Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2024 05:36
Static task
static1
Behavioral task
behavioral1
Sample
b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe
Resource
win10v2004-20231215-en
General
-
Target
b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe
-
Size
217KB
-
MD5
ea8dcf2eee76f737f8796bdbf7e33a06
-
SHA1
a30a310bf397ac2c5c15df009f12c91b7a2641b4
-
SHA256
b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8
-
SHA512
305c1b28f68dff88cf0006d61c3210e9b32f32490ddfcd361fc0923214e39aacd936a1f3a195b6fd3a876f5eacf054ce22d15b6fcc254024d33f5f6e13ea1e3b
-
SSDEEP
3072:d3tinQnUoC0pvo/Uw/3BofIclBYKw6tkp3P00gpUCL5HVFUjWjJkp:d3cnQnO+vNlBH1t4P0a65HYjWjm
Malware Config
Extracted
smokeloader
tfd5
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
5.42.65.38:46185
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
lumma
https://resergvearyinitiani.shop/api
Signatures
-
Detects LgoogLoader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2592-123-0x0000000002C80000-0x0000000002C8D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3752-31-0x0000000000D80000-0x0000000000DD4000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000342001\rdp1234.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000345001\new.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
5A95.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5A95.exe -
Processes:
5A95.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 5A95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\5A95.exe = "0" 5A95.exe -
Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF 1 IoCs
Processes:
resource yara_rule behavioral2/memory/760-116-0x0000000006AA0000-0x0000000006BBA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2592-123-0x0000000002C80000-0x0000000002C8D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables containing artifacts associated with disabling Widnows Defender 1 IoCs
Processes:
resource yara_rule behavioral2/memory/760-116-0x0000000006AA0000-0x0000000006BBA000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables embedding command execution via IExecuteCommand COM object 1 IoCs
Processes:
resource yara_rule behavioral2/memory/760-116-0x0000000006AA0000-0x0000000006BBA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM -
Detects executables packed with Themida 15 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\filename.exe INDICATOR_EXE_Packed_Themida C:\Users\Admin\AppData\Local\Temp\filename.exe INDICATOR_EXE_Packed_Themida behavioral2/memory/2288-171-0x00007FF622AD0000-0x00007FF623823000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/2288-174-0x00007FF622AD0000-0x00007FF623823000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/2288-175-0x00007FF622AD0000-0x00007FF623823000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/2288-190-0x00007FF622AD0000-0x00007FF623823000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/2288-196-0x00007FF622AD0000-0x00007FF623823000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/2288-244-0x00007FF622AD0000-0x00007FF623823000-memory.dmp INDICATOR_EXE_Packed_Themida C:\ProgramData\Google\Chrome\updater.exe INDICATOR_EXE_Packed_Themida C:\ProgramData\Google\Chrome\updater.exe INDICATOR_EXE_Packed_Themida behavioral2/memory/1332-250-0x00007FF752920000-0x00007FF753673000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/1332-253-0x00007FF752920000-0x00007FF753673000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/1332-256-0x00007FF752920000-0x00007FF753673000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/1332-293-0x00007FF752920000-0x00007FF753673000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/1332-350-0x00007FF752920000-0x00007FF753673000-memory.dmp INDICATOR_EXE_Packed_Themida -
Detects executables packed with unregistered version of .NET Reactor 6 IoCs
Processes:
