Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe
Resource
win10-20240221-en
General
-
Target
2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe
-
Size
223KB
-
MD5
8668ee0ab6ea0e939b90f438b8bf52dc
-
SHA1
6987b695c4b5cac1e2cd891804974f46e8d043ea
-
SHA256
2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397
-
SHA512
432e2a1727954716b8b61b6a52c43ad9f6e3b87254b44158a319178bb683646e31650921d1a7257d7d64be36db55996de6e05e58fcbdb4ad892a703a041291f7
-
SSDEEP
3072:H/W6TRmXBVTfiIIiOJqGGFDJ/qpATXs3dBvTbML1P4kAu8TMGIn:H/WOwVOcOJqGE/CATSdNAL1ZAuwnS
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
redline
@OLEH_PSP
185.172.128.33:8970
Extracted
lumma
https://relevantvoicelesskw.shop/api
https://asleepfulltytarrtw.shop/api
https://resergvearyinitiani.shop/api
Signatures
-
Detect ZGRat V1 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1252-489-0x000002C805CD0000-0x000002C8095A2000-memory.dmp family_zgrat_v1 behavioral2/memory/1252-496-0x000002C823D20000-0x000002C823E2E000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 -
Glupteba payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1080-78-0x0000000002F00000-0x00000000037EB000-memory.dmp family_glupteba behavioral2/memory/1080-289-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1080-401-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1080-454-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1080-461-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1080-723-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
explorgu.exerandom.exeexplorha.exe6c16cf44c9.exeexplorha.exeexplorha.exe19B1.exeamadka.exeexplorha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6c16cf44c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19B1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 68 1452 rundll32.exe 84 5524 rundll32.exe 95 5164 rundll32.exe 99 6084 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 5500 netsh.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
19B1.exe6c16cf44c9.exeexplorha.exeexplorha.exeexplorha.exeexplorgu.exeamadka.exeexplorha.exerandom.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19B1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6c16cf44c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19B1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6c16cf44c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe -
Deletes itself 1 IoCs
Processes:
pid process 3400 -
Executes dropped EXE 46 IoCs
Processes:
D31F.exeF8E9.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeEasyAppns.exeapril.exeapril.tmpEasyApp.exe676.exeu1wg.0.exe19B1.exeu1wg.1.exe611B.exe7272.exeexplorgu.exeGIEHJKEBAA.exeosminog.exegoldprimeldlldf.exerandom.exeamadka.exefullwork.exeexplorha.exeTeamFour.exeexplorgu.exe6c16cf44c9.exealex1234.exepropro.exeTraffic.exeexplorha.exe987123.exe288c47bbc1871b439df19ff4df68f076.exeISetup3.exeyoffens_crypted_EASY.exeu3v0.0.exelumma2.exeu3v0.1.exeexplorha.execsrss.exeinjector.exewindefender.exewindefender.exeexplorha.exeblue2_A1.exeexplorha.exeTypeId.exewzhtdvvb.exepid process 2340 D31F.exe 4656 F8E9.exe 2464 InstallSetup_four.exe 1080 288c47bbc1871b439df19ff4df68f076.exe 704 EasyAppns.exe 4580 april.exe 5116 april.tmp 1020 EasyApp.exe 3044 676.exe 4940 u1wg.0.exe 5048 19B1.exe 2336 u1wg.1.exe 2340 611B.exe 1596 7272.exe 4988 explorgu.exe 1652 GIEHJKEBAA.exe 3848 osminog.exe 3892 goldprimeldlldf.exe 2296 random.exe 4256 amadka.exe 4348 fullwork.exe 4704 explorha.exe 4104 TeamFour.exe 4420 explorgu.exe 4228 6c16cf44c9.exe 5228 alex1234.exe 5744 propro.exe 5764 Traffic.exe 5360 explorha.exe 6096 987123.exe 5384 288c47bbc1871b439df19ff4df68f076.exe 5004 ISetup3.exe 5092 yoffens_crypted_EASY.exe 1860 u3v0.0.exe 6136 lumma2.exe 6028 u3v0.1.exe 5276 explorha.exe 5768 csrss.exe 5724 injector.exe 5164 windefender.exe 5004 windefender.exe 5152 explorha.exe 1196 blue2_A1.exe 5892 explorha.exe 4256 TypeId.exe 2460 wzhtdvvb.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explorgu.exerandom.exeexplorha.exeexplorha.exe19B1.exeamadka.exeexplorha.exe6c16cf44c9.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine 19B1.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine 6c16cf44c9.exe Key opened \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Wine explorha.exe -
Loads dropped DLL 12 IoCs
Processes:
regsvr32.exeapril.tmpu1wg.0.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exeyoffens_crypted_EASY.exepid process 1604 regsvr32.exe 5116 april.tmp 4940 u1wg.0.exe 4940 u1wg.0.exe 2460 rundll32.exe 1452 rundll32.exe 5524 rundll32.exe 5480 rundll32.exe 5164 rundll32.exe 6084 rundll32.exe 5092 yoffens_crypted_EASY.exe 5092 yoffens_crypted_EASY.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.execsrss.exeGIEHJKEBAA.exeexplorgu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\GIEHJKEBAA.exe" GIEHJKEBAA.exe Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000873001\\random.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1104443672-3570440473-4052989528-1000\Software\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000875001\\amadka.exe" explorgu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
