Analysis
-
max time kernel
295s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
Resource
win10-20240221-en
General
-
Target
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
-
Size
1.8MB
-
MD5
ed77409c8f8b66f81fae0754ee9d86f7
-
SHA1
d2500b7585bed8dd179e84f73644a5b2afd8c8e1
-
SHA256
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825
-
SHA512
1208c9dbc61325d2110ba9057ed1a0b4f94103d82fe172a5f40614c3a8d5621f8e04b73784bb70965acd6e38e9fb604e29f52cb8f04f66e5923cd4a06cc9fe92
-
SSDEEP
24576:GqS02nN1gZ5woLL7hI+b31tDiiMBp9fHfyk21adtXUzXZKktlrfCNK20x2+MI9pN:Wg5wABzD1gf6FIdtXUNDfCN10lV
Malware Config
Extracted
amadey
4.12
http://185.172.128.19
-
install_dir
cd1f156d67
-
install_file
Utsysc.exe
-
strings_key
0dd3e5ee91b367c60c9e575983554b30
-
url_paths
/ghsdh39s/index.php
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://sajdfue.com/test1/get.php
-
extension
.vook
-
offline_id
1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1
-
payload_url
http://sdfjhuz.com/dl/build2.exe
http://sajdfue.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0857PsawqS
Extracted
vidar
8.4
95002d0a9d65ffced363a8f35f42a529
https://steamcommunity.com/profiles/76561199654112719
https://t.me/r2d0s
-
profile_id_v2
95002d0a9d65ffced363a8f35f42a529
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Signatures
-
DcRat 6 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeschtasks.exepid process 284 schtasks.exe 2196 schtasks.exe 2684 schtasks.exe 3048 schtasks.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 2636 schtasks.exe -
Detect Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2028-378-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1284-188-0x0000000000A10000-0x00000000042E2000-memory.dmp family_zgrat_v1 behavioral1/memory/1284-190-0x000000001EED0000-0x000000001EFDE000-memory.dmp family_zgrat_v1 behavioral1/memory/1284-194-0x000000001E570000-0x000000001E594000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe family_zgrat_v1 -
Detected Djvu ransomware 10 IoCs
Processes:
resource yara_rule behavioral1/memory/2072-277-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2072-280-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2072-305-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1620-320-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1620-343-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1620-344-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1620-355-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1620-354-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1620-352-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1620-356-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
3029.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\3029.exe = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 3029.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe30E1.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeexplorgu.exeexplorha.exe1af57d3123.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe2A4B.exerandom.exeamadka.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 30E1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1af57d3123.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2A4B.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe -
Modifies boot configuration data using bcdedit 1 TTPs 14 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 2460 bcdedit.exe 556 bcdedit.exe 2580 bcdedit.exe 1880 bcdedit.exe 2676 bcdedit.exe 2804 bcdedit.exe 608 bcdedit.exe 2148 bcdedit.exe 2612 bcdedit.exe 1484 bcdedit.exe 2540 bcdedit.exe 2384 bcdedit.exe 1240 bcdedit.exe 1648 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 130 2432 rundll32.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
csrss.exedescription ioc process File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2656 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1af57d3123.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeexplorgu.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe2A4B.exerandom.exeamadka.exeexplorha.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe30E1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1af57d3123.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1af57d3123.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2A4B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2A4B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30E1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30E1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Executes dropped EXE 40 IoCs
