token: SeShutdownPrivilege 3412 Process not Found Token: SeCreatePagefilePrivilege 3412 Process not Found Token: SeShutdownPrivilege 3412 Process not Found Token: SeCreatePagefilePrivilege 3412 Process not Found Token: SeShutdownPrivilege 3412 Process not Found Token: SeCreatePagefilePrivilege 3412 Process not Found Token: SeShutdownPrivilege 3412 Process not Found Token: SeCreatePagefilePrivilege 3412 Process not Found Token: SeShutdownPrivilege 3412 Process not Found Token: SeCreatePagefilePrivilege 3412 Process not Found Token: SeShutdownPrivilege 3412 Process not Found Token: SeCreatePagefilePrivilege 3412 Process not Found Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 368 explorer.exe Token: SeCreatePagefilePrivilege 368 explorer.exe Token: SeShutdownPrivilege 3168 explorer.exe Token: SeCreatePagefilePrivilege 3168 explorer.exe Token: SeShutdownPrivilege 3168 explorer.exe Token: SeCreatePagefilePrivilege 3168 explorer.exe Token: SeShutdownPrivilege 3168 explorer.exe Token: SeCreatePagefilePrivilege 3168 explorer.exe Token: SeShutdownPrivilege 3168 explorer.exe Token: SeCreatePagefilePrivilege 3168 explorer.exe Token: SeShutdownPrivilege 3168 explorer.exe Token: SeCreatePagefilePrivilege 3168 explorer.exe Token: SeLockMemoryPrivilege 2920 conhost.exe Token: SeLockMemoryPrivilege 5080 explorer.exe Token: SeShutdownPrivilege 3168 explorer.exe Token: SeCreatePagefilePrivilege 3168 explorer.exe Token: SeShutdownPrivilege 3168 explorer.exe Token: SeCreatePagefilePrivilege 3168 explorer.exe Token: SeShutdownPrivilege 3168 explorer.exe Token: SeCreatePagefilePrivilege 3168 explorer.exe Token: SeShutdownPrivilege 3168 explorer.exe Token: SeCreatePagefilePrivilege 3168 explorer.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 4696 756ea3dee1e682bea18d1f8d859214de.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 368 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe 3168 explorer.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4696 756ea3dee1e682bea18d1f8d859214de.exe 2872 explorhe.exe 3168 explorer.exe 1520 StartMenuExperienceHost.exe 5064 BroomSetup.exe 868 StartMenuExperienceHost.exe 4592 explorhe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2872 4696 756ea3dee1e682bea18d1f8d859214de.exe 83 PID 4696 wrote to memory of 2872 4696 756ea3dee1e682bea18d1f8d859214de.exe 83 PID 4696 wrote to memory of 2872 4696 756ea3dee1e682bea18d1f8d859214de.exe 83 PID 2872 wrote to memory of 4780 2872 explorhe.exe 85 PID 2872 wrote to memory of 4780 2872 explorhe.exe 85 PID 2872 wrote to memory of 4780 2872 explorhe.exe 85 PID 2872 wrote to memory of 904 2872 explorhe.exe 86 PID 2872 wrote to memory of 904 2872 explorhe.exe 86 PID 2872 wrote to memory of 904 2872 explorhe.exe 86 PID 2872 wrote to memory of 3872 2872 explorhe.exe 92 PID 2872 wrote to memory of 3872 2872 explorhe.exe 92 PID 2872 wrote to memory of 3404 2872 explorhe.exe 93 PID 2872 wrote to memory of 3404 2872 explorhe.exe 93 PID 2872 wrote to memory of 3404 2872 explorhe.exe 93 PID 2872 wrote to memory of 656 2872 explorhe.exe 144 PID 2872 wrote to memory of 656 2872 explorhe.exe 144 PID 2872 wrote to memory of 3348 2872 explorhe.exe 100 PID 2872 wrote to memory of 3348 2872 explorhe.exe 100 PID 2872 wrote to memory of 3348 2872 explorhe.exe 100 PID 3348 wrote to memory of 3512 3348 crptchk.exe 101 PID 3348 wrote to memory of 3512 3348 crptchk.exe 101 PID 3348 wrote to memory of 3512 3348 crptchk.exe 101 PID 3348 wrote to memory of 3512 3348 crptchk.exe 101 PID 3348 wrote to memory of 3512 3348 crptchk.exe 101 PID 3348 wrote to memory of 3512 3348 crptchk.exe 101 PID 3348 wrote to memory of 3512 3348 crptchk.exe 101 PID 3348 wrote to memory of 3512 3348 crptchk.exe 101 PID 3348 wrote to memory of 3512 3348 crptchk.exe 101 PID 3348 wrote to memory of 3512 3348 crptchk.exe 101 PID 2872 wrote to memory of 2092 2872 explorhe.exe 105 PID 2872 wrote to memory of 2092 2872 explorhe.exe 105 PID 2872 wrote to memory of 2092 2872 explorhe.exe 105 PID 2872 wrote to memory of 4212 2872 explorhe.exe 112 PID 2872 wrote to memory of 4212 2872 explorhe.exe 112 PID 2872 wrote to memory of 1412 2872 explorhe.exe 117 PID 2872 wrote to memory of 1412 2872 explorhe.exe 117 PID 2872 wrote to memory of 4816 2872 explorhe.exe 120 PID 2872 wrote to memory of 4816 2872 explorhe.exe 120 PID 2872 wrote to memory of 4816 2872 explorhe.exe 120 PID 2872 wrote to memory of 4460 2872 explorhe.exe 121 PID 2872 wrote to memory of 4460 2872 explorhe.exe 121 PID 2872 wrote to memory of 4460 2872 explorhe.exe 121 PID 4460 wrote to memory of 3940 4460 goldklassd.exe 131 PID 4460 wrote to memory of 3940 4460 goldklassd.exe 131 PID 4460 wrote to memory of 3940 4460 goldklassd.exe 131 PID 4460 wrote to memory of 4004 4460 goldklassd.exe 130 PID 4460 wrote to memory of 4004 4460 goldklassd.exe 130 PID 4460 wrote to memory of 4004 4460 goldklassd.exe 130 PID 4460 wrote to memory of 4596 4460 goldklassd.exe 127 PID 4460 wrote to memory of 4596 4460 goldklassd.exe 127 PID 4460 wrote to memory of 4596 4460 goldklassd.exe 127 PID 4460 wrote to memory