resource yara_rule behavioral2/memory/3752-31-0x0000000000D80000-0x0000000000DD4000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral2/memory/3192-49-0x0000000002640000-0x00000000026AC000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral2/memory/3192-56-0x0000000002630000-0x0000000002640000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral2/memory/3192-57-0x0000000005250000-0x00000000052BA000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor C:\Users\Admin\AppData\Local\Temp\1000342001\rdp1234.exe INDICATOR_EXE_Packed_DotNetReactor C:\Users\Admin\AppData\Local\Temp\1000345001\new.exe INDICATOR_EXE_Packed_DotNetReactor -
Detects executables potentially checking for WinJail sandbox window 2 IoCs
Processes:
resource yara_rule behavioral2/memory/760-116-0x0000000006AA0000-0x0000000006BBA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Anti_WinJail behavioral2/memory/760-116-0x0000000006AA0000-0x0000000006BBA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
5312.exefilename.exeupdater.exeexplorgu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5312.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ filename.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
UPX dump on OEP (original entry point) 17 IoCs
Processes:
resource yara_rule behavioral2/memory/848-348-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-349-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-351-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-352-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-354-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-355-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-367-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-369-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-372-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-371-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-375-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-386-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-449-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-476-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-477-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-478-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/848-479-0x0000000140000000-0x0000000140848000-memory.dmp UPX -
XMRig Miner payload 13 IoCs
Processes:
resource yara_rule behavioral2/memory/848-354-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-355-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-367-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-369-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-372-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-371-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-375-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-386-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-449-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-476-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-477-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-478-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/848-479-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
filename.exeupdater.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts filename.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
5312.exefilename.exeupdater.exeexplorgu.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5312.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion filename.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion filename.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5312.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5A95.exeRegAsm.exeexplorgu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 5A95.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation explorgu.exe -
Deletes itself 1 IoCs
Processes:
pid process 3420 -
Drops startup file 1 IoCs
Processes:
RegAsm.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe RegAsm.exe -