7272.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 7272.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
19B1.exeexplorgu.exeamadka.exeexplorha.exeexplorha.exeexplorha.exeexplorha.exepid process 5048 19B1.exe 4988 explorgu.exe 4256 amadka.exe 4704 explorha.exe 5276 explorha.exe 5152 explorha.exe 5892 explorha.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
goldprimeldlldf.exe611B.exefullwork.exeexplorgu.exealex1234.exeexplorha.exeosminog.exelumma2.exedescription pid process target process PID 3892 set thread context of 4628 3892 goldprimeldlldf.exe RegAsm.exe PID 2340 set thread context of 2836 2340 611B.exe choice.exe PID 4348 set thread context of 212 4348 fullwork.exe RegAsm.exe PID 4988 set thread context of 4420 4988 explorgu.exe explorgu.exe PID 5228 set thread context of 5420 5228 alex1234.exe RegAsm.exe PID 4704 set thread context of 5360 4704 explorha.exe explorha.exe PID 3848 set thread context of 4548 3848 osminog.exe RegAsm.exe PID 6136 set thread context of 1672 6136 lumma2.exe RegAsm.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 6 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.execsrss.exe19B1.exeamadka.exedescription ioc process File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorgu.job 19B1.exe File created C:\Windows\Tasks\explorha.job amadka.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1408 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2276 3044 WerFault.exe 676.exe 4648 1020 WerFault.exe EasyApp.exe 3284 3044 WerFault.exe 676.exe 4388 212 WerFault.exe RegAsm.exe 3076 212 WerFault.exe RegAsm.exe 3024 4548 WerFault.exe RegAsm.exe 1088 5092 WerFault.exe yoffens_crypted_EASY.exe -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
D31F.exe987123.exe2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exeu3v0.1.exeu1wg.1.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D31F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3v0.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3v0.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D31F.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3v0.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D31F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1wg.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1wg.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1wg.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u1wg.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1wg.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1wg.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5760 schtasks.exe 3392 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
windefender.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exepowershell.exenetsh.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe -
Processes:
propro.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 propro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 propro.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exepid process 2164 2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe 2164 2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 3400 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3400 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exeD31F.exe987123.exepid process 2164 2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe 2340 D31F.exe 6096 987123.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeGIEHJKEBAA.exeosminog.exedescription pid process Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeDebugPrivilege 3952 powershell.exe Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeDebugPrivilege 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 Token: SeDebugPrivilege 1652 GIEHJKEBAA.exe Token: SeDebugPrivilege 3848 osminog.exe Token: SeShutdownPrivilege 3400 Token: SeCreatePagefilePrivilege 3400 -
Suspicious use of FindShellTrayWindow 15 IoCs
Processes:
u1wg.1.exeamadka.exeu3v0.1.exepid process 2336 u1wg.1.exe 2336 u1wg.1.exe 2336 u1wg.1.exe 2336 u1wg.1.exe 2336 u1wg.1.exe 2336 u1wg.1.exe 2336 u1wg.1.exe 4256 amadka.exe 6028 u3v0.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe -
Suspicious use of SendNotifyMessage 14 IoCs
Processes:
u1wg.1.exeu3v0.1.exepid process 2336 u1wg.1.exe 2336 u1wg.1.exe 2336 u1wg.1.exe 2336 u1wg.1.exe 2336 u1wg.1.exe 2336 u1wg.1.exe 2336 u1wg.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe 6028 u3v0.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeF8E9.exeapril.exeEasyAppns.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exeu1wg.1.exeu1wg.0.execmd.exeGIEHJKEBAA.exeexplorgu.exedescription pid process target process PID 3400 wrote to memory of 2340 3400 D31F.exe PID 3400 wrote to memory of 2340 3400 D31F.exe PID 3400 wrote to memory of 2340 3400 D31F.exe PID 3400 wrote to memory of 1408 3400 regsvr32.exe PID 3400 wrote to memory of 1408 3400 regsvr32.exe PID 1408 wrote to memory of 1604 1408 regsvr32.exe regsvr32.exe PID 1408 wrote to memory of 1604 1408 regsvr32.exe regsvr32.exe PID 1408 wrote to memory of 1604 1408 regsvr32.exe regsvr32.exe PID 3400 wrote to memory of 4656 3400 F8E9.exe PID 3400 wrote to memory of 4656 3400 F8E9.exe PID 3400 wrote to memory of 4656 3400 F8E9.exe PID 4656 wrote to memory of 2464 4656 F8E9.exe InstallSetup_four.exe PID 4656 wrote to memory of 2464 4656 F8E9.exe InstallSetup_four.exe PID 4656 wrote to memory of 2464 4656 F8E9.exe InstallSetup_four.exe PID 4656 wrote to memory of 1080 4656 F8E9.exe 288c47bbc1871b439df19ff4df68f076.exe PID 4656 wrote to memory of 1080 4656 F8E9.exe 288c47bbc1871b439df19ff4df68f076.exe PID 4656 wrote to memory of 1080 4656 F8E9.exe 288c47bbc1871b439df19ff4df68f076.exe PID 4656 wrote to memory of 704 4656 F8E9.exe EasyAppns.exe PID 4656 wrote to memory of 704 4656 F8E9.exe EasyAppns.exe PID 4656 wrote to memory of 704 4656 F8E9.exe EasyAppns.exe PID 4656 wrote to memory of 4580 4656 F8E9.exe april.exe PID 4656 wrote to memory of 4580 4656 F8E9.exe april.exe PID 4656 wrote to memory of 4580 4656 F8E9.exe april.exe PID 4580 wrote to memory of 5116 4580 april.exe april.tmp PID 4580 wrote to memory of 5116 4580 april.exe april.tmp PID 4580 wrote to memory of 5116 4580 april.exe april.tmp PID 704 wrote to memory of 1020 704 EasyAppns.exe EasyApp.exe PID 704 wrote to memory of 1020 704 EasyAppns.exe EasyApp.exe PID 704 wrote to memory of 1020 704 EasyAppns.exe EasyApp.exe PID 3400 wrote to memory of 3044 3400 676.exe PID 3400 wrote to memory of 3044 3400 676.exe PID 3400 wrote to memory of 3044 3400 676.exe PID 2464 wrote to memory of 4940 2464 InstallSetup_four.exe u1wg.0.exe PID 2464 wrote to memory of 4940 2464 InstallSetup_four.exe u1wg.0.exe PID 2464 wrote to memory of 4940 2464 InstallSetup_four.exe u1wg.0.exe PID 2464 wrote to memory of 2336 2464 InstallSetup_four.exe u1wg.1.exe PID 2464 wrote to memory of 2336 2464 InstallSetup_four.exe u1wg.1.exe PID 2464 wrote to memory of 2336 2464 InstallSetup_four.exe u1wg.1.exe PID 3400 wrote to memory of 5048 3400 19B1.exe PID 3400 wrote to memory of 5048 3400 19B1.exe PID 3400 wrote to memory of 5048 3400 19B1.exe PID 1080 wrote to memory of 3952 1080 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1080 wrote to memory of 3952 1080 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 1080 wrote to memory of 3952 1080 288c47bbc1871b439df19ff4df68f076.exe powershell.exe PID 2336 wrote to memory of 1252 2336 u1wg.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 2336 wrote to memory of 1252 2336 u1wg.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 3400 wrote to memory of 2340 3400 611B.exe PID 3400 wrote to memory of 2340 3400 611B.exe PID 3400 wrote to memory of 1596 3400 7272.exe PID 3400 wrote to memory of 1596 3400 7272.exe PID 3400 wrote to memory of 1596 3400 7272.exe PID 4940 wrote to memory of 4712 4940 u1wg.0.exe cmd.exe PID 4940 wrote to memory of 4712 4940 u1wg.0.exe cmd.exe PID 4940 wrote to memory of 4712 4940 u1wg.0.exe cmd.exe PID 4712 wrote to memory of 1652 4712 cmd.exe GIEHJKEBAA.exe PID 4712 wrote to memory of 1652 4712 cmd.exe GIEHJKEBAA.exe PID 4712 wrote to memory of 1652 4712 cmd.exe GIEHJKEBAA.exe PID 1652 wrote to memory of 960 1652 GIEHJKEBAA.exe cmd.exe PID 1652 wrote to memory of 960 1652 GIEHJKEBAA.exe cmd.exe PID 1652 wrote to memory of 960 1652 GIEHJKEBAA.exe cmd.exe PID 4988 wrote to memory of 3848 4988 explorgu.exe osminog.exe PID 4988 wrote to memory of 3848 4988 explorgu.exe osminog.exe PID 4988 wrote to memory of 3848 4988 explorgu.exe osminog.exe PID 4988 wrote to memory of 3892 4988 explorgu.exe goldprimeldlldf.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe"C:\Users\Admin\AppData\Local\Temp\2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2164
-
C:\Users\Admin\AppData\Local\Temp\D31F.exeC:\Users\Admin\AppData\Local\Temp\D31F.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2340
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\DB9C.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\DB9C.dll2⤵
- Loads dropped DLL
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\F8E9.exeC:\Users\Admin\AppData\Local\Temp\F8E9.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\u1wg.0.exe"C:\Users\Admin\AppData\Local\Temp\u1wg.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\GIEHJKEBAA.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\GIEHJKEBAA.exe"C:\Users\Admin\AppData\Local\Temp\GIEHJKEBAA.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\GIEHJKEBAA.exe6⤵PID:960
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:780
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1wg.1.exe"C:\Users\Admin\AppData\Local\Temp\u1wg.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:5384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6004