of 4596 4460 goldklassd.exe 127 PID 4460 wrote to memory of 4596 4460 goldklassd.exe 127 PID 4460 wrote to memory of 4596 4460 goldklassd.exe 127 PID 4460 wrote to memory of 4596 4460 goldklassd.exe 127 PID 4460 wrote to memory of 4596 4460 goldklassd.exe 127 PID 2308 wrote to memory of 3188 2308 iojmibhyhiws.exe 175 PID 2308 wrote to memory of 3188 2308 iojmibhyhiws.exe 175 PID 2308 wrote to memory of 3188 2308 iojmibhyhiws.exe 175 PID 2308 wrote to memory of 3188 2308 iojmibhyhiws.exe 175 PID 2308 wrote to memory of 3188 2308 iojmibhyhiws.exe 175 PID 2308 wrote to memory of 3188 2308 iojmibhyhiws.exe 175 PID 2308 wrote to memory of 3188 2308 iojmibhyhiws.exe 175 PID 2308 wrote to memory of 3188 2308 iojmibhyhiws.exe 175 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Process not Found -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\756ea3dee1e682bea18d1f8d859214de.exe"C:\Users\Admin\AppData\Local\Temp\756ea3dee1e682bea18d1f8d859214de.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe" /F3⤵
- Creates scheduled task(s)
PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\1000872001\ladas.exe"C:\Users\Admin\AppData\Local\Temp\1000872001\ladas.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\1000874001\milan1234.exe"C:\Users\Admin\AppData\Local\Temp\1000874001\milan1234.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\1000876001\sadsadsadsa.exe"C:\Users\Admin\AppData\Local\Temp\1000876001\sadsadsadsa.exe"3⤵
- Executes dropped EXE
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\1000878001\1233213123213.exe"C:\Users\Admin\AppData\Local\Temp\1000878001\1233213123213.exe"3⤵PID:656
-
-
C:\Users\Admin\AppData\Local\Temp\1000883001\crptchk.exe"C:\Users\Admin\AppData\Local\Temp\1000883001\crptchk.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 5965⤵
- Program crash
PID:1608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000884001\55555.exe"C:\Users\Admin\AppData\Local\Temp\1000884001\55555.exe"3⤵
- Executes dropped EXE
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 11404⤵
- Program crash
PID:2712
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000888001\redline1234.exe"C:\Users\Admin\AppData\Local\Temp\1000888001\redline1234.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4212 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "ACULXOBT"4⤵
- Launches sc.exe
PID:1068
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "ACULXOBT" binpath= "C:\ProgramData\hlkwogclqprr\uwgxswmtctao.exe" start= "auto"4⤵
- Launches sc.exe
PID:3284
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "ACULXOBT"4⤵
- Launches sc.exe
PID:1380
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:2244
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000889001\moto.exe"C:\Users\Admin\AppData\Local\Temp\1000889001\moto.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"4⤵
- Launches sc.exe
PID:3836
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"4⤵
- Launches sc.exe
PID:2508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\1000889001\moto.exe"4⤵PID:1524
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 35⤵PID:2260
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FLWCUERA"4⤵
- Launches sc.exe
PID:4128
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:5072
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\1000890001\goldklassd.exe"C:\Users\Admin\AppData\Local\Temp\1000890001\goldklassd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:3940
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000891001\mrk1234.exe"C:\Users\Admin\AppData\Local\Temp\1000891001\mrk1234.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 11885⤵
- Program crash
PID:5712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 11725⤵
- Program crash
PID:5740
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000892001\dayroc.exe"C:\Users\Admin\AppData\Local\Temp\1000892001\dayroc.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"4⤵
- Executes dropped EXE
PID:4904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 2765⤵
- Program crash
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"4⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\nswFD2E.tmpC:\Users\Admin\AppData\Local\Temp\nswFD2E.tmp5⤵
- Executes dropped EXE
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 13206⤵
- Program crash
PID:4164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4068
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000893001\RDX.exe"C:\Users\Admin\AppData\Local\Temp\1000893001\RDX.exe"3⤵PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\1000894001\leg221.exe"C:\Users\Admin\AppData\Local\Temp\1000894001\leg221.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exe"4⤵
- Executes dropped EXE
PID:5264
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000895001\alex.exe"C:\Users\Admin\AppData\Local\Temp\1000895001\alex.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Checks computer location settings
PID:3944 -
C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exe"C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exe"5⤵PID:2172