Executes dropped EXE 17 IoCs
Processes:
FDAA.exe29AD.exe34CB.exe5312.exe5A95.exeqemu-ga.exefilename.exeupdater.exeexplorgu.exerdp1234.exenew.exe987123.exelolololoMRK123.exeredline1234min.exefor.exedayroc.exeAmadey.exepid process 4424 FDAA.exe 3872 29AD.exe 3192 34CB.exe 1656 5312.exe 760 5A95.exe 1768 qemu-ga.exe 2288 filename.exe 1332 updater.exe 2348 explorgu.exe 1184 rdp1234.exe 3068 new.exe 220 987123.exe 3368 lolololoMRK123.exe 4152 redline1234min.exe 4300 for.exe 1332 dayroc.exe 3700 Amadey.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
5312.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Wine 5312.exe Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Wine explorgu.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 3392 rundll32.exe 3692 rundll32.exe 4912 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\filename.exe themida C:\Users\Admin\AppData\Local\Temp\filename.exe themida behavioral2/memory/2288-171-0x00007FF622AD0000-0x00007FF623823000-memory.dmp themida behavioral2/memory/2288-174-0x00007FF622AD0000-0x00007FF623823000-memory.dmp themida behavioral2/memory/2288-175-0x00007FF622AD0000-0x00007FF623823000-memory.dmp themida behavioral2/memory/2288-190-0x00007FF622AD0000-0x00007FF623823000-memory.dmp themida behavioral2/memory/2288-196-0x00007FF622AD0000-0x00007FF623823000-memory.dmp themida behavioral2/memory/2288-244-0x00007FF622AD0000-0x00007FF623823000-memory.dmp themida C:\ProgramData\Google\Chrome\updater.exe themida C:\ProgramData\Google\Chrome\updater.exe themida behavioral2/memory/1332-250-0x00007FF752920000-0x00007FF753673000-memory.dmp themida behavioral2/memory/1332-253-0x00007FF752920000-0x00007FF753673000-memory.dmp themida behavioral2/memory/1332-256-0x00007FF752920000-0x00007FF753673000-memory.dmp themida behavioral2/memory/1332-293-0x00007FF752920000-0x00007FF753673000-memory.dmp themida behavioral2/memory/1332-350-0x00007FF752920000-0x00007FF753673000-memory.dmp themida -
Processes:
resource yara_rule behavioral2/memory/848-347-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-348-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-349-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-351-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-352-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-354-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-355-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-367-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-369-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-372-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-371-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-375-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-386-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-449-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-476-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-477-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-478-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/848-479-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Processes:
5A95.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 5A95.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 5A95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\5A95.exe = "0" 5A95.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
5A95.exefilename.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5A95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5A95.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA filename.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Drops file in System32 directory 4 IoCs
Processes:
filename.exepowershell.exeupdater.exedescription ioc process File opened for modification C:\Windows\system32\MRT.exe filename.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