Processes:
ISetup8.exeu1u4.0.exetoolspub1.exeu1u4.1.exeC8AD.exeC8AD.exeC8AD.exeC8AD.exeFHJKKECFIE.exebuild2.exebuild2.exebuild3.exebuild3.exe13B.exemstsca.exemstsca.exe3029.exe3029.execsrss.exepatch.exeinjector.exemstsca.exemstsca.exedsefix.exewindefender.exewindefender.exemstsca.exeeariwvdmstsca.exe2A4B.exe30E1.exe3574.exeexplorgu.exeosminog.exegoldprimeldlldf.exerandom.exeamadka.exeexplorha.exefullwork.exe1af57d3123.exepid process 2380 ISetup8.exe 2540 u1u4.0.exe 2084 toolspub1.exe 1468 u1u4.1.exe 700 C8AD.exe 2072 C8AD.exe 920 C8AD.exe 1620 C8AD.exe 1668 FHJKKECFIE.exe 1380 build2.exe 2028 build2.exe 3012 build3.exe 2388 build3.exe 2136 13B.exe 1596 mstsca.exe 2592 mstsca.exe 2332 3029.exe 3036 3029.exe 2276 csrss.exe 344 patch.exe 1048 injector.exe 2624 mstsca.exe 544 mstsca.exe 1876 dsefix.exe 756 windefender.exe 1468 windefender.exe 2408 mstsca.exe 944 eariwvd 2880 mstsca.exe 2176 2A4B.exe 1056 30E1.exe 2332 3574.exe 2608 explorgu.exe 500 osminog.exe 2644 goldprimeldlldf.exe 996 random.exe 556 amadka.exe 2380 explorha.exe 2424 fullwork.exe 1836 1af57d3123.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe30E1.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeexplorgu.exeamadka.exeexplorha.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe2A4B.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exerandom.exe1af57d3123.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine 30E1.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine 2A4B.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine 1af57d3123.exe -
Loads dropped DLL 60 IoCs
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeISetup8.exeu1u4.0.exeC8AD.exeC8AD.exeC8AD.execmd.exeC8AD.exeWerFault.exeWerFault.exe3029.exepatch.execsrss.exeexplorer.exe30E1.exeexplorgu.exerundll32.exerundll32.exeamadka.exeexplorha.exepid process 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 2380 ISetup8.exe 2380 ISetup8.exe 2380 ISetup8.exe 2380 ISetup8.exe 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 2380 ISetup8.exe 2380 ISetup8.exe 2380 ISetup8.exe 2380 ISetup8.exe 2540 u1u4.0.exe 2540 u1u4.0.exe 700 C8AD.exe 2072 C8AD.exe 2072 C8AD.exe 920 C8AD.exe 1632 cmd.exe 1620 C8AD.exe 1620 C8AD.exe 1620 C8AD.exe 1620 C8AD.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 3036 3029.exe 3036 3029.exe 856 344 patch.exe 344 patch.exe 344 patch.exe 344 patch.exe 344 patch.exe 2276 csrss.exe 344 patch.exe 344 patch.exe 344 patch.exe 2276 csrss.exe 1796 explorer.exe 1056 30E1.exe 1056 30E1.exe 2608 explorgu.exe 2608 explorgu.exe 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2432 rundll32.exe 2432 rundll32.exe 2432 rundll32.exe 2432 rundll32.exe 2608 explorgu.exe 2608 explorgu.exe 556 amadka.exe 2608 explorgu.exe 2380 explorha.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
3029.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\3029.exe = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 3029.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 3029.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
C8AD.exeFHJKKECFIE.exe3029.execsrss.exeexplorgu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\b0796dcd-0a95-43ab-a9e8-2014e9796f21\\C8AD.exe\" --AutoStart" C8AD.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FHJKKECFIE.exe" FHJKKECFIE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 3029.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000873001\\random.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000875001\\amadka.exe" explorgu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 31 api.2ip.ua 33 api.2ip.ua 41 api.2ip.ua -
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe2A4B.exe30E1.exeexplorgu.exeamadka.exeexplorha.exepid process 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 2348 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 2180 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 380 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 3068 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 1180 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 2176 2A4B.exe 1056 30E1.exe 2608 explorgu.exe 556 amadka.exe 2380 explorha.exe -
Suspicious use of SetThreadContext 10 IoCs
Processes:
C8AD.exeC8AD.exebuild2.exebuild3.exemstsca.exemstsca.exemstsca.exeosminog.exegoldprimeldlldf.exefullwork.exedescription pid process target process PID 700 set thread context of 2072 700 C8AD.exe C8AD.exe PID 920 set thread context of 1620 920 C8AD.exe C8AD.exe PID 1380 set thread context of 2028 1380 build2.exe build2.exe PID 3012 set thread context of 2388 3012 build3.exe build3.exe PID 1596 set thread context of 2592 1596 mstsca.exe mstsca.exe PID 2624 set thread context of 544 2624 mstsca.exe mstsca.exe PID 2408 set thread context of 2880 2408 mstsca.exe mstsca.exe PID 500 set thread context of 2076 500 osminog.exe RegAsm.exe PID 2644 set thread context of 2460 2644 goldprimeldlldf.exe RegAsm.exe PID 2424 set thread context of 1464 2424 fullwork.exe RegAsm.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
3029.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 3029.exe -
Drops file in Windows directory 8 IoCs
Processes:
csrss.exe2A4B.exe30E1.exeamadka.exe3029.exemakecab.exedescription ioc process File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorgu.job 2A4B.exe File created C:\Windows\Tasks\explorgu.job 30E1.exe File created C:\Windows\Tasks\explorha.job amadka.exe File opened for modification C:\Windows\rss 3029.exe File created C:\Windows\rss\csrss.exe 3029.exe File created C:\Windows\Logs\CBS\CbsPersist_20240321222808.cab makecab.exe File created C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 292 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1888 2028 WerFault.exe build2.exe 2112 2136 WerFault.exe 13B.exe 1676 2076 WerFault.exe RegAsm.exe 2616 1464 WerFault.exe RegAsm.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub1.exeu1u4.1.exeeariwvddescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1u4.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1u4.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eariwvd Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eariwvd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eariwvd Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1u4.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u1u4.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1u4.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1u4.0.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2196 schtasks.exe 2684 schtasks.exe 3048 schtasks.exe 2636 schtasks.exe 284 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
windefender.exe3029.exenetsh.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-521 = "N. Central Asia Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-582 = "North Asia East Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-472 = "Ekaterinburg Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 3029.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 3029.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Processes:
csrss.exepatch.exebuild2.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 19000000010000001000000014c3bd3549ee225aece13734ad8ca0b81400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3040000000100000010000000e4a68ac854ac5242460afd72481b2a442000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeu1u4.0.exetoolspub1.exe43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exepid process 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 2540 u1u4.0.exe 2084 toolspub1.exe 2084 toolspub1.exe 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 2348 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 480 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
toolspub1.exeeariwvdpid process 2084 toolspub1.exe 944 eariwvd -
Suspicious use of AdjustPrivilegeToken 39 IoCs
Processes:
SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeFHJKKECFIE.exeexplorer.exeAUDIODG.EXE3029.execsrss.exesc.exepowershell.exepowershell.exeosminog.exepowershell.exeRegAsm.exedescription pid process Token: SeShutdownPrivilege 1188 Token: SeShutdownPrivilege 1188 Token: SeShutdownPrivilege 1188 Token: SeDebugPrivilege 1284 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeShutdownPrivilege 1188 Token: SeDebugPrivilege 1668 FHJKKECFIE.exe Token: SeShutdownPrivilege 1188 Token: SeShutdownPrivilege 1188 Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: 33 660 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 660 AUDIODG.EXE Token: 33 660 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 660 AUDIODG.EXE Token: SeDebugPrivilege 2332 3029.exe Token: SeImpersonatePrivilege 2332 3029.exe Token: SeSystemEnvironmentPrivilege 2276 csrss.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeSecurityPrivilege 292 sc.exe Token: SeSecurityPrivilege 292 sc.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 500 osminog.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeDebugPrivilege 884 powershell.exe Token: SeDebugPrivilege 2460 RegAsm.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe Token: SeShutdownPrivilege 1796 explorer.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