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe"5⤵PID:4184
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"5⤵PID:1176
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 36⤵PID:688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000899001\1.exe"C:\Users\Admin\AppData\Local\Temp\1000899001\1.exe"3⤵
- Executes dropped EXE
PID:3904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 8244⤵
- Program crash
PID:1528
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000898001\1.exe"C:\Users\Admin\AppData\Local\Temp\1000898001\1.exe"3⤵
- Executes dropped EXE
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\1000902001\lumma1234.exe"C:\Users\Admin\AppData\Local\Temp\1000902001\lumma1234.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 11845⤵
- Program crash
PID:5704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000903001\1.exe"C:\Users\Admin\AppData\Local\Temp\1000903001\1.exe"3⤵
- Executes dropped EXE
PID:4120
-
-
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵PID:3168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3512 -ip 35121⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2092 -ip 20921⤵PID:4812
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:368
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1520
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeC:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\system32\conhost.execonhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3188
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\B10B.exeC:\Users\Admin\AppData\Local\Temp\B10B.exe2⤵PID:5860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 3483⤵
- Program crash
PID:8
-
-
-
C:\Users\Admin\AppData\Local\Temp\CDAC.exeC:\Users\Admin\AppData\Local\Temp\CDAC.exe2⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\CDAC.exeC:\Users\Admin\AppData\Local\Temp\CDAC.exe3⤵
- Executes dropped EXE
PID:4184 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\3a0a3df7-4a0c-4fa5-aec1-4176ba093d86" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:5924
-
-
C:\Users\Admin\AppData\Local\Temp\CDAC.exe"C:\Users\Admin\AppData\Local\Temp\CDAC.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:6116
-
C:\Users\Admin\AppData\Local\Temp\CDAC.exe"C:\Users\Admin\AppData\Local\Temp\CDAC.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 5686⤵
- Program crash
PID:3692
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\14C8.exeC:\Users\Admin\AppData\Local\Temp\14C8.exe2⤵PID:1176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 10683⤵
- Program crash
PID:5992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 3803⤵
- Program crash
PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\1FF5.exeC:\Users\Admin\AppData\Local\Temp\1FF5.exe2⤵PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\24D8.exeC:\Users\Admin\AppData\Local\Temp\24D8.exe2⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\968E.exeC:\Users\Admin\AppData\Local\Temp\968E.exe2⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup3.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup3.exe"3⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\is-TNKS4.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-TNKS4.tmp\april.tmp" /SL5="$80298,7683695,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"4⤵PID:5572
-
C:\Users\Admin\AppData\Local\WebSocket connection routine\websocketconnectionroutine.exe"C:\Users\Admin\AppData\Local\WebSocket connection routine\websocketconnectionroutine.exe" -i5⤵PID:5236
-
-
C:\Users\Admin\AppData\Local\WebSocket connection routine\websocketconnectionroutine.exe"C:\Users\Admin\AppData\Local\WebSocket connection routine\websocketconnectionroutine.exe" -s5⤵PID:4280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c53cfff621a84792162f70e790980e38.exe"C:\Users\Admin\AppData\Local\Temp\c53cfff621a84792162f70e790980e38.exe"3⤵PID:5820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ABFC.exeC:\Users\Admin\AppData\Local\Temp\ABFC.exe2⤵PID:1476
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "csrss"3⤵
- Launches sc.exe
PID:5824
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "csrss" binpath= "C:\ProgramData\SystemFiles\csrss.exe" start= "auto"3⤵
- Launches sc.exe
PID:5964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\ABFC.exe"3⤵PID:6116
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:4408
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "csrss"3⤵
- Launches sc.exe
PID:5504
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:3916
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4592
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:868
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3904 -ip 39041⤵PID:4300
-
C:\ProgramData\hlkwogclqprr\uwgxswmtctao.exeC:\ProgramData\hlkwogclqprr\uwgxswmtctao.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4904 -ip 49041⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3636 -ip 36361⤵PID:5668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4012 -ip 40121⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5052 -ip 50521⤵PID:5664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5052 -ip 50521⤵PID:5672