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:5648
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:5500
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:204
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5984
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:5768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5248
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:5760
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:5320
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5900
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:5724
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3392
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:5164 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:2668
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:1408
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Public\Music\EasyApp.exe"C:\Users\Public\Music\EasyApp.exe"3⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 5724⤵
- Program crash
PID:4648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\is-OD8B1.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-OD8B1.tmp\april.tmp" /SL5="$2027C,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5116
-
-
-
C:\Users\Admin\AppData\Local\Temp\676.exeC:\Users\Admin\AppData\Local\Temp\676.exe1⤵
- Executes dropped EXE
PID:3044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 9882⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 9882⤵
- Program crash
PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\19B1.exeC:\Users\Admin\AppData\Local\Temp\19B1.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:5048
-
C:\Users\Admin\AppData\Local\Temp\611B.exeC:\Users\Admin\AppData\Local\Temp\611B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2340 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\7272.exeC:\Users\Admin\AppData\Local\Temp\7272.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1596
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 11884⤵
- Program crash
PID:3024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4628
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\1000022001\6c16cf44c9.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\6c16cf44c9.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵
- Executes dropped EXE
PID:5360
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Loads dropped DLL
PID:5480 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5164 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:5668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\104443672357_Desktop.zip' -CompressionLevel Optimal6⤵PID:5504
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:6084
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:2460 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1452 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:2764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\104443672357_Desktop.zip' -CompressionLevel Optimal4⤵PID:2400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 11364⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 11604⤵
- Program crash
PID:4388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"2⤵
- Executes dropped EXE
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵
- Executes dropped EXE
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5420
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:5744
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
PID:5764
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:344
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:2836
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5524
-
-
C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6096
-
-
C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"2⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\u3v0.0.exe"C:\Users\Admin\AppData\Local\Temp\u3v0.0.exe"3⤵
- Executes dropped EXE
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\u3v0.1.exe"C:\Users\Admin\AppData\Local\Temp\u3v0.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6028
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 7163⤵
- Program crash
PID:1088
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1672
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe"C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe"2⤵
- Executes dropped EXE
PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5276
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5004
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5152
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5892
-
C:\Users\Admin\AppData\Local\CanReuseTransform\auwdz\TypeId.exeC:\Users\Admin\AppData\Local\CanReuseTransform\auwdz\TypeId.exe1⤵
- Executes dropped EXE
PID:4256
-
C:\Users\Admin\AppData\Local\Temp\wzhtdvvb.exeC:\Users\Admin\AppData\Local\Temp\wzhtdvvb.exe1⤵
- Executes dropped EXE
PID:2460
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