Processes:
u1u4.1.exeexplorer.exe2A4B.exeamadka.exepid process 1468 u1u4.1.exe 1468 u1u4.1.exe 1468 u1u4.1.exe 1468 u1u4.1.exe 1468 u1u4.1.exe 1468 u1u4.1.exe 1468 u1u4.1.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 2176 2A4B.exe 556 amadka.exe -
Suspicious use of SendNotifyMessage 25 IoCs
Processes:
u1u4.1.exeexplorer.exepid process 1468 u1u4.1.exe 1468 u1u4.1.exe 1468 u1u4.1.exe 1468 u1u4.1.exe 1468 u1u4.1.exe 1468 u1u4.1.exe 1468 u1u4.1.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeISetup8.exetaskeng.exeu1u4.1.execmd.exeC8AD.exeC8AD.exeu1u4.0.exedescription pid process target process PID 1904 wrote to memory of 2636 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe schtasks.exe PID 1904 wrote to memory of 2636 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe schtasks.exe PID 1904 wrote to memory of 2636 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe schtasks.exe PID 1904 wrote to memory of 2636 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe schtasks.exe PID 1904 wrote to memory of 2380 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe ISetup8.exe PID 1904 wrote to memory of 2380 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe ISetup8.exe PID 1904 wrote to memory of 2380 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe ISetup8.exe PID 1904 wrote to memory of 2380 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe ISetup8.exe PID 1904 wrote to memory of 2380 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe ISetup8.exe PID 1904 wrote to memory of 2380 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe ISetup8.exe PID 1904 wrote to memory of 2380 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe ISetup8.exe PID 2380 wrote to memory of 2540 2380 ISetup8.exe u1u4.0.exe PID 2380 wrote to memory of 2540 2380 ISetup8.exe u1u4.0.exe PID 2380 wrote to memory of 2540 2380 ISetup8.exe u1u4.0.exe PID 2380 wrote to memory of 2540 2380 ISetup8.exe u1u4.0.exe PID 1904 wrote to memory of 2084 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe toolspub1.exe PID 1904 wrote to memory of 2084 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe toolspub1.exe PID 1904 wrote to memory of 2084 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe toolspub1.exe PID 1904 wrote to memory of 2084 1904 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe toolspub1.exe PID 1624 wrote to memory of 2348 1624 taskeng.exe 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe PID 1624 wrote to memory of 2348 1624 taskeng.exe 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe PID 1624 wrote to memory of 2348 1624 taskeng.exe 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe PID 1624 wrote to memory of 2348 1624 taskeng.exe 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe PID 2380 wrote to memory of 1468 2380 ISetup8.exe u1u4.1.exe PID 2380 wrote to memory of 1468 2380 ISetup8.exe u1u4.1.exe PID 2380 wrote to memory of 1468 2380 ISetup8.exe u1u4.1.exe PID 2380 wrote to memory of 1468 2380 ISetup8.exe u1u4.1.exe PID 1468 wrote to memory of 1284 1468 u1u4.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 1468 wrote to memory of 1284 1468 u1u4.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 1468 wrote to memory of 1284 1468 u1u4.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 1468 wrote to memory of 1284 1468 u1u4.