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6132
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3780
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5860 -ip 58601⤵PID:5356
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2988
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:216
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 216 -s 35602⤵
- Executes dropped EXE
PID:2172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1416 -ip 14161⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1176 -ip 11761⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1176 -ip 11761⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵
- Checks computer location settings
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4592
-
C:\ProgramData\SystemFiles\csrss.exeC:\ProgramData\SystemFiles\csrss.exe1⤵PID:5628
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5160
-
-
C:\Windows\system32\conhost.execonhost.exe2⤵PID:3560
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5ea35ee6dacd18d44798fd1cdcac562f2
SHA16020906a9d4644d302372859415fb92f964dd21d
SHA256eb188889be7ff3a9026d14db0fdb0b861ab732cc96d46cd213e39c230f6d54b6
SHA5126817f21fbb3a8647346bd3be327051f1162116468b504718e78013451eb240ca2d0d50361e465dd95e755b38f4849d42c5688b0d4051f22efcdcdfc1699b4433
-
Filesize
588KB
MD5c0bea85bd306e0d7e36b7ce31dc25454
SHA1e45f7197b8a8aa7987139c48261b867aab336dfb
SHA256e001b37ccec5097b27fd2230997fff2bdc90dc71290d2f0bb735a90fea8a3c49
SHA51282bbbd3a5ae2abd1d7a1cdf54dcbc39c8e015688030834575afb2da44c73d8f644b64180a0b0907ea8509243ac263975a32f5a791ba50e5e633eebb6a18eb4fe
-
Filesize
176KB
MD5e8cb1e9ee9a2b1caf6126c3ffaf29c31
SHA159c548138a3c5bb4fc802b6e9ebf70f3ef1caf94
SHA25646c2c810d5a02be76ab18dba9839ae1d7eb9e6b77b518183665a24daffeba65e
SHA5129ea6570aa8758d5fa5575841da24ea768c111f50305f3ee239b8444b0bb0b5b0511b1e65509395ca589d42ccb17c7199383a05b577ffe68e7ccb31b6b9a82eb8
-
Filesize
159KB
MD5ed97328c721d034d176b9f9ea6816f9e
SHA1f67f5fc8ae07332e15fb9312c5bbfce0793411dd
SHA256ddc02cfd0c94be494138f4c2315ca882b25e52d254ce5694eb10816b741d8bf0
SHA5127f6a6019de9657764a97b4de71f37f08c92e82f53092a0f42ad82a44e95450e54fab96f95930c1ff0ab7045b3164d4faf5e2db2ddb543e300520d1486591e622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize471B
MD5dab29f0ff85749876aaa834e6c1b5918
SHA1d514aa16346e208e62e1289a82af2ca16c5e64d9
SHA256808cb554c37d8021989c5d145588c2bec772f12b9260dddf8c4d55b3babe65b3
SHA512ffc6db04dee3b901eafb3a8f0234679694bfd66ced092917a4586f62bf8cbfdca6e6eeae3563a0f7ac7ee530d698aa9e36112cf7a0a483ccdfcafc58085056a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize412B
MD5dc695e949589a70a75b957a8d1cf4d5e
SHA128d672f81dd5c4f5c045cd0ebe90516b5ab4b93f
SHA25623e1087acfa543a576ea8ea029b77c59d94b623e389be873cb178d34101cb3a8
SHA512c971f558c6f5a7e068d232d80ab12c30827f67bf954add709dc4d6e73c11bb8ef357ea007343b32be58692d19c4d9d8ff0b61965ea17bb7523e76034f548002f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\HK1EJLEO\microsoft.windows[1].xml
Filesize97B
MD58a0b2c3408d7c0bfa793057099e9435f
SHA1a51b2fb47f45ed74795dc8a4fc6b55c50ddb7c60
SHA2564d4f7c69a41642f448f1be4d535731fdf4aebe44a4027382b4185b4d000905c0
SHA51233f2843f967dcdfca588c7f331fd62b7428207a8c921ff39c5d67c04521fc16b1f80d0de1c9fad2027d4a5c19bd0e6bff8b4236a6da60b0936349f8c0f8d2bb8
-
Filesize
512KB
MD51ebecad9373feee8f349e790102c4ab9
SHA147cddc943dd5f95f6a0d1bb06c09d6089ac7b348
SHA2561cc268effd3f340147372031a2ac06bda6e6fc8eee42e99e08ce184ee1ff1b6d
SHA512a7098111d96603f3a9256128a5ee7504d9250bf8f2103d6e6f0d6a86ea33e1a92451096948bbbba70a287fb56f0fd83f7c25ee5eab9a3c3f6973de82c1bdddff
-
Filesize
1.4MB
MD5a8e7b65115b99ccfadbef8bdae5eedcf
SHA1d69f3e154e7d06b731000aa209ec288591695299
SHA256b5270a1c5f67791e8fa1bc2387cb71a9e210fed442e3fba9eb1b02bc85650826
SHA5127768420f6dc81efec22e07cfa6bb1127c81ef903f31fa14a5c1937a30e00048ea4ce0007476d20c4ee85b2a80d3aaa212de666950cdb412ba5ccc4052447bda0
-
Filesize
1.1MB
MD56816004e0077719149cfb455a067e5e7
SHA1a10ec1c47d12ef685b282a59ce2c7d55cb13cfe0
SHA2560da656376b41456f6cfc78807734ff4a8e38fb689e6c519df417005e6ba8b835
SHA51235328bfa22b69eef8e9f47f5f42b04d54b9a481eaa5a3314c8a195af56b346f9abd83607acf50ab68014bfd95d9bf81b631796fa38e1f75912b3f4a50a5b98cb
-
Filesize
278KB
MD563d50b08bca3d0cba1acb1b2fb8bd293
SHA1d9b01f7d1a94e686273b2be99110687e5078be72
SHA256541bb61f22b1efe7085516dab41f5ed38cb6d752410cad399dfa76b548b1b3ea
SHA5128ca7ace31beec8bfda42cf5821e3520a8a17784d27b25eba84e92ec8b307cbaae94f75efba7aae2f0b8b63a75b4efb847460cbf0e0e8149077d1cc1c1e5d3bfd
-
Filesize
175KB
MD56ec7b6f20db15f47849cfb08679164fb
SHA1b485e5027746378b46830e64285a0073b4465461
SHA256d370a69a18bc367dbc76c20994d6ef3c176b2f57a3513d8deed019e2be5bba86
SHA5122d4cd995d121cd0e18bd4e2c32b1f9d8677577664ae74277a6b67bd2b2b14f3827257c6ca21733ad2f32fa322c1f108dd36a46a4c2bd5b10d3476d9b214f8c18
-
Filesize
237KB
MD5f61bb7e6b74ff4c4f029b3f548c8d367
SHA1c675674026b3ac2b89334dd2ffefa3da20f41811
SHA2568cda0730e912a552d980da712604af39685851a62325adec9b1e68d299efb5ee