576KB
MD5d59c557dbf26c0d10b81c8ed2a83919b
SHA1a4b24205b2f6b775453d42934bfddb3ec0325cef
SHA256947b04110fc584fc7cf02f993cdef8509dd617dd648ec51deec2a97be6ea1a18
SHA5128a2a89a45058fdebede4649843b547721b22eb733ddbfe9dc55b57e2d3d64c444d613fe724bb54199aef11c3be5640e92bf55d696f0f95054dafd2d7022820ed
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
159KB
MD54ef18bf40c798f0a33590e2c5a871773
SHA1ec661bc80319f5008c340f4870593b8aa2fd1aca
SHA2565828481040b91f44f6b228d41de879303bd28bbab8c5f9bf2f2c77c409bea7e7
SHA512a0628dd49e5d1ee8a4d5914ff374ca0fab6632ee29b5cd41efdbdb6396a2ff8304acc46c59abd53bd0e281e939bfab80017cca619f2b5d2abb77f094a5af4518
-
Filesize
45KB
MD50b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
Filesize
192KB
MD5604e8136547e1620dbf8c66dc50eae04
SHA1844ecc1376e576bc6c640834d4474695523b79e5
SHA25676ee16a5524b77d56b19894763c3da3ecfc413cc807ddca0f43412daac898564
SHA51261817482a11c395e875e3fc313b19432175d10af5f3da94fb775cbde27ae9aa282a458a53aa73bacc4b214455a45b767cb2ceca6db6ebbb34ea8099079e6fcc9
-
Filesize
1.1MB
MD5f67ac43d4273652b1a13268352666284
SHA1d78d40ffad9d848a322796b846b08e70c09491d4
SHA256ca41e77214da1af66a0775aab00f45000e5448eed2e58730c7d3f34b2409b645
SHA51216f29e8ccb7f152341bc884194cd660ae9db125ef6a9a9f0faec1902cef51a53372266946a149454ecbda1a8967e32a99a975c4e1625ffa2c0f4909aac7009c2
-
Filesize
384KB
MD51b5cc0ba6aef6e126317181a84e83f54
SHA1205afa92fb9925e31e9687c40ededbe6a79028d2
SHA256424b6e97152144ae00cc2cc5d99afb4506e01cc94a1fae13d9183aca1f4edf6a
SHA512c91739daf73be847c86218420bdaf7b5921c6637b5ed7680a65531d5a3e639dca5f8bb82913c08c737f97c2539e48b4e9afa60698ff4f31d63f2a8afb6af53b8
-
Filesize
753KB
MD532668fa6d3120698fac9b7e2710a9f28
SHA17f10dfb4ad4f795c0bb3804cc3dbfb4815fb93c6
SHA25668c74420b9d9e5a0e29630ccbb9abcb2908b4a13cd06fcc6a6eb128595222db4
SHA51263ab8c64059678b1e0639692faf9c9c7dc57540d529b7790da8488df9d3f93b6376c9e4e750e66d8b8b27e8ea69e61e42dce120f896278b2994356f004e168f3
-
Filesize
479KB
MD51de611bf3722eb849d0c1479dcc12b2b
SHA10feb296e3a49a0be101351058d1b2acb266e2aac
SHA2563ad665e39bfd2868e7d9272abdef967d76fe3a70dde0acea9c853fb7282a3c9f
SHA512441f0ab5c88f70f1a46ac063a927bb341b61da9b0c70f2fb05191a507e84df2479e4da15afabd47d938cee7e9bd0682e445c9b203f924ae7d89cb886152464d1
-
Filesize
1.1MB
MD5dda3fde0126666c0a99cca8d00cb5ed3
SHA1d8dc2c21a4028108e1630a08bad5a1ab2708e655
SHA256253e367385ea6e981bd51ff9906c6ce3fa1857c2c55bd35a9a33ede601e32d8c
SHA5122b2c2db5839080cd21f06f0ea93b21158ef0991f2f41f87eb94c61e0705b9b2a791004ee5af340e958726ea345d948a9f34fe414bd291a19823dc81034680884
-
Filesize
1.1MB
MD5c6e6412d059508b1edcd369cc260ac2a
SHA1709aef6453fca7b4bb3d2ec114297aa776c7ee3f
SHA256697d35e5db2691dd7a6686e16ec8b81c56f7d66aff9af0ae007ac093d1c60185
SHA5120529a2bffd978ca3190c07ce3e643dbfc493fe760789e248c1886f69d9e8a5be6b20e26ef646fbaf9a21c44b8498073787a24384d1053952f6210a6788ae65f2
-
Filesize
534KB
MD5a3f8b60a08da0f600cfce3bb600d5cb3
SHA1b00d7721767b717b3337b5c6dade4ebf2d56345e
SHA2560c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb
SHA51214f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d
-
Filesize
464KB
MD5c084d6f6ba40534fbfc5a64b21ef99ab
SHA10b4a17da83c0a8abbc8fab321931d5447b32b720
SHA256afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
SHA512a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
Filesize
128KB
MD5fb5258ebd7dff8b2260cfb91cc543dbf
SHA1bb49bfd25cb813886215aee47bd9dd93f60afad3
SHA25612e18747f7bc67fcd242dc4926f381369fb40e5d66623f9ec30c9f39b5712461
SHA512203d172c924b791a68f1fead652ce48b144a021cef11e8a0d6162c2f06042aef63f8fd0d7ca21c8337a27a225e72a64a392ef3cf819ddbc29165cd961d014046
-
Filesize
242KB
MD5eeca2261f078b18074f075bbfa876cc7
SHA1c6b8bd5cd803764edfc9a5f340b9b04a3ac0708b
SHA256a29df686f96f1c6a68b6768c6ec9c14f266afed67279b25e1cc5271cec263c6f
SHA51215c309ec16d56c6219ae9bd8297eb082f24127dbe3a87945083aaf26f055d60edad9239cf71e339ffae55927b266b84656b800ee9354221ebc631b7fa110174d
-
Filesize
2.5MB
MD5005e52bf609d20a29b3e19fce13a0628
SHA1f84a71173b82a99b252f56f801dbe8b8ba31d188
SHA2565271fe0541d6933df1e6ec3bca9abd35243189cbe9cfae215fb83d22931d2859
SHA512b5de3f40d90966d80f024a11f1dce8def9c0e2d19ee361b74aeb46a93f1910c7001e17100b29c299ac7683956b4dacf8bf8f00e7b79e1d83bd1bfe84bd57cf88
-
Filesize
2.8MB
MD5d33a8d333de7f3b0b356fa22c1a07f1e
SHA12683295cf82e97f44be0a4a051f6771ef2696512
SHA2566eccaf4fb54493431bcd55864c1fdae7722451bc3233ba7a5f6c1fbe7a5997c8
SHA5122df7363ed3e26bf1c3a3cb1f6c1413e42e0280079a5c7040ea0aa328396a8b59fe77dcae6a88bd9d63a7abeeef3842dba501c35e4b32f39d94a73bf8320ef1f7
-
Filesize
1.8MB
MD5444532fcd858195a7e6e08dc42d9b119
SHA1d6648434771b3072314ae6f170a771f0f1e9408d
SHA2563c0f5360b66ae1e40769081558167c5dbc9cd849998c1cc49d921a74acd610d1
SHA5124f39c26eba4edfa95129f11ab43e38d54a259955b353788d57e820986fbe5fddf84f5e43436e5e1a99bfdb75898aa2f977d77a48cd6bf6e153feb2cecc5f89b2
-
Filesize
1.1MB
MD5e18078fb1ff38f2201e52f7032c4c1c0
SHA11258d732dc4a403958c86de45c2506201d95aae5