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 1188 wrote to memory of 2528 1188 cmd.exe PID 1188 wrote to memory of 2528 1188 cmd.exe PID 1188 wrote to memory of 2528 1188 cmd.exe PID 2528 wrote to memory of 1180 2528 cmd.exe reg.exe PID 2528 wrote to memory of 1180 2528 cmd.exe reg.exe PID 2528 wrote to memory of 1180 2528 cmd.exe reg.exe PID 1188 wrote to memory of 700 1188 C8AD.exe PID 1188 wrote to memory of 700 1188 C8AD.exe PID 1188 wrote to memory of 700 1188 C8AD.exe PID 1188 wrote to memory of 700 1188 C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 700 wrote to memory of 2072 700 C8AD.exe C8AD.exe PID 2072 wrote to memory of 1256 2072 C8AD.exe icacls.exe PID 2072 wrote to memory of 1256 2072 C8AD.exe icacls.exe PID 2072 wrote to memory of 1256 2072 C8AD.exe icacls.exe PID 2072 wrote to memory of 1256 2072 C8AD.exe icacls.exe PID 2072 wrote to memory of 920 2072 C8AD.exe C8AD.exe PID 2072 wrote to memory of 920 2072 C8AD.exe C8AD.exe PID 2072 wrote to memory of 920 2072 C8AD.exe C8AD.exe PID 2072 wrote to memory of 920 2072 C8AD.exe C8AD.exe PID 2540 wrote to memory of 1632 2540 u1u4.0.exe cmd.exe PID 2540 wrote to memory of 1632 2540 u1u4.0.exe cmd.exe PID 2540 wrote to memory of 1632 2540 u1u4.0.exe cmd.exe PID 2540 wrote to memory of 1632 2540 u1u4.0.exe cmd.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe"C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe"1⤵
- DcRat
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe /TR "C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe" /F2⤵
- DcRat
- Creates scheduled task(s)
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\u1u4.0.exe"C:\Users\Admin\AppData\Local\Temp\u1u4.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\FHJKKECFIE.exe"4⤵
- Loads dropped DLL
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\FHJKKECFIE.exe"C:\Users\Admin\AppData\Local\Temp\FHJKKECFIE.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\FHJKKECFIE.exe6⤵PID:2536
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:888
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1u4.1.exe"C:\Users\Admin\AppData\Local\Temp\u1u4.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000168001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000168001\toolspub1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2084
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1530F0A0-D672-46EE-871F-6348A7240810} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeC:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeC:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2180
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1596 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- DcRat
- Creates scheduled task(s)
PID:2196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeC:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:380
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2624 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:544
-
-
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeC:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3068
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2408 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2880
-
-
-
C:\Users\Admin\AppData\Roaming\eariwvdC:\Users\Admin\AppData\Roaming\eariwvd2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exeC:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1180
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\A045.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\C8AD.exeC:\Users\Admin\AppData\Local\Temp\C8AD.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\C8AD.exeC:\Users\Admin\AppData\Local\Temp\C8AD.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\b0796dcd-0a95-43ab-a9e8-2014e9796f21" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\C8AD.exe"C:\Users\Admin\AppData\Local\Temp\C8AD.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:920 -
C:\Users\Admin\AppData\Local\Temp\C8AD.exe"C:\Users\Admin\AppData\Local\Temp\C8AD.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build2.exe"C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1380 -
C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build2.exe"C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build2.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 14167⤵
- Loads dropped DLL
- Program crash
PID:1888
-
-
-
-
C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build3.exe"C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3012 -
C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build3.exe"C:\Users\Admin\AppData\Local\d9a3a3dd-dacb-467e-bd5b-3686245ba905\build3.exe"6⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- DcRat
- Creates scheduled task(s)
PID:284
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\13B.exeC:\Users\Admin\AppData\Local\Temp\13B.exe1⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 1242⤵
- Loads dropped DLL
- Program crash
PID:2112
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3CB.bat" "1⤵PID:1892