SHA51250d99c46491261298573b2a57fbc181515d05b0ea43833896c53e87c070fe849419c77023f90e36f07afd88e08c60e97e8b9568dd7f17119777aa3147072827a
-
Filesize
313KB
MD55a6358bb95f251ab50b99305958a4c98
SHA1c7efa3847114e6fa410c5b2d3056c052a69cda01
SHA25654b5e43af21ab13e87ff59f80a62d1703f02f53db2b43ddca2bbd6b79eb953c5
SHA5124ba31d952bffbe877a9d0d5df647e695e16166d0efe7e05e00ddb48487ab703413351a49043965d5d67ed9faca52832ed01bf9fa24d5943fd591b2d263cf05c0
-
Filesize
264KB
MD5b6bb871637bad0640a1d917df8301cbe
SHA15b51ad30c8eb82c8a0c3c6c44b9fc8666e0ae6f4
SHA2563568509c44a09f3f8bfdbdb2bed8e5d1537208f6c6e0a1efc13d31906cda529a
SHA5127eb20aff44dc347e38085c8937551241647588b3076ca2a1d60756202acc1f53bebc4a50b940fcdeac6703ca0a750d3c680f62495c95db3c4bef5c45fc39cf1b
-
Filesize
214KB
MD515c58a5ec05f2780b0b1470efaefce98
SHA1a7c6d5a0e7aa7ba265ab123cb70bed23f3e28b5a
SHA256a3d9c3770c959ea39d9e3178355ba6d24502ca40eb3fa4e5b6f5e0fd1619c8c2
SHA512a58620138d9eec4724cec49fffb7c2e36799317ae831ef986d53faaec6ce16417123109f5759705e5f8fbbebfb79f233ad06ec4e2788028b1e9ec38b8d1da5e3
-
Filesize
596KB
MD5ad1928104856cedf05582af49e2547cb
SHA19d64f46fe8f8143e70fced51f256d31d7141c76b
SHA256b848ef7335f872942b3be701e97ea921dbe5d42c4375a7b51a6782d57a2753f7
SHA512d5eb33fe002b954eecbf3f2f8d6d3a8cb46919bb85d61f626cf01ecf46d67f23a8e59e4f14b978690ffea7ed7cd82c018bb708b69acbe7b17c8705eb2ce11211
-
Filesize
710KB
MD5cd1404c18370209f2c94cdc4c1089282
SHA192bbd3c909b1a91778d87485f4b85b2b3e69fd95
SHA2565184367ab2646476171e0b1fd1b4964fa14931108f90a9a785718b5fc48dfab3
SHA512c0d7868212c63cbcffa1c077ea31391b0331dd35ddaaf9740933d87e849d0514aea9a2f8672e779f9059de370f8059277ecb92a899fa0be2f6dc5437450570a5
-
Filesize
259KB
MD5b5607bf06cc235bdc81e2aa0c5d1418a
SHA170991ba59d3da53b2ba7d28170c6550b277c4989
SHA256ab62eb792c4a9c05b5f4b968c9ee5c8b9d23a1010447a7178ff722b857be42a1
SHA5125d08c6891e50ff5af705f3ad9743dc78fab7a8396a0ae87af36d6d4f11d57b1fded0f31feaa6fb8e6bddcfdf53ddd09142d3bf3480474e71a2e048c1c57994f2
-
Filesize
120KB
MD5a401e5d8cbbe9bc4fa932d4ff068d0e4
SHA1d938494a53ef6965dd7de6fe3b5f41af1f152998
SHA256561c7acaf9f62ceb7fdbbcca52e7cf7a74b063f311e9320e43e8888c1f49d4b0
SHA5124e06bc0c0dbd569a0591e961a380778938414976bf5c9051cb7c6a3571efb91d95c50d39e99c6130a34211f4fccf561e1ac3376c4cb12f058e5361f83694bb4d
-
Filesize
86KB
MD5e3ecdc8bacdc52ab0abd0c597739c341
SHA12fdea694478ec2723d1d14ddd83c5d941fa93e9a
SHA256892e68f97312637cd16e7d9427c7022fe76732ed4e8718c49fb440643738907a
SHA512bbb4c87de2abed971f9aacd36cf77f0b502c928280952d24f19292003d08ec95865800d9980826c00806c0db0573047666517c26610acec6d0dc56917a6ec3f8
-
Filesize
190KB
MD5e39a8ec1d7493de2c3b8dea49752f707
SHA16585475ea71e89697028bbd1dba1173bcaf49a15
SHA25604e87003bac9c1d51d53549238cbe87407fa3d9dcb9cc0e1229cd5d82a1e55dd
SHA51297f23f0f8e660758625233d5c498445788a27458789aaf55b05a6116058a88d3ba102a4e58c9e15714bec5c1cc04eefe18b4f909a6c9386b71b0ecf978e88e77
-
Filesize
319KB
MD5dd39d2a2e38e1ee02ee1fe73c98d09a7
SHA1730892b47267326e82da03b229a3779a2d998f8d
SHA256c415c67817de31eee88fbf75249ed6f8cb518a2d7b30d3ebf62908cee2d3f049
SHA51230df7583ee4022488d47651f4a942a0393617ede7c1bc7c67be7ce30d81e752920be04e9455f4018ed8122772fdacf907692b699a6381e3c4b753753de65d368
-
Filesize
255KB
MD54e84b908551df5b638f2aaa3cb995a20
SHA1473223716e4b19e73f6b92f3a9bcfc04b6461c44
SHA256b9e4ac7c0105ce40d08501bea5293c4913c7cfae6b4cd688d4d15202b8ea5581
SHA512e64c3687e8ac4a68688f5cb258cd7d995bf55513a3b62e898bfed0d186c65ae0d9e415710e18f505eca5f4e4d474d28b8f86f280d90047b1506fb3797c20be78
-
Filesize
711KB
MD5ad8f3ea13ca71ee5397c6bc72f9a7b08
SHA1bc1bf03a3b756469af95912caf83b2be4e255c89
SHA2564d808608529a7a79ad145482a512559cf3987445805bcd4a6fe151ad96c52f93
SHA512dfa592abeeb79824a659097dba1be98f30ccbf248246efad89dabc3985b126e59ca3eb3c3bb92bac9fc71b743abdb4f328ed3af561ee5fe6ffc369ca486dda8b
-
Filesize
765KB
MD5f46851b7ccc952fe49c766730a2693db
SHA1f3747b8410a7284b8bc1fff7cd4ba8087ccedea2
SHA2564172e61cc061f3b68a56159657f2c57d501711635a531ec3bce7a092ee34beb9
SHA512949a9e539e8dc73b7eac92a9c991dda2718aa0ccefe2c01568268e5b70efe1dd50a621321d86893112c9c2564239120ae08a249c371120b93ba1685f697b3b6b
-
Filesize
848KB
MD541f836ae1f6bdcefad333f626028faad
SHA1a7afe8f3ab5bf17514c727a7e2fa233b107ab9d9
SHA256bcf316f10420b412e6059c0e5910b9c26d48087e4cad8a8a1044cb38fd635814
SHA512206162313e56885e11ac9e53084bae5c922b359bf60220d291627117811506d7704a4b534ae683fd216233ff2ef13759bfde8914d2129c3a5519e7db7aa24573
-
Filesize
129KB
MD5e5b5e6d36bcfab606448db6118aec022
SHA195d4c81e0970353c936c35cc429b08216526a58a
SHA2566d2109cec6d1dcb5d36911395fcde420ac5f5ffa0e54741493eaf11430aeefd7
SHA512b7078c5cdb95b54502307c7506b3473ddade0aa9adfaba1f978a841119190946fcf3df4a28fcb5d0960f094eec27e42831a09b522c3b80414aa967345305b9dd
-
Filesize
459KB
MD5856ab5ae0e378745a00ff4d822af73bf
SHA1ee37f67bdd5e79d6a19c194ed2ddd6b7a759c6be
SHA25684f558589b07f1bd61e9e396ccd0181b1e70e03a83a0c9e27c8fd2d9f4df1cda
SHA5124455ca65ec82479439727df3c7066ff7549adca457a031fb18c1bdefcbb3502209e8b84240a8c43629438db8c8f29a839115408c05a83804d60fec7dee753866
-
Filesize
402KB
MD5198ac4e9b5a15aeb6aa4154a2ab7eda4
SHA18a5c2f2562b1621648e107ee2a6d0a5d9304cdfb