5312.exefilename.exeupdater.exeexplorgu.exepid process 1656 5312.exe 2288 filename.exe 1332 updater.exe 2348 explorgu.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
FDAA.exe34CB.exe5A95.exeupdater.exelolololoMRK123.exedescription pid process target process PID 4424 set thread context of 3752 4424 FDAA.exe jsc.exe PID 3192 set thread context of 4328 3192 34CB.exe RegAsm.exe PID 760 set thread context of 2592 760 5A95.exe calc.exe PID 1332 set thread context of 2592 1332 updater.exe conhost.exe PID 1332 set thread context of 848 1332 updater.exe explorer.exe PID 3368 set thread context of 1596 3368 lolololoMRK123.exe RegAsm.exe -
Drops file in Windows directory 1 IoCs
Processes:
5312.exedescription ioc process File created C:\Windows\Tasks\explorgu.job 5312.exe -
Launches sc.exe 18 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 760 sc.exe 1996 sc.exe 1584 sc.exe 4616 sc.exe 3612 sc.exe 4900 sc.exe 1616 sc.exe 3404 sc.exe 856 sc.exe 1888 sc.exe 1564 sc.exe 2416 sc.exe 4524 sc.exe 2996 sc.exe 2856 sc.exe 4144 sc.exe 1788 sc.exe 1388 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2892 220 WerFault.exe 987123.exe 3644 1880 WerFault.exe nine.exe 1100 1596 WerFault.exe RegAsm.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
987123.exeb8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exepid process 2040 b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe 2040 b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 660 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exepid process 2040 b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
jsc.exeRegAsm.exepowershell.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exeexplorer.exedescription pid process Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 3752 jsc.exe Token: SeDebugPrivilege 4328 RegAsm.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 804 powershell.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 4636 powershell.exe Token: SeShutdownPrivilege 1492 powercfg.exe Token: SeCreatePagefilePrivilege 1492 powercfg.exe Token: SeShutdownPrivilege 780 powercfg.exe Token: SeCreatePagefilePrivilege 780 powercfg.exe Token: SeShutdownPrivilege 212 powercfg.exe Token: SeCreatePagefilePrivilege 212 powercfg.exe Token: SeShutdownPrivilege 1596 powercfg.exe Token: SeCreatePagefilePrivilege 1596 powercfg.exe Token: SeDebugPrivilege 2432 powershell.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 4652 powercfg.exe Token: SeCreatePagefilePrivilege 4652 powercfg.exe Token: SeShutdownPrivilege 4348 powercfg.exe Token: SeCreatePagefilePrivilege 4348 powercfg.exe Token: SeShutdownPrivilege 1600 powercfg.exe Token: SeCreatePagefilePrivilege 1600 powercfg.exe Token: SeShutdownPrivilege 3748 powercfg.exe Token: SeCreatePagefilePrivilege 3748 powercfg.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeLockMemoryPrivilege 848 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
5312.exepid process 1656 5312.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.execmd.exeFDAA.exe34CB.exe5A95.exeRegAsm.exejsc.execmd.exeexplorgu.execmd.exeupdater.exedescription pid process target process PID 3420 wrote to memory of 2876 3420 cmd.exe PID 3420 wrote to memory of 2876 3420 cmd.exe PID 2876 wrote to memory of 4472 2876 cmd.exe reg.exe PID 2876 wrote to memory of 4472 2876 cmd.exe reg.exe PID 3420 wrote to memory of 4424 3420 FDAA.exe PID 3420 wrote to memory of 4424 3420 FDAA.exe PID 3420 wrote to memory of 3872 3420 29AD.exe PID 3420 wrote to memory of 3872 3420 29AD.exe PID 3420 wrote to memory of 3872 3420 29AD.exe PID 3420 wrote to memory of 400 3420 cmd.exe PID 3420 wrote to memory of 400 3420 cmd.exe PID 400 wrote to memory of 1576 400 cmd.exe reg.exe PID 400 wrote to memory of 1576 400 cmd.exe reg.exe PID 4424 wrote to memory of 3752 4424 FDAA.exe jsc.exe PID 4424 wrote to memory of 3752 4424 FDAA.exe jsc.exe PID 4424 wrote to memory of 3752 4424 FDAA.exe jsc.exe PID 4424 wrote to memory of 3752 4424 FDAA.exe