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\3029.exeC:\Users\Admin\AppData\Local\Temp\3029.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\3029.exe"C:\Users\Admin\AppData\Local\Temp\3029.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3036 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:2816
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2656
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMon driver.
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:2684
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:344 -
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER5⤵
- Modifies boot configuration data using bcdedit
PID:1648
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:5⤵
- Modifies boot configuration data using bcdedit
PID:1240
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:5⤵
- Modifies boot configuration data using bcdedit
PID:2460
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows5⤵
- Modifies boot configuration data using bcdedit
PID:2384
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe5⤵
- Modifies boot configuration data using bcdedit
PID:2540
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe5⤵
- Modifies boot configuration data using bcdedit
PID:1484
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 05⤵
- Modifies boot configuration data using bcdedit
PID:2612
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn5⤵
- Modifies boot configuration data using bcdedit
PID:2148
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 15⤵
- Modifies boot configuration data using bcdedit
PID:608
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}5⤵
- Modifies boot configuration data using bcdedit
PID:2804
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast5⤵
- Modifies boot configuration data using bcdedit
PID:2676
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 05⤵
- Modifies boot configuration data using bcdedit
PID:1880
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}5⤵
- Modifies boot configuration data using bcdedit
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
PID:1048
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe4⤵
- Executes dropped EXE
PID:1876
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:3048
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:588
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:292
-
-
-
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\2A4B.exeC:\Users\Admin\AppData\Local\Temp\2A4B.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\30E1.exeC:\Users\Admin\AppData\Local\Temp\30E1.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 2526⤵
- Program crash
PID:1676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main4⤵
- Loads dropped DLL
PID:2692 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2432 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:2392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\297530677122_Desktop.zip' -CompressionLevel Optimal6⤵
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:556 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\1000022001\1af57d3123.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\1af57d3123.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 2566⤵
- Program crash
PID:2616
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3574.exeC:\Users\Admin\AppData\Local\Temp\3574.exe2⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5341⤵
- Suspicious use of AdjustPrivilegeToken
PID:660
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240321222808.log C:\Windows\Logs\CBS\CbsPersist_20240321222808.cab1⤵
- Drops file in Windows directory
PID:2328
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5608881bccd83bd848d8e1c5e44052740
SHA1ef6b2e8c88544fc767f62c5e6479929a414faca4
SHA256fe4388c8a609d41bf65a8925f7002372fd327de30af9cbf98c0cdd93d395f7d5
SHA512fa978bb43a9a5a2a5489be9911a0b2c0ea1dc0a3756844a42246121bda728a6cdf5120b0890eb921f8ddf57ab4b07e1d86764566e4ab56dc4bb1191f91974cf3
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD585ef91907f91663fd9e9c38fa77b4f40
SHA1aec1822c007421e2b4b24033af3c0f7a4785459b
SHA256b7ed2515269ada8d3dea03c9122ea24708ab92fecd73df74b9889eb343558b79
SHA512d4cd3be2d7a99ec9d9ea9881ba5512a0dfca121288d7c2279bac3b6f5e88ce59fb41f4ad79acf976fee5943abe83d34ccd2c5b0a9f6fbfb74d17a5cf00ff5994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51efde057b3201a0210000e6e2f497f6f