SHA256606de4bcbcda839f0de43d5716ecb339e524252fca8cf29e50ba6c42c61dd8bd
SHA512c4d79a04de72be2b3f51db23c0857f5f4cfd40df201c92953bfd215ec20c798277ddd80c9a6a961e70c1a1199e2e0eb15b653e74cef435f4af6bb21d968db3c4
-
Filesize
293KB
MD599485c4fa8e25f6695a71a320737ac6a
SHA14fcea0a0ca1a2886da724c540c88b6eb8fbc94ec
SHA256c99c177a06a56833e84cb8df3c02ca98223ba391e2778d0d3c2fa4102c89427b
SHA5125028c348d0a1024c2e52710a17585d073eb12aadc28b99dfc7e44ee6c649a002bc11732854be23e88428ed9514cd393506a34cd9d915e8bfbc98730bfc2ff5c3
-
Filesize
196KB
MD5d6b40d6ee3de8c074740b0fcf0da4df1
SHA1a4fe6f870a692f623951a4ae542e7827d4e807ab
SHA25699cf637479bea323ec0e1cd9cc9f2af7025ea7fa02067177966ae67db7f6f421
SHA5126affe2ba80af71203b8316409e4403345c1f960137d072541df20619bc0a2578071801ac83ca3746cc6e8cd92dd923038656c1801760ce4d9357a04c337d395a
-
Filesize
214KB
MD58375ab8dcf949e18c051c0b8e7331649
SHA18a6f546306bdc2fcfcc7ea6a2b2db81cb94c741f
SHA2561bdef77a64bdaedcc1e611b18c559dad175fa73ffb5c5f10b4791d10933576e5
SHA512d25bdb92b0248cc9a512c47af5f4ffb4cb065710eb379c166e6ddb374c6ef94017facbaa61dd8b8f6ba1616cfba6af927255258b3f0e1d25ab3226f42068c920
-
Filesize
355KB
MD52c1032bd3a48b9000f44b92c6fef2a78
SHA1f223edff6dcfaed32883a44f5593af3f8831a7c5
SHA25646bd7e34c7900c31db9ac6cecbb67b10c387e743b6e6ad8ac0b918b10cda46f7
SHA51250ea7cf740935eea2fe706f52c132a89fcaca3fae3d099c2538537c1a48f364d9f3abf746b3614b8fcf2a98b0a141fc54c4e8619ec067352b11c7405ae2e485f
-
Filesize
387KB
MD5fe066ef9ddd98e1545bb78e153be186b
SHA1870421cdd5afe6f12c5717f543950b0706a1a2b3
SHA2569c8c193a839dbc3e3c0c91cef7d168efd5da456c52355a85c784567edddf22b2
SHA512ebf5b8bd0d5549a5d29b65f499b75cc48ef0de399d7851f98680198bff51677720c43762d2cd1543e2a40b035e0e02625bd8e035827576ecd661e0a52c007a76
-
Filesize
295KB
MD560c7e9376bbe37428611f03299d67c10
SHA1caacecb51302216737d0730f9b73475bc1b844ba
SHA256303daa1224f73005bdcc0aa405c473e16063bf64a7db746c89d7ec820c48b9cb
SHA512194f72f83f8a2f8244889156fe92f8fd6b0a7a7d7ba792e6d1f0dae3b6703cf595f53c3c949ff1678c3ac3f49277b762e9593ad3cd3aa2730f84ce4934cdb256
-
Filesize
1.5MB
MD51ad67008e3b871ccc0ce0377c50c9d6a
SHA1d42d94c4c66badc27d54638a49b890e5657d7716
SHA256fbb5378d33778b322cd86e0281270c078871c2ce5c54ea03fd88f0eb965bc4ca
SHA512971159f825a9eb5a423fc477c41efac1031d92dd7ef0c71093116e2e9b521914d7f65803b2bc704a555cef2f69a01288ab2aabab87282c280379e6a0787143a4
-
Filesize
16KB
MD544c10d72228acf52bda4a2eece810357
SHA1212dc3a9ccd556711cccaf4b035e24e6a15e00f5
SHA256960af2f4b8bc447bae40ed42a97295c0f40d88fa78491eef0eee8818fdbb6e1a
SHA512f29e57503c92e10a65f3d7bb6791ef5a904aefbb27cd1e40eacc98e6372a81744f69ce0e80f489aef544a1122ff434aa9961d8f72f79afa7da86a29a24935aa8
-
Filesize
313KB
MD5f733785f9d088490b784d4dc5584ebfb
SHA16c073d4208fee7cc88a235a3759b586889b91adf
SHA256e7216d8b7084c0c36d90aefaf30bb7b6d10ae2ecae700889d459ed5ab1b26a59
SHA51243589b18333b0edcd6e300577f86de685058df5533bcbfdd3e30497aa76176008125fbd28deecaca5e6132c42cc5c0a583c34497f40dbe4ea577333eaebab899
-
Filesize
292KB
MD5d177caf6762f5eb7e63e33d19c854089
SHA1f25cf817e3272302c2b319cedf075cb69e8c1670
SHA2564296e28124f0def71c811d4b21284c5d4e1a068484db03aeae56f536c89976c0
SHA5129d0e67e35dac6ad8222e7c391f75dee4e28f69c29714905b36a63cf5c067d31840aaf30e79cfc7b56187dc9817a870652113655bec465c1995d2a49aa276de25
-
Filesize
92KB
MD536472f56841703d9f929befa7e788f11
SHA13a4d97fbae89d8831e711bba45422a364aeea83c
SHA256f73ca1c46a2615a997014d700b19bf73b6411c438fe2abdfaa16f18ad0e162ba
SHA512d87e0b8538edb84df059b70a4d2a0d65ae959e4b37ec621c01c3c358827b64ee1217ce9a870b7ded7cc04ee2736792aa436510f228921d98b508d8f13a15a7ab
-
Filesize
241KB
MD5589b8c2e17a29ed8c0032f9bef3c5ff4
SHA1ce85af7f50f2dd874450415ee5b65f7d444f199a
SHA25629f1abdad94099934bcb72864ed31b023e7b12188394404b480323b3de3ea692
SHA5126580dd65dce63176746f966a2fa78e6193e9407a32720bc861dca625a2e1e3ca55f1849f1e6ceca9a7c923df199c93f49c0c74139bc31b15cd5293897e7a5504
-
Filesize
83KB
MD5f37d1a64a0aee49e71ba58fd33a76662
SHA1aa8f23618143226e18505748aa3b38516b7dd825
SHA256ae0fcc23778aa909e3766f537ec56a139afed007d7c8dd44aedaeff916304247
SHA51278a327f80d2c6d0d2e7b59c71ac40f5584fb9fd667f35e2b0bee6c0bf53074e91da01c3ef2ff10776b73e05e234ec3d3d47aca99a6e0b00cb59dd761ceb2ec7c
-
Filesize
134KB
MD50025f07004fbaff43a1d5d06139621bd
SHA1429b6c75271eac67c78f90b77236607bf0dc7df4
SHA2563e231995009f27269528c9c495a85ced96fd11aaef944537dabf490e67c64984
SHA5128b4cbf564064ae277eebba2c12a4513201158b718e5f99a67a7344046d9962dbc9315da896f88824611341e3d2690e2006a99ec837dbf308e45c6b286a4b7c35
-
Filesize
57KB
MD53f27325329dad8f20379553d712e2064
SHA10cf84b23b206264756da14060e612d740a2f7751
SHA25692be4d98ce0104bb9790bcd3d34ca617182c79b179e93fcc27962eee87dac1c7
SHA512b404accd5e1a1dc3799303e437fa7b019200a57b6ed5c13a22d8f41f79d9966b4e41eef96a2489bc622c74f4530989268fe6a8b91ec65746b669aab686b0bbd1
-
Filesize
242KB
MD50c3cddaeea2d971960fac81a6c2a08af
SHA176d64737d48ad981c6c233ecdf2af10251c3224e
SHA2569b13b3710201013ae0a71aa69fd0865f027016813851423923c6720a95e82780
SHA51288bfed3d872d9b4b6f5bcfd4921621887a750b6c3190c7bd1580c66d0c190857a31d0f56593b0dc63a9ed9d0a761db03e18c055e537c148b5b136bcee75553ab