jsc.exe PID 4424 wrote to memory of 3752 4424 FDAA.exe jsc.exe PID 3420 wrote to memory of 3192 3420 34CB.exe PID 3420 wrote to memory of 3192 3420 34CB.exe PID 3420 wrote to memory of 3192 3420 34CB.exe PID 3192 wrote to memory of 3304 3192 34CB.exe RegAsm.exe PID 3192 wrote to memory of 3304 3192 34CB.exe RegAsm.exe PID 3192 wrote to memory of 3304 3192 34CB.exe RegAsm.exe PID 3192 wrote to memory of 4328 3192 34CB.exe RegAsm.exe PID 3192 wrote to memory of 4328 3192 34CB.exe RegAsm.exe PID 3192 wrote to memory of 4328 3192 34CB.exe RegAsm.exe PID 3192 wrote to memory of 4328 3192 34CB.exe RegAsm.exe PID 3192 wrote to memory of 4328 3192 34CB.exe RegAsm.exe PID 3192 wrote to memory of 4328 3192 34CB.exe RegAsm.exe PID 3192 wrote to memory of 4328 3192 34CB.exe RegAsm.exe PID 3192 wrote to memory of 4328 3192 34CB.exe RegAsm.exe PID 3420 wrote to memory of 1656 3420 5312.exe PID 3420 wrote to memory of 1656 3420 5312.exe PID 3420 wrote to memory of 1656 3420 5312.exe PID 3420 wrote to memory of 760 3420 5A95.exe PID 3420 wrote to memory of 760 3420 5A95.exe PID 3420 wrote to memory of 760 3420 5A95.exe PID 760 wrote to memory of 804 760 5A95.exe powershell.exe PID 760 wrote to memory of 804 760 5A95.exe powershell.exe PID 760 wrote to memory of 804 760 5A95.exe powershell.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 760 wrote to memory of 2592 760 5A95.exe calc.exe PID 4328 wrote to memory of 1768 4328 RegAsm.exe qemu-ga.exe PID 4328 wrote to memory of 1768 4328 RegAsm.exe qemu-ga.exe PID 3752 wrote to memory of 2288 3752 jsc.exe filename.exe PID 3752 wrote to memory of 2288 3752 jsc.exe filename.exe PID 4964 wrote to memory of 3780 4964 cmd.exe wusa.exe PID 4964 wrote to memory of 3780 4964 cmd.exe wusa.exe PID 2348 wrote to memory of 1184 2348 explorgu.exe rdp1234.exe PID 2348 wrote to memory of 1184 2348 explorgu.exe rdp1234.exe PID 2348 wrote to memory of 1184 2348 explorgu.exe rdp1234.exe PID 1764 wrote to memory of 1936 1764 cmd.exe wusa.exe PID 1764 wrote to memory of 1936 1764 cmd.exe wusa.exe PID 1332 wrote to memory of 2592 1332 updater.exe conhost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
5A95.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5A95.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe"C:\Users\Admin\AppData\Local\Temp\b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DF06.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\FDAA.exeC:\Users\Admin\AppData\Local\Temp\FDAA.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\filename.exe"C:\Users\Admin\AppData\Local\Temp\filename.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2288 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:2416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:3780
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:4524
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:4900
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:760
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:3404
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:1996
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"4⤵
- Launches sc.exe
PID:856
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:2996
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:1616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\29AD.exeC:\Users\Admin\AppData\Local\Temp\29AD.exe1⤵
- Executes dropped EXE
PID:3872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2E80.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\34CB.exeC:\Users\Admin\AppData\Local\Temp\34CB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3304
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"3⤵
- Executes dropped EXE
PID:1768
-
-
-
C:\Users\Admin\AppData\Local\Temp\5312.exeC:\Users\Admin\AppData\Local\Temp\5312.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:1656
-