SHA256e571d3ea825aa254593c8e58ddf7b0fa17f3382ce7c425ea7950cc48c01ac118
SHA512a5db272c1329d12f249efa25c552b3173005586eddead7972d50e05b7d2dde4be20c4028ca4882b8dc4fad0207d8d5eae81e8d8162f7064d78d662ce82b4e90a
-
Filesize
562KB
MD5ca429c8e95c57c58fdc7c9eba2f02e80
SHA1f3d9f7d4725e337ae52a5e7bd1a084406752b3be
SHA256223e905c8237cb7ffefd0ec90a7a0e15672d33c868ab2e3ee809fa8a361bae26
SHA51222d33aa00085d73d6e595fa7141a1c314c9decb0f4bee218d3ba128e6ddcf705522f689fc717c70c6e40593084e74453fe1c75b80d464c56bc620e7334ed05d6
-
Filesize
451KB
MD5b2b60c50903a73efffcb4e33ce49238f
SHA19b6f27fc410748ae1570978d7a6aba95a1041eea
SHA25629d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1
SHA5122c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126
-
Filesize
541KB
MD53b069f3dd741e4360f26cb27cb10320a
SHA16a9503aaf1e297f2696482ddf1bd4605a8710101
SHA256f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e
SHA512bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9
-
Filesize
376KB
MD53ec85769b25ca32f769f63e703c428ef
SHA10c5fc214df5ed2a9930b05eefaffc259ecf88ae7
SHA2565c3c27bf87664095db6961e3996c82b2a86f13fe37ab86fd3e09f1ce2a7d17dd
SHA512a24222c9dd1d5517cf5738cca6d6f31c41041900175d45ce622abd38551de80dfe29c9d74de72f1b1edbac9ae0bc44b0e1526c3d7c0a0abb68141ba3224964f8
-
Filesize
451KB
MD52bfb1ffd26850c5aec6d18055abcd8b2
SHA16d7ef34195923f361bc794fb39a2ef988e41a529
SHA256ed67cc57a863302377b6b1080945ee5a6654632c56d2eb3df1aaec938c40df64
SHA51257df46a617faba10e10a5ab1c24c5fdbfb775e7072f4487adfb008fb39d14f7b7c97e82e1f27a3467b92e566d5df93bcc248ffa006a3bbfcffa53b9101a76bdf
-
Filesize
291KB
MD52f6a49a393a2be8abd6c13b565aa904c
SHA183e6df44ee6616108aef90fae63dac7d3ab7bf66
SHA25643163bfb66274c5d62a8e74cb38db352fa6c3785972db324dbec01c386b67c03
SHA512cc0057d955a9566192dfadf83206c1ab01a4f66f5a8fbd604368a6c54de3635b949552ea0ec2b5f7bbf0db791c48aad33ffe9d2f34b6ac13281e2a4e48cc6dfe
-
Filesize
86KB
MD5b86383677e82c4955d17a846e56227fa
SHA1a453ae06ef52bde7f7ac0b69ddf158443a3a0c08
SHA25614fe5e6ec2176251a5b1ccbf4e9652b20e424675ec58a623dd43b0fa8941441a
SHA5125f1862b35b0c4334fb465f12e0298b9ec98e2e1a56c8d4d7bb55605eb8c62555ab2cb871c40302f74dbf3997a516da11316cefe4677d7aee47eef284821ca2b9
-
Filesize
1.2MB
MD541f247f810c975a374d172d92d424d4a
SHA1dba4089c8987353392337ba9c2fe0f2dbcbaeb44
SHA256cf56d3f0b75d908c2b72e08d437214fc9e5983fd0f3eecfddf8b2617318df81d
SHA512dcfb09b98d5ea0b17cafc82550a84c853b9424fe419cfb56f936e4e334a3d48263198a62f80240e85e8bdc6e034a0080d7240307f160ec94707bf67060bcf5bd
-
Filesize
231KB
MD57381ea960bed2021a7761d78049d038b
SHA19ab316797a88ddfe7d95a0e74801b5e1851ff640
SHA25639020badb933ada4d9889ed670aec8831b759047e245583029cabe1d309ea1ed
SHA51252cfe3fc7e104ae7d5057c47e4487402a8cbf152cbb19b2c36a0f2f935a421cf8f7a128d9a61d49ad200166a377f648db121f5a33517ebaeb2510251b690b27c
-
Filesize
410KB
MD5c2d63badae88b87da297268bf006b8a3
SHA1b7983a8b1d5d438a80e401f5bc073aff8701735c
SHA256db2589bbaa7edfece7d4bb233231b3cdeaa88ede4b1f34689adbfa35ca70de1d
SHA512f1b9bec97e887f6eb9819ad61f99013cf77ced5570a51276ca90406675f5ae1458235b079ad5eeaed67fbf5be5177cc12508abe6f32455465d23ea2943c5fa20
-
Filesize
832KB
MD5e3c0b0533534c6517afc94790d7b760c
SHA14de96db92debb740d007422089bed0bcddf0e974
SHA256198edf9613054f8a569ac804bf23081fbfa8566270fff05bba9dc3c9a32d9952
SHA512d12631796afca877c710b9308d1236fca1bfe3abe6582445d9df1bbb404160cff220316e3f600b3a87b46dd3bfb859734008b5c668e410466e82be9dc033249e
-
Filesize
322KB
MD53c30dbf2e7d57fdb7babdf49b87d8b31
SHA133e72f2e8e6b93a2ecffccba64650bda87e08e0d
SHA2568d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2
SHA512c48c83d1d9d459720bea88aa7fb56c13d886fff9ab65deb0ace750d7d35a7b61c66b5d697e506ec152534d788f1641c51bcba38610ae66a6a8e08b0dabdc7657
-
Filesize
5.3MB
MD5238f2215727c750702ae205d403277f9
SHA168e7db98bd5c017795f10bf5d3c53f893f72ef23
SHA256cc06820c0579d364d478bee63d0406ebb31448b20e16bc9456707016cfe18b39
SHA512859988b31d60020a517c49a3c64b4f95a5c8a4128ef0eeed773acf8d4ceb8790013f4113130fbeafe3ec4742d41ce8d462a28f3b26f09713448801a933d194e3
-
Filesize
1.8MB
MD5cf03bdc20ea3733b3b7504b8c2b80c0c
SHA1dc13cae80fe4c69c286ebd3c016d633a9e4ae5d3
SHA256065e12d31345139cd23fd62e9b51f87bf9e0b4b6f9e12487b4b0bc6af375e98b
SHA512b434905da512130b55b49e33ab6cdc3968400b6776461861512fb66a68f6e950c55dc18d7672f61e3091cd1fccd30b5a20578bd1d2e779e02c337bd83750d77c
-
Filesize
1.8MB
MD56e8e85b7aab625442b10b0d0399cf830
SHA1a8e58e102c4dc631f735b19e54bba5340e399137
SHA256f8eef98214b481e5523ffe9fafc0e7929e200c5226030bf802448ca77fe1f434
SHA512a877e3a72ff3be983e3236568b5e7960fc9c7de912c8fe88510a0a52e9af78f263f3e760adc31b6b17743ff040194e0c1969b3913a5b2bbdb1addab91d3b7f13
-
Filesize
704KB
MD5d8074728893bd2208cd1085c0c6e3d91
SHA1202457b027d45395af06921e66b11cf881a96622
SHA256eabf6065fb1fc7ac4567d642b00f2d908bb44462515a657071b5cb2f894fd602
SHA51230bc6b0f97186e677bde78f58c69fc8429acb0734cc39cd3af966ed86f4321a6b5f69c2c404852cd57bf397babc805d45d6a4feb90d0b259dc820f4376d1398b
-
Filesize
563KB
MD5cf4e6b309fbe283b1ffd523f11b35053