-
Filesize
313KB
MD56754d3c831c2392dd5a35b5768df4c37
SHA13a1bac47966c643c1587b734f19e7963c56e8dee
SHA256715dfcd7ca54a83c37acf2e093a0c3703732b2e3fceb52fcf5037f37e333bad9
SHA5122d373f936746f2bf962dbac09779d1b7c7f93dec7d8728f2c3db8bda36da290539e49b8d3bdcbeef28ab1d6e126f8632c009f5583ebb1b2d3cba4ba18e6245dd
-
Filesize
114KB
MD5e34d0b3f0ce87ae1a89fad5a68c3399b
SHA1b05f4238cafa0a37b31f34da0671952b9f1c10e1
SHA256f2e7e1103b2f88b75081ce52ab7ec7e2259b2037ab4c97df5ec2b9e6fb0d3f8d
SHA512ec3318327b42149ef81b83fe4fc363f86241adee541a80fcfdd5257480c60ddbb929495bde00e8115f017fb28232e477932e206f5d17fd7569d791d50fbd4b9e
-
Filesize
119KB
MD5fa8b613cc213db26a7a12547c4f1d6c5
SHA160681cfc556e036a8633d0efd54ba8cab562a910
SHA25612e938b376421e5cfdff7ca037c0a8b77e69ba94ab67264be8adf9211969a375
SHA51271e4b44619c6a2bbbb6e070b2c803b2eb49f0b799c8aa096603a5133af9a17f8743f87dd513d34ab55b3aba23eede7c3629f47a6693e1bf7305dcbd3e19c9820
-
Filesize
89KB
MD52482814def0056f88fcbdfb2e956eaae
SHA1c5f985f31a79374349b6ff88d82a02409c8d4375
SHA256041d493dc2d46193d5f3e9d459d66589d6e38416d5ae7bcad992c0a73ed40168
SHA51247106ca0acdc8b92a54bb40f8e9245a675b19ea4c1ec5c82df0a902f0009d3e471a6bc1027730850da5fafc0b881db9a6bb1a9ed948837e8e0733fdf6f980bf0
-
Filesize
125KB
MD5da4b60dce6c56c9a298f134ad4a4018c
SHA174ca90549c17f1267212401f63ca64a2cfcd90e2
SHA256c48eb6c853bc9019f9b4e15663c2222c1cc637ce8080eb899ba676f5d3802964
SHA5126d733da5c517ac8689f1ba8c693d9d2d132749e3c59116ab29224692c7ae3e509f433b36f967311791018bd89ea13f3f7040fbfc4eaf37688b5bfd33265040c6
-
Filesize
105KB
MD5116d177125dc5c79ecb8cc31757bc550
SHA1627202531ff3c716de27a0403e8eeb091c61b153
SHA2560f709dafec420201eec3eb8b4c21bb74a36c6e3b84706e332d7a83023b808950
SHA51228a2cdb1270cf659e31878e41c6388acb7a3d197d97dd397b1af9d592b8f7312dac737cb7cc06d5a531742b88e536950647c3c7831749406371bb53c9d711cbd
-
Filesize
123KB
MD589a8ab23a84c40148b56abeca08dde68
SHA1da27039342becb8a3d667ec22cd7335b1c85916b
SHA256668d6a7945a9d50a5012e490f0e383ca56014d6821b535277e3e8d35f2b248e0
SHA512011ba28f91c1ba88bc6355d8285a45a3f1f9479b63ffc11991b917b9cbe9961a7b5d84eb811312241bd1762f2fbbea46036598fdf6032e10573b0f908cb8004d
-
Filesize
46KB
MD5f4e346d74093e79087c4dc56227f2053
SHA186818a3068983e044d9cd3311bef28cfa4f0ee09
SHA25664cbd3a47dce818846dce768d8f4eabf8bc9f6a236bb7d54f03e729bd0c46f4c
SHA5122d8d6483e2295cfbadffa260f409f1fbe5bb6b2ccd4c394a7062024158ac8be2abc50d6995b52f057a7b88254f6e4df2be1e18beb62d1ad99d896cee9ad0b33a
-
Filesize
25KB
MD50ec976e0a3321a10acd793073bf7b657
SHA106c9d618e0f6bd1e47072fed0e1f71a2d8d32007
SHA2564a3de399e0e51644166074eaec85ba78b6b3770c90ebd08e9867a6e67b106c39
SHA512ea1836c8cbf95d785741e81f9386da575023176810c9e319d8df1ad2674f455b3691f3aad7eaea685ee80559b5b75ee61321eec58f53202da3a379d74660a2e2
-
Filesize
166KB
MD5cc8fe6896eee30e8cb1a9e4649b6e89e
SHA158e720ec8f0c9d25310f8b38f36185ce23b48765
SHA2564ced5baf9a6944c3c7a080a1f1156eb52f9a16244cc61635471e965a89742228
SHA5128c76682e95a289ab18dac12c54076f85b3559cea3aa1bf414545448fbd08d489d2271345b579659a4b4ce8989cc4629018f2ade2aaee17b4919ef63b73d49749
-
Filesize
108KB
MD5c7efb786d738452e6b21aadbdc60a6fc
SHA1940a0f313dace191acf7ad11ba0ded1d3ef9edac
SHA25693d507e3acf799af065e8951e0d226f9b33384c5595a0352dd009592df52f18f
SHA512250d4e9c25fa93050937ffdb1e25993a81386d664e6cd1dc8612c1def16d9d7a4c3e20040ca7237806860f2c15c184c1553827ef34115d8809c27a70ac59b0e6
-
Filesize
431KB
MD5eab3b4c63d2330b8703b992c9815f1c1
SHA14ad46191c9854c17a0d15b83aa6230075924e7e9
SHA256fecb864faeeec2474a782f33007587bc37039a959b9c856a1b54d61be85e8bf7
SHA512d74adc4d7f285e81b8bfd750d19ae628d3af3fa5281ba20670cbdcd3772e9488ef21a686e52d827f8676f09090818a7c5185b6ac7c1818be9372a55fe6a6eebb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.6MB
MD595b12c637ee54d4a68cb2f66cd0c6b99
SHA1ac29e2e3b6b8fabf36928bf31ba80cbce1c32d9e
SHA256fa45ac1708f22a9ae1b0da764c5e244e6c0b18c5d2e76e5b10ae4565c2382fea
SHA512a06d0fc891a722ddf6242e2dd267f401768c40d43a7685e2f5d083ddff8f05d31d3bdac603f38f5b6e45426c1fea95734547a468e3a57bf730b0e67aaaf3bd6e
-
Filesize
1.1MB
MD57859809ed0bee46bb5ebc545ae821cd2
SHA17a910dd4cd82560a26c69b1081587385c7e63404
SHA256d1614e892e09bd0d5cf545f534b9e3ef21ae8083478294273c415376fd5decd2
SHA512b35f833a24742649b7c1cfeddd1134b6e3ecb6ce29be87b06f32dcd90ff07bf1728f3c5db1f3e1d5466c7f5fedc1804317abb97371443f6339e4dc7582009c96
-
Filesize
195KB
MD56d409318c95648352c462c40048d2744
SHA162578b9970e573ae32d0ecdd6f8ddf21220a104e
SHA2569ce97460b094a1c620d78d30a8b18f8a2c69d68a47121a8592b1d02644d1b1b4
SHA512f3800d1a9c873369ab1ba1abe467419a358a5d95a8102976adb8f28f535dd59bc67d5e4962a088570fcab35bb3a3ed6ba4c52d31505bf3e652dd5a5cc86bc609
-
Filesize
348KB
MD562dec7c0611fa85858f216cbdcc21b39
SHA1d37a4880ef2de3b76800ac5352ee501e0cd72558
SHA256fec8a99c62eb4174f3f55aa2c7efa3ca70240238e392dad81c59a411ca16c069
SHA5123ab0e4bad652e2fbb3986b6ba5dfba51e68296ebe28b2ea078ca9a3210fb5e27fdee90ada2ca0b6d3ef1d7ab7ddb7f5c3f17befb40078bf20d95cd429d6e6173
-
Filesize
96KB
MD549832f866545a7e61cc82863af38d90e
SHA15cffe304e55ea052d98b2ffacd100fb9982d5c71
SHA25600edad6e4b58b705065aea02773785d8e6eb583266891db8e03980f44c2f80a8