C:\Users\Admin\AppData\Local\Temp\5A95.exeC:\Users\Admin\AppData\Local\Temp\5A95.exe1⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:760 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\5A95.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\SYSWOW64\calc.exe"2⤵PID:2592
-
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:1888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1936
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2856
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:1564
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:1584
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:4144
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2592
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\1000342001\rdp1234.exe"C:\Users\Admin\AppData\Local\Temp\1000342001\rdp1234.exe"2⤵
- Executes dropped EXE
PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\1000345001\new.exe"C:\Users\Admin\AppData\Local\Temp\1000345001\new.exe"2⤵
- Executes dropped EXE
PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\1000348001\987123.exe"C:\Users\Admin\AppData\Local\Temp\1000348001\987123.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 4563⤵
- Program crash
PID:2892
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:3392 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Loads dropped DLL
PID:3692 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000352001\lolololoMRK123.exe"C:\Users\Admin\AppData\Local\Temp\1000352001\lolololoMRK123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 12044⤵
- Program crash
PID:1100
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4456
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Loads dropped DLL
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\1000351001\redline1234min.exe"C:\Users\Admin\AppData\Local\Temp\1000351001\redline1234min.exe"2⤵
- Executes dropped EXE
PID:4152 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"3⤵
- Launches sc.exe
PID:1788
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"3⤵
- Launches sc.exe
PID:4616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\1000351001\redline1234min.exe"3⤵PID:5032
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FLWCUERA"3⤵
- Launches sc.exe
PID:3612
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:1388
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000356001\Amadey.exe"C:\Users\Admin\AppData\Local\Temp\1000356001\Amadey.exe"2⤵
- Executes dropped EXE
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\1000353001\dayroc.exe"C:\Users\Admin\AppData\Local\Temp\1000353001\dayroc.exe"2⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\nine.exe"C:\Users\Admin\AppData\Local\Temp\nine.exe"3⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 4484⤵
- Program crash
PID:3644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000354001\for.exe"C:\Users\Admin\AppData\Local\Temp\1000354001\for.exe"2⤵
- Executes dropped EXE
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 220 -ip 2201⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1880 -ip 18801⤵PID:2092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1596 -ip 15961⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
3Modify Registry
4Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD56db28a72425aad28b2ab0227f974abb9
SHA186080f324b98f3d2f35e60e748c6f49df9f53571
SHA2569278b5f0370de855cd77413fa348198d1383906bd512831373cc30c302052e27
SHA512d08b295fb84e0177ee99dc35af47770a6ead16ac3f295cc77a6913695d9b665092e9bba9e1469b81befd403691666bd59116c9cc24a3e877cddee87869d135b3
-
Filesize
5.9MB
MD5ae4ead49655e1d18c5da7febe1fb88fb
SHA18bd6e768c408df3308b563caaefa49b42c9e30c1
SHA256fcecb9a5acd25767308f135a66155f1db428b2b70b0c5c25aa200abf40847089
SHA5126a7f9ec7f4902a4b357f3a0606bf34985595a2243bc6fbe319e2567a1e712465a26fcf2bf4a267169d56260cdc0ed1a08ecbd83014ef2f7b8a73b8198eec01b0
-
Filesize
52KB
MD5ebd8f90406c4820902162e3156b1ecb4