SHA1d9660ecda657855b77b555db3fa8ae3b67ef3a62
SHA25633eddf20f3cf6a0dcfa6476518db0d59002c36babdeb0a8ebe06b7acb3b38e33
SHA51276855bc0ce6f92a4c08889485b6be45fe3c4f8cb6079e3fe027a24c95336d9aefc5d1b2fc1cdde00a5bc19a80a126fc300dee6fb7edbacb996c30d41dba2d5ce
-
Filesize
325KB
MD58948a8fe0161df50cdf34d589d124032
SHA16723b3e7aa7d6145d8ba3552a765432844bb23b1
SHA2565b56758dbf7a9bf06f73e74b48b70e78831a30043d2ca359a1ad43cce5beac58
SHA512d04914c3a90b22e22c46f62085722f7e19639158faba15ad4fb70ffe25000291ac1f1850de8d71f4aafab30518f9eaac5fcea8de2645dd80439af1dde691abbd
-
Filesize
477KB
MD5bcf66c00e3200a96710c140f6f8c2d0d
SHA1db9209e4b023bf54ece02eb181aab447f44a5bdf
SHA256c3f99a96dec11bbf3e12a0573883595ae114b39b89cacee8a7dcc86bf1591b6b
SHA5120025b3ba37cc1935e14ad05c1066381e2dcdd325e52b3d83c59640054813e78c8be6c82ef85d2ff87d5562aff53682327a74026b2ba6082ba8e581135c80de52
-
Filesize
298KB
MD50dcb17f922d52917def80ccd20d4bfe9
SHA12faba75bf5321e6b475a3f9e296656b316f80ed5
SHA2561285a66b357d6827aa1c1b655fb0b41534d43b6526152337ca35eb5c9dde7c21
SHA512e690919eb3e6316204f8cdfb09cb2a0273ee7cefc07b24ba1861063d6b0a94d910fad78f5247776c324ea635d21e0f7a45f48fb3d86f5710171a546b9773b08f
-
Filesize
1.1MB
MD5679e0c9d77c16f8529e6a08486c3a9c1
SHA18e74ee4ac19b5653981a1d8378aeda9e6fc1b009
SHA256585e21bcd0f3c05c51f4aa74f554e0a648370facb8b90134680c2e49b5fc272e
SHA51254195de01cdbf53812f172931d66ff8ee510f78ac972737c71a57fbae1a3b8b7a295347bba81ff38fa0ab934eb4cb60c90e267acdd512ec1b9e90831db454acc
-
Filesize
232KB
MD5c8eac1d34e880b19859663677cf6f469
SHA14a20b4a61b2172f675e5047b2ce82cc1cc9e7150
SHA25647a23c0c61f2de27199085bde6f0d2f9b891e890d0e0ca9f7b37505ae7a0d69a
SHA512bb42f71f910dab8dfe9f5c769a078bc48bc4d93fb301ee820bdbe37dea1916ac7828671a8f5b356697f154a6e6174da9fdc8c248d1149088e2763a1ff3d7acd2
-
Filesize
2.2MB
MD5e69125300a060d1eb870d352de33e4c3
SHA160f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea
SHA256009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355
SHA512257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9
-
Filesize
988KB
MD5065760220981039db19b9701aaeffddf
SHA1318170b5ca3673cff578d89b7de116f9d6fcd961
SHA256cac5a59708cebec195aed03baf2c20b32b277ea73738d054ba40a072719160bf
SHA51281bb505365d1a10dd902f76b24ec111b519d17c0ede500b5c47d6eab9f187f95ac2897b09e7004762455a17cfb068a47c854fd9c29957e13832bb108a6385895
-
Filesize
293KB
MD54aac0897e56ef30c2d3c7bfc2a9dcd0d
SHA196614e2cbd21ac23c12a474fb0a71ea6a6d51b73
SHA2564a6b5184b5d4eea1cd1ff05a5f39867ba66e13f5164bd59ebc9b9d4a0561137c
SHA512f75faaf0b8b78504063cf6e46106e0f10919665d43c905b8447b837044f3c824675422a2aad166e6cb06cbd55d1da32e7b1318d4eee472d3d512b8703d0154ae
-
Filesize
704KB
MD53c14cfcc4c0b9ea67ff115f597f291c2
SHA1b43e12216f6ecebace94c04cad12e216a387a008
SHA256dc77dc05d3014248f84c4a2535a583b16fca493efc42e2cbe7808929372ed01e
SHA5120cabc9c689ab199f59fdbc8fb67fb7e6bd44b16ab16c2184583de86e32911a23ed6061df49af387af3a856cf3f01c59dc4b9c835b44485f42ea3ac8ae949a87b
-
Filesize
384KB
MD580d022da970a91b95bb1385e4516a188
SHA18d3209e22be06786bfd5f771a96498c3d72cae50
SHA256082ae5c3b7be2d5a6a6e084140750bf79331f9130686818f676d4b732fd44713
SHA51295d9cceeae01c79fbf60405f397f983413466bc42e116cb6974433d4ba76721c791d3a1928e97e91b46f4b96406a586ac037556df4032e2250fdf6466850cdd4
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
404KB
MD5383c48c7f64a6867db5b8577fa3abfbf
SHA1926911f9581df56f5ac38fac01f6d45acdfb7dbd
SHA2569b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9
SHA51253b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
704KB
MD5d7fff2b1c9dc7b49b5adb9a7f470a4ff
SHA138c4ba9d97761d7824a868ea31ee7136e2b835ed
SHA256351f2f212b54a3266eb0fee59702c86779d6e37eeef1a50cc85482c6d7587ca8
SHA5129e8d42b1880bab21b060343b7939228cf128e82c1240df564081f63e8b811e54e338eae529579542c07ba5b93284ed3aff48fad9777caefe16c10ea322f440d1
-
Filesize
473KB
MD541f9c135cd1dec75034a708470ce7868
SHA1c5a79718d497358fa2a34d9b227e547206c84c10
SHA256735b73ee97f29f3bbd9ca62490f8901e70de98172dd3963ef794c7dec80b867e
SHA512a37b0afabd306f68e708cc21ee92ed364e655e39a842d6b7f916d093aff8f0b4896fcf210f3f0f545840f295ab429a31ab2462a9960800c2ec19da7387ea1b31
-
Filesize
4KB
MD5dd2cf48cf5dec8f290bd795fa4c0b374
SHA1517474c84a51649fb32250fd6defa2a6b418aa3f
SHA2568d9db71a92cca9a73fccd7d171cb4aadbb51a89a72f96447f9847cc1852b68a4
SHA5121226d7e2267043ef039e11ec1811c9cafbef3da5141cfb6ea28e4f67bf55e44cd570e2143ce6a77aea2a49404674fcca930b5267a0211a18fac103ec56855e66
-
Filesize
2KB
MD5ea703acb7a3d12abd3d7fa2111cb356c
SHA174bcdc744b7e6fe77bc7c1d417151449556b6114
SHA25679b5c71395076e91c108a302c91abdf9e253a3079415f9f12d59841ad98a9ca3
SHA5125f618857b3b5228272fd60963dd1d5bfda6ebd943e3b4c50f50ded9ef4dcfa2e34d6bf6be7cb4513badcae55b099a4d727317239c8a25c44c3ecdc2a93e4ca05
-
Filesize
3KB
MD5f786ebc26f57c501ca7af6b0a6d4dfbf
SHA1ac2f0e933047ddde6da156741663e528c9e7ede9
SHA256dd2079bb5f39283f698e15c9476e73c2befc25fe45f309a26596a4d41bb5c636
SHA5123fd4067d44ae9cb3a9eb7ad4c0ea9c890df965f0ef33abd17b4359bc01f856331a481ca6f67cfbbadb9cb9a3c2c5b726e6996a01a274d9b8e3eda8608536de1f