SHA51243feff29cb8876a4cd784b2d5725d88c64eef53b1584026029f8f4a094b999c36d1e6baa0acfb03d2e737144e6a69a4e0f9a6c0577b9d6ba4340d86bff88a03d
-
Filesize
156KB
MD5e95d7af502f837a030d6b851bcd9c6d5
SHA1a2e94785560acab22e8d2b289f3d5cd37800c524
SHA2567a3a1e6c53001ff2e6a5d70ffddc860fcba4b937ae80bbe76754ebce0fcdc084
SHA512d58a7d8a58e3384cb4f2b343904a28022c797966d63af695fe66175f965e609ebfc22c8f327dbbcc7c37329cb88f54aaea8f799fcd9beb34ce633a1cffd99247
-
Filesize
203KB
MD5d1881df861c967ed95422537ca3e1405
SHA1c7336ac3ccb9a0c709d8a1e4e2e967b09c1f1fff
SHA256eac165265663609f9c605f476415857eaca7c2da00d3d33ba4420854cc5626bc
SHA512c342af333fb0ab59583b1de5181c29e7075198be5997274d75a6d7a2e428cfd4ca36a05665a95070c16e01259e39b3d3acad755e517ac8982b78d9d8e529b816
-
Filesize
381KB
MD57b5dd85fda5a0308dedc6b219a26e626
SHA1c7a57266105cbffb2634764775e2dcdac96ab55b
SHA256246b393fb062cfe35f9b32318ca422f6497f35fb8e9eb1f7f5e732b12004a31e
SHA512f85b3e0e1a6b2ff789c0987ff77a7955caea9739955c6079949bc42f1a3eb099edcc515ab99d77dfb81c02bd8d5ae21dffe4270a53229f24ba8af3bd5d182847
-
Filesize
364KB
MD58d38b008c0a0dca7742b53cab6ccea89
SHA179ac98de07d0ed9e8926d8716335f60ba3b0fe8c
SHA2565cc0da7f9e4576c10145444d9941dde6f95c85e15d0f95314dccb5c4255b2086
SHA512b47ac158a559767c56ce6ad666da81dbea50692e70b8d222668a967f507e004659f9b045cbaa0cf3a723dae667dec8b59364520b7f6c80831d9a195e1d10bde2
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
44KB
MD5ea9cd9e6265047ad515c9194b139ffc4
SHA1ced3b94474e1e77dde19cc05453c4318e1bc9edf
SHA256ebc822259c6d0470d9b0f1703466af29e61de4e70a94593238100dbc498458de
SHA51292dd551e7cda55c661c739a1d2ddcfdcc1c087ddb0920b7e2ea0cd6962a3bc960432532ec760aebcc71bee3ffcd5f005545d0ddaf1bb4b29a20f4d0f0c945054
-
Filesize
127KB
MD58944978413abbce52fceafb0077d42ce
SHA1ef8b02f14fe46add30d6e18ef6a0eef0a7d33e11
SHA256cca1f0b51acf2d69259e8ff0560f28504fc24bb66b8c224ca7524a5a0432a666
SHA512ac8fd290f6bd671f21f75440c1b7fafceb38b5f5cb094fc02c992a192560fb8907c78d4a0d41faba7d4e296e92dd423645484b1e56e8497bdd7b7abaefbc5f3c
-
Filesize
53KB
MD592ecca5dccc63eb66fc92a1ba949dde4
SHA15f323cfcd8f96a709ac45744dce45416e18e6173
SHA2565e9bd97e6174230bdb7feb60215c10769d80bd911f7949db12bd0c96ad63dded
SHA5120beabf872bb172aa25e29196a6e290b8ec5cb7badc5490a7acc67e60e8005474926e4676c9f4d26e157483db64b3f072c78d9a17b84afaca4172a9255e4a91a2
-
Filesize
21KB
MD56ebe6dc72d3630c35b7658c0932c3381
SHA1542ed433943d5b1d44e8b53a28b9b976ffeacbf5
SHA2560d6d4b0b8ccdd001d2c1a8d2b230e7ddee87c3f6b4380a9fd98131c5770704c7
SHA5127e250e57fdbc3a2bcf3ff02a234cd31cc13a389f5cbaaa4774ad20923436aff9bf193983a15f53e92461275518273ed179f0358d363d67e52a803b2ed80ed653
-
Filesize
124KB
MD5735e780266e8cfaf2969ef02e522550e
SHA169e84956acf20d07b8a1934b63fa508c03ac9303
SHA256439a6a289fc7e17168636a4f0d7924125cf691fcc7c8eab44d2848a609e1616e
SHA51231a9911b6f0d9c13ad1922d765f1c49022a5ea13a712ad1aa9bd2e3d244f3404d537c2a5d0a1810d2421317661c522eea24ab26291593b4a655edf0267fe80ec
-
Filesize
102KB
MD585af6c99d918757171d2d280e5ac61ef
SHA1ba1426d0ecf89825f690adad0a9f3c8c528ed48e
SHA256150fb1285c252e2b79dea84efb28722cc22d370328ceb46fb9553de1479e001e
SHA51212c061d8ff87cdd3b1f26b84748396e4f56fc1429152e418988e042bc5362df96a2f2c17bcf826d17a8bae9045ee3ba0c063fb565d75c604e47009ff442e8c8e
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
149KB
MD592342094051ecca96d7dd8424e35ce12
SHA1d6131eca0f32d238f0bf93358025cece916b8f45
SHA2567f3f3346cd85c21ad93d004b171b99a8496cfb3ad704ff0a14fc5fcbe4725b2c
SHA512fe0e56a3adaa3e60edf5b4fac309df3b2bd746688927189aa9e0c3fb3db8a88ccca0300dfa403919bb44fae17407a32ab113fd70366c94398022f784b56eef29
-
Filesize
128KB
MD5dec48916a43e70ba8cbddae24af113cf
SHA1b60be08d839755d97f80dbc3be80557b7df3685a
SHA2565a0999511ccef270e017591195682957163970d756ea75c4cf3dee17ba157155
SHA5121989080e15034a42b0f995e1f38205ef858a7fbade99dcbca1072617d6947920350c320e1d42e94b123b8c6b0cec6ad86d0ac6b0991dac3134c3016850dd3d89
-
Filesize
117KB
MD5f0f045e2f7d09d71ed77d7dc4b6e84cd
SHA12d28bea13715cfd77f25e892bee62a951e1ebed6
SHA25659316ab25d46d7f85efc9e27a3ad0b05b0c171d34e2abbcfb35a7a61d7d1e386
SHA512fc9b3ab56ff17b994b55f08ee5dee58dcfa5813e416fcdc2142dde82ec354f304ce2151ce54d17323425aafe9249842f664a98f5b602bedee797812a459f06ca
-
Filesize
57KB
MD519ab4c8b53720452da84becea070630c
SHA14732de31a0f5dd24d39b6b6c0347f3286c6aa929
SHA256eea2e16826026ad1641a1f118ea04556ef8ee1488f7f8bec46312b156cb96b2b
SHA512b4c3d2aa111888467925c343ae186a3b3d4679887f6a61a1a20c69e806f896467caa1be477e632663fe79e23b89be182251d4676593ffdf4c22393a64a047117
-
Filesize
36KB
MD5a8c17e9a9c140904270ef36ff2ca582e
SHA1bc418a1b784c95251fa3cefe08c5c5b59547b6ca
SHA25610d92d00577dfbe6536db4103564203fae9563ca7898026221ea1121d2fcd179
SHA512218feaccd74d28d1bea6ef0577be515f5f5d061c03c8e8c4316f3bbff3735895a720645d835301cae28128f6928b8fda70bd04e3fc7a1f0265f15f081f7ab9cf
-
Filesize
14B
MD506af69ecf2379f83273f0cec20829609
SHA12853d9e9466d70275b53cc8262f6cd86860092b0
SHA2562eda32744e2bc6e201953fb324265185dc3e9376330fd82d164931e5c1511537
SHA5126c82f31bdb02049a04102c170f4ecd3e54472dcdaecbee7901e0dc4da8a47c08dae1d9d55e8dc3d38d2212b0c23c00cfdc130072963f3ac4f58308d6a0d501d6