SHA1f909f010552a1471b7a2417d3a954d92dcf44833
SHA256414b2bf1e0c76689465539ace0fce226ce6ef8619db64799b2b5c60f78b3cb4b
SHA5127bfe96a23a31e9d089dbf8e945c9f562aed86377bf22da17f0fd6760d99edb4c85b8cbe5d3eedb31619da90f78382738141b4615a1d6519c0085c6ea5396eb98
-
Filesize
18KB
MD51603885d4019d1c16d658477cf6cb705
SHA158ba542b4dbb1207dd216ae2855ada0b39f900cd
SHA2560d93565b70865eee660f6487e3f365b2fded63d3316eddfa503ae0caf2ffb0b4
SHA512de2174621da682219a8dee8e285183f6acb9529ea0aad6da905618df76f9b93d5c734b5bcfa7c5ec6e060a5814eab023c666ac5d16d20ac24711611db1cdf55c
-
Filesize
256KB
MD54a34f44a83fd7bf93a2e1028322d2c33
SHA1e6bbb2754124632b4d7786feda9be6c02bf801e5
SHA25656946eb6c17ec4ef7eef9bf709b0068f4038a5f932bf1cc1bab2fda0e3eedc2f
SHA512d47f549294e67df5246d6a8b39d4e891d83abf28e90674d8f3f0465bbcedf6284404d8d6ee11719a58ddf7fb0e50f187a45fd7fc7030c416317132ffea55c216
-
Filesize
313KB
MD55275388736eab08ff9dd1bc294293888
SHA1ccacd0707c9f7f6a4640e160837fb31dc80d1b4d
SHA256399157d897d300ca1a761f7130a082fa0ed414f195a47d87b290c66c3c046164
SHA5126ce7825d4d8dfd6a981ba24822bfa6583075f0d6ce0892818670204f63765b8cefdb4a5647c50a50cdc990e0207349f6a6c12e4d8c58e17fc63107a2ec62df46
-
Filesize
313KB
MD5f7df4f6867414bb68132b8815f010e4a
SHA1ff3b43447568de645671afb2214b26901ad7a4fc
SHA2562c9490406c7ea631dddcd60f862445faef37c036651636e4bf5e6fe0837c4b42
SHA5120ad9b1544c25ae7814fe1ecdb1cfd466fd14603a6d55749e63ce6b90926ad239f134aef1bcaa0910b79235b8a3873ad11698e17dbd0cfee92fb909f4daf0412e
-
Filesize
259KB
MD5e26913404749c554b79a30e7ce21bc07
SHA13e377b1e6169929fb2580dbdedbc8e438e1982f8
SHA2565b409b4f077ff10e89c346a8430eeefed204dc3be9f5873cf7e96e2c261b4e56
SHA512599efc2bbefd71973df50f3eba11d8af4ef9f935dda8b780a843f999c04d303ecada23b692392ac54b38246826bc48d7151da52742f5d86020669f12043f5373
-
Filesize
1.9MB
MD530a6e6f5f566cc53c4a1a13a4a53d10f
SHA1c04381a0ad9e2961c1d59bfdff8f336bb625de1d
SHA2567e7820c44d1d0874657a09ff4a0780de1fb39a5695aae416f0f3aba1cac72b6d
SHA512d405ea734fa0d427736319657219f829ff4e329321ee0b43c9d9a9229d5aab923e7d8cffc39e9da08a42920e213bb9913797a223390d355914c051e2c488dba6
-
Filesize
832KB
MD5774510bcff294f80e47a210a19483749
SHA10de009eca6fe604d132b052a424479b76ca72448
SHA256207e61d940900c1a17cc112b66072482aa0f11d4933f0387bf9d9b8f6487f955
SHA512076c64b82bf55e174f2283829292f5a21c072f57fa107900f9f013f82e94c833264e4cfe5a83d81830162d054b35c21f67778dcf25f7fadd6168d70b0b511741
-
Filesize
698KB
MD5bf2a3e48b0ea897e1cb01f8e2d37a995
SHA14e7cd01f8126099d550e126ff1c44b9f60f79b70
SHA256207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3
SHA51278769b0130eed100e2bb1d0794f371b0fa1286d0c644337bc2d9bbe24f6467fd89aa8acf92ac719cc3c045d57097665fe8f3f567f2d4297a7ee7968bbab58b91
-
Filesize
1.1MB
MD50dbe60b960cb82126c9de613b492995e
SHA1c25f2d7ff45b1fedce9d415f27f686fee5c4f74b
SHA25697b011dbe6df95547690cf9ec362667bcfdb5bd4270a45d1fded8f2f53b5a063
SHA5124785c6010d145ea2d4661d6ce3335273873758333095c0ea71a3d99a27bb698f16dc148842a03dda1638cc04f1e1d1b1b381f6e47b496db02e26e789aa100f7f
-
Filesize
576KB
MD582015b3dd714a746f75118030a72fca8
SHA112f0c180919502e54f72415b21aece9490acd553
SHA2568468466e4b0e30f22bc97415dff2e568a663d28f37c4066fc50b32894383636b
SHA512d6e0b968254912881227d274b378aa51d06334b28daa1676bdadfbe26a840fb22cbd6293faab24b2cca694251f8b7223820367027a132bd4b00c38019b7e9ebb
-
Filesize
448KB
MD5e93c6697448789944529cfbd991b7652
SHA11c5229b820c6b0be0cb46d1a98b8d3746d0820b0
SHA2567bbeb235fef221be83e0fa4a91a769d2b887530124fe48069fc4cefab5dab1bf
SHA512c4a75b1d3fdae2798831624f22f4b1fde9ce07c411e3d3dff8046450364d2817c4d55a1158656400d4566300f2ab588028e856c59526fad7d793a63a0e0e12c9
-
Filesize
1.1MB
MD585c0cb6d016a43fd0469e65a87a65cd1
SHA1e5a8db7e2511a9595de4527f033a2937d35fa353
SHA256bba117e10d09311d2283f1ec4317ed215d4cb96b23f30127681ba20ac3f31b84
SHA512bda0c0d361846d4764238f2d9a59e93fda2189ea8a8baa9ab861ecf7d155cbeec56dbf549b5cbbb3f300122ab290ba6d7117997ed37a605436aff5d7e58829c7