-
Filesize
677KB
MD58519bfba2d14dbdca979e73c62ed4b46
SHA1388030278d4f7e4d88754adc3ff95df54e01eda9
SHA2566848c671e27c33dd065e1d70c9be0a4205ad69ec9b4b4b356d03eb8dc73ddeb5
SHA512a1bfd50e48a82f7b100de76674a082eb77ac385b7ccc5ba574f45b97e2e4a992541a992b979b266b9e6bd27eddec02f943b776ed0210d5b788954e15463921aa
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
64KB
MD599f32dec047491c545699798390fa2cc
SHA13588522d9b62cc04a0e91c845cb9955018380411
SHA256775096c7ecf1f725773f3a35151546795ef62a9afcc670b07601bef01c0be94b
SHA5124249f9cfa38278c8ea3d983e889870bda60ee01243ac2ed39807e0ed132bae1cff2f2a76ddf4406dfab4f67ac5590141096098f656c766f6d3f5e5c536908799
-
Filesize
261KB
MD5606625739201aa74813d211613b2aa82
SHA14409efa953358e31d940d698470bd0e2d952e8a7
SHA256848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2
SHA512d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1
-
Filesize
2.7MB
MD5fd8e2afba45d9b91dfd5fc4c05432558
SHA13e5a18713684fba318b890708825f86e2a8ce5db
SHA256dde972473c80c774488d74e0efcdfb5c14c29f9cc03f8fb620e808c3576626c7
SHA512b0135a7a300caee5059aa9c64f6a767ea676fbc7a7c5ce450973e896d483557a72d2b2e8ec320a2d16ddd9684007b6a138c87bc266d5d625e22f391d26066ef1
-
Filesize
192KB
MD5141b49056d1c6a3b8bc211ea5d001911
SHA1e07f7577241a86975ea7098316d7163ff04c138b
SHA256c519b483b6d7ef8f6f1ad81b513799a97fad546dc34e8995b76135cb9d75aa21
SHA5120092ba1983711cd0670675d6b022a7478dca519282f56888ff53b02d9c151e4a0c671d6244bd0ce5e77fc21c6f1e8f8d6d15126d69b3e4b8e2ee6870681bee0a
-
Filesize
1019KB
MD56c72b77b9bac38686a85b8dea949ce3c
SHA1dc3d7a1d310f7e6f2d676210da917fa2836384b8
SHA256a49691e24a0aa1c8069020e12f1cdc69e3906955142c9da71016616d51790ef5
SHA512f31d9777aec974a517905075e9bd03aceb9da2d6ee9b9e80fb30562bdbe46815dfd0471cb214f1db7ff6a19d2feb7fc3df0dc1f3a24839b095fcbe165febbffb
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
765KB
MD5f5f37d9d26740653466c41f2b01ab377
SHA1f4fb36f2e20486890ddf2a0f41fa0efec5c7e1ac
SHA2560422d6834860a2b4341a1ce607c0b5123966107140b29edcba69f3d24219b957
SHA5122e7256913f07f8cd6ee1cb2b33c02d99f33ef9248f2ff53e44c6be4c187c2a7bb0c9cc85475f53e34e8e4a19bf6f713a62e23426f0c505e3b6796b9f0e6d5faa
-
Filesize
407KB
MD5f9e0444ba6878e098c9f0cdd28e8a49b
SHA1d2ea876c3a21efd3c1a79e98b3f9fd7ce9c5298c
SHA25657706e78148ed07f644c4d1a2118e0f5a644c12f838810ac9abd3b36df8496c1
SHA5121cd69b5e59263724f14693332b11a967e89ef9feda9707888faaca5537f50db51f5e218deb4c83fe592c1b2b52e1d3fd6a412b26e563eed106ee1e31de3400e7
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
304KB
MD5cc90e3326d7b20a33f8037b9aab238e4
SHA1236d173a6ac462d85de4e866439634db3b9eeba3
SHA256bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7
SHA512b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521
-
Filesize
341KB
MD50e49e66fd0e90ac46ad9f027df419048
SHA1357559abc784e69245db2e4302c838913df618b2
SHA256599fbee1c0335d5f8efae7ed35eed9700001841005158a1c8c6648b53a6e4bda
SHA51238aa37d633795de8ad65749a11da261e9f3aa2e1f285cd95e89a895c76e28a7d1fb72e87776013e8b508b9201d1b7ce92462c85cb4e3d55d5cf9b5a802479fed
-
Filesize
4.1MB
MD5c8564b4d627953e836d0faab99740a6a
SHA174b37a34950bd081d10072b4dae88952a4c52178
SHA256051b0fe6b1d01ab0cc4dee0e7270b4dd54040a5c1783b78ea612bbf37d0c6f31
SHA51277af3dd58d16effa1a307c174add6cdd1006b2a08add287388162bb2b7b3245a77e15375da1e508bcce10f024ab0e888b16862f087941e7b165834e8ae406776
-
Filesize
384KB
MD5bc0d1292d9bc0f1bb471721695c178c2
SHA1039a7679de9769b4656a202cad86b3e172540914
SHA2562be1c6eee936e18047a5cf2a4103299811a2dfa96ba2ffe06e930c50a53432c3
SHA512af97f80ea0dd12c142eb2efe34d8988066121f6bc2630f888c93b50324cc7e1f931628df7931479013302bb56a49351b3f4a53aecb34753c2220f9fabcd44fac
-
Filesize
512KB
MD55b1ffe1fafdf616817b2e7f9e3e274af
SHA181345d40f7aa88ac5e9c0c10716a130674f2000c
SHA25615e8eac409a21d6c2aed07df62f05e45d6406c6fdbda863959b994d4e8a35ca4
SHA5125726abae3fe337847bdfe3d5b4576b5fecdaa79d849cfa35400c8f9257dc378d502d8633ad8cd1955b31a279c1beb55e942d9b1f519366ab85df627cd259a189
-
Filesize
128KB
MD534772db675889069f256a8ad143554c2
SHA12e6ceda2c0267e8fe1d4f24860d46b26fdb63117
SHA256e4eafcf079025ec65956c46c5294a5122fa18a3836569784507dd9e9b5a5afde
SHA512e97495dbf030e37f52eb61ce9850d919ad09d0d8fa4200b88c213927b1f29fb7d29393d698943b68987a37c9d896b6d61eb6c7e631013b5c22566248f40480fd
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
243KB
MD5a6cd294ed96c956ca993f3e3daba120f
SHA1131b90f7cf01eba22b8f49182d259e61085c8dd3
SHA25624cf8b52f7de9304dcaf6ac4e74507eee78acd68d562386b31161f22cc08ed77
SHA51255109041503e40ba0a2c54b3d83d12584a492ccf3455137d5d085c77ecf49e11b0722cde3b8902a3fe41cacc922e489e6036d92ba18e2564182302a388d252bc
-
Filesize
154KB
MD562d5c87f2c212a102d49e876d6ef4b01
SHA1ff505469ad9ff8b8c92f606b9d679f9f32a52e2f
SHA256650e16a603cc81f6ea01c89636147fe6c0752f2084d77d173fa0a99ece084154
SHA512812fed3f272c4d50c8cc5e6fc5b352d11479db370a15c39eb8c21a70385d1e1b99ad9d5834aedcfb7ca037d690a4326108dab2f134bb1e3fcc2011d8414bfa25