-
Filesize
704KB
MD5142ebf77a7daa4e25a00e48158a59552
SHA11ec566431e9a1443c1857111fa3a9d4bdc009baa
SHA2569eec3a8fec4616f21747bcfe3f7e6ca0ee0f37758ffe594aa351d11942fd6e67
SHA512be882bff27700cbfa923200f8664f7270998f1346b8de04498b2ff1171e27c5ddb7fb79e894719a42278158bfbcde5e82b4eeece49dc3e5265d7818b8a973e1c
-
Filesize
1.6MB
MD58c281571c5fdaf40aa847d90e5a81075
SHA1041fa6e79e9027350c1f241375687de7f8cba367
SHA2560182e73c39240c0e660bbdd4262209f08d767562d4794b7ed5e36a4d4f36b409
SHA512b0e481681b02e4cc4f95deff2fa21354f94ad34e6611d97de3a127ae285038164df724f3db27bbf03caa217c3d8dabf77bfdadeaf9af8a1915edacbd35c1c862
-
Filesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
Filesize
6.3MB
MD5b1e8d4d7dd26612c17eccbf66b280e7c
SHA197dd5e81a4014fb54ef5ac3f1db88519843c85c2
SHA256e3940372b04a4cb2177ae409c195debccfe004600d73a39d429a577d248d4cb2
SHA512ff70dd3103128cd36bd1da3a734e635ec76d53a5629fc1f05941d6cadb9e82310da0ea298dcf449ef17c42a70ea7d787a75585ffa37a74f9007ca91a4481ecc8
-
Filesize
535KB
MD5c85359e6fcc2b3aad2407a8769d8d1f1
SHA177adb2c84465aeef9ef0f8ddb12b0165610b57da
SHA2568934e11fa9c967fe8e67d9fc1c1f518f18c107b6abc91b143e03e5b18f892782
SHA5122f3c97978972293ca5a17838d173ad4554731edcc12e848bc27063a13ed5ca9bf0b8483f247891cf97be83e531ddab011d3c2b8156c92da8ec56a1a0b4c033a3
-
Filesize
1.8MB
MD501cc26ecbfdeebceb71a8164da05fef3
SHA12bcadbcc1329fde8d7eb7b4ddee33a9690715b0a
SHA256b8c3dd017ddb8ea416e886acf134b17e91c44b8ccc1eec03f760bb4b328ab00f
SHA512006da3cbcca6bebfa82bb6d6d046e1a9a9a5bf8346bbc5ce30c1eb8b8249b930f9aaf8bbf92058183529e31827a8504f8f6b3710c0bb3e6a8a02b888e6766bb1
-
Filesize
63KB
MD5cbfbeaf0a6e70056f43406053cd61f1e
SHA1b7088a9f29b8ab84aedaffec81441580775d5393
SHA256fa776a4e5e0653f7856a19c3a9fbdad306eb9365cb553bc223d8075be5f5cd3b
SHA5122930b11123191108d66e1bba5cb43f34ca963c424f6dd9c61751db62cef3039773dd100c179909d30099953513ca6eb07e29732af7928d2602c35a8020271c5c
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
2.4MB
MD57ea4ead4fc9c5c7a9f3309cab716a28f
SHA1b5457c2c7529585e02dac132b5adeed3a4f1f260
SHA256431452b0cb6b0ee3d623c3394b120b104e24826585530708942690eeba34055a
SHA512f6ca00aa0331da628514f982a4627c338c1c9f29a70146c7324e9212f73487a1a146a93f438be93f13cf08574da73769bdfefdbb02b689ffa6d8fc98a6993d1b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7.9MB
MD5c7360f031893f764c09c12d1a93bb6b3
SHA1ed7645fce92872be3668dd38da104ec0c5648213
SHA2563c1b63ce143c1979f3d963fd3ed0d838bc231c1d2fcb02a965c7230ef94dc899
SHA5126924d9f34c317bd45008446bef35a4ef9da1f985cc213ad32d29d5f1dceaef0b3f73b07eec6d489e561711ff6cbb7e99ea110d345d89f571ad3ca4852381f413
-
Filesize
7.9MB
MD52761e9ab32da9b30a51245fd1b834acf
SHA1a2f9eac56e43635fc3c8f26e4ea5f2ea8d70bcfc
SHA2565ee91e1319962f87ec141dcee055d6da4d9394605aa455105163f4e55087263e
SHA512886383a465a9fdfa840a1e4f40573b14ff19b1a8692e4fab5e3de9196067ecceb03a65e9a08b5707d14effa750f15dff7ea8ea76a29359bbc6f8e898711014aa
-
Filesize
257KB
MD59377b2d9cf30cdb95938581d2f443d0c
SHA15b2d23dea7d5f7deded14b1f33e08260b9c25878
SHA2561b045d664cd5ce2bf315bffef85f0b4be363bd6d146533e3c3624257122330e9
SHA5124278f05d7da33465332fe62b8a9f1e01717f99a3b7e8f7769ec62947b9aca924228575087a035bcc064f816e4b58ff28bc7ba0cc84545ebbe8cc0d69b7ca7f0e
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
64KB
MD5a21ba51320e246460cd10fd9d940ca1f
SHA1253437834f3537debd72664218c2bb077f07b3a8
SHA25685f872e7dc95829e4fb98c1932b1f704124ab476278e2c665978859236209a98
SHA51202cc643f962517da3694e2e523eb7a552b18fcad9865cafa64ac6de6af55cf14cacc75d35caca5539a0405a4ca23cde662c56fa990e5b7adf096355a788025bb
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
Filesize
3KB
MD52d29fd3ae57f422e2b2121141dc82253
SHA1c2464c857779c0ab4f5e766f5028fcc651a6c6b7
SHA25680a60d7ec533d820de20bcedeb41319e7b1def548b6ea73ddbd69455bac4e7a4
SHA512077a5c554663be7b71f181d961f5c98c732bc296dc015ffee30768a648bee3aad62c39c352cf2947432be19519906aeac7dfaf2557d309bb460732abb7fdbc68