SHA195e533274f2e3ddcf65c31bf798065bc564830ae
SHA2564793796d4a018bdcbe1245b0a95b068fc6bd74f1ca46d70a4b583140b40b5fe8
SHA512aac6419ce7471559ecdeb2a5e032d8d64b3df6fe5ed91d25e43b9d2c65ec62cfa107f084ad50577f395113e4989e14d1f8c834780db585537f8a4e670fcfbdac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd74c7b9b736699d48fe7bef948a8d87
SHA129bffa07adb3286cc96367b17ad7c0e85b3c2dd2
SHA256b88210a91866daeb88dbe1212af4579f261723bfbe7236d319be3e2cbb081e95
SHA512223e1db974c7f606337d79bc90ecbd277baaca5c4d00b02f11ad7207b8edbdcbae5074f2662834b60bdcc7db5d9709e61e58d706a4a92c5893f185452282cd19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b4bd59d8f10c50018a72104ea35308c
SHA197eaae464ff1d15d885a63260f6d0c04ec2e67d4
SHA256417192ab05f778674c347b4467afce129c0d3d994e19f48e9e29aa5138461d19
SHA512b8da4ff3942e9133b0d17d1bc4bece1c7ac9b22b1d99c952afb99a75d7e28c1c825e14e020981425f468183d8a6a29da669bf421660eab13233e19d94feedfe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5937b8b08b69a27942456420c9ecfc9df
SHA1141c595232a22d4ac188cca5b62d61564fd0448a
SHA2568a8fe3d4c588c518df40420f81b6e0ac15356367a32fbb1eddae6f2c4e5f860d
SHA51289ed4e9a7b0b3ecf2497527355bbeb3846fef25e694ae2751d79ae7fbc1fd8e342a5f4befbd15566fc5ac7ae22149d15235fb19d8e79d1c58382e9e9196eccff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fd965ff0c6bddfa042e90dcf89ab7c26
SHA10466d98585f1e28310593d11246260d5608bff4c
SHA256abac14c56958256257f5e502b57a7d75897b19618dbfffc7e2da238b4bab89b2
SHA512cb9dd838947ecd2dafe604ca5f81cb0f610785ae0d7f0df66f85f8f01e3c40fd440890b7378ab5726daaa21762e1531ae33f177e881266e16d2b95447d9fb022
-
C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\f40fa09571ae3e4604ca1ef5093c12d04345052412cd199086553bfab6d3b7c7\86ffde9755da4701a321d5dc35f64729.tmp
Filesize1KB
MD5a8a8c7a7a3a6a33d31ba06b48ed2dd7d
SHA1641d7d7df6513d89ceb729f44b02543f867ad606
SHA256281532ff18e7a49a8f66ba7fc998a1b876fbb40ee0191dd797f60d4ebd34c0e6
SHA51252dfcda6ddef61e9b7cc2121367030adbd0be0f9512481e96f24029cd0432ca7bdd84918c305b67288e3670ed82a6fa6fd98ae7c9bb8ed06b720812c0a5733e3
-
Filesize
410KB
MD5c0411ffee313c4de470f1ec2ed970af7
SHA1cdb8fcc80b2e723322b20e0d520d10a7536061fa
SHA256b5628490cabe4a886c6bc86ac2880d853569cecca6cf054c7fb7ae86b7f4d20c
SHA512a0750cecbbde3c91315eaefb5c0d4925cd558a1d10d3c97ec9656084659d521fb26980520ef735a97b959806cdffaf8d48bedfb39119a8ab2ebcbed5bb6ccad1
-
Filesize
231KB
MD58ad1f09f9bd6d1e486898d9b0c60b5f7
SHA1e6c0b8e8a15ee4ed8ed21fc0be618cd39927f225
SHA256d640e24c44544c63b539f4c1ea7bf77b117356fafa1287de0dde8ebd52297f68
SHA512f399f70d552bf0d64f9ba9847d59e229eb50b73ed8082b4056cff99e2e2206a3d26d66d2f36481c90d5fec568ab491e35a65675a1499c5270041a8f88227e4aa
-
Filesize
534KB
MD5a3f8b60a08da0f600cfce3bb600d5cb3
SHA1b00d7721767b717b3337b5c6dade4ebf2d56345e
SHA2560c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb
SHA51214f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d
-
Filesize
464KB
MD5c084d6f6ba40534fbfc5a64b21ef99ab
SHA10b4a17da83c0a8abbc8fab321931d5447b32b720
SHA256afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
SHA512a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
Filesize
2.9MB
MD5aafc00662f8c68cbd45a08c885a2d6fc
SHA1bd1f70f190579debb213bf3022a304c0d9ce6a9f
SHA2568003cded35a962784da90078ec690fa1a6ee9d565d1d9da457811e292745d955
SHA51220a61dbfa4ab76de740fea6d976e3ff3f48f7b2649dbe10c2f545c0c45a272652b951c6e7ca5a9d31a90ac157498a2368f0f0b72657348d23614d75da4207774
-
Filesize
1.8MB
MD5444532fcd858195a7e6e08dc42d9b119
SHA1d6648434771b3072314ae6f170a771f0f1e9408d
SHA2563c0f5360b66ae1e40769081558167c5dbc9cd849998c1cc49d921a74acd610d1
SHA5124f39c26eba4edfa95129f11ab43e38d54a259955b353788d57e820986fbe5fddf84f5e43436e5e1a99bfdb75898aa2f977d77a48cd6bf6e153feb2cecc5f89b2
-
Filesize
451KB
MD5b2b60c50903a73efffcb4e33ce49238f
SHA19b6f27fc410748ae1570978d7a6aba95a1041eea
SHA25629d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1
SHA5122c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126
-
Filesize
6.5MB
MD59e52aa572f0afc888c098db4c0f687ff
SHA1ef7c2bb222e69ad0e10c8686eb03dcbee7933c2b
SHA2564a40f9d491f09521f4b0c6076a0eb488f6d8e1cf4b67aa6569c2ccce13556443
SHA512d0991e682ae8c954721e905753b56c01f91b85313beb9996331793c3efa8acc13d574ef5ba44853ecc3e05822931ed655bad1924fa11b774a43e015f42185f62
-
Filesize
1.8MB
MD53c44bfe54c1233d8645cb87101be526d
SHA1dd7d94832980c162e5793dd27d2024e8aa1af18d
SHA256990d288499b6945af3246331757db918f78d9d94889b973836b1289fa6cd1123
SHA512c365a25e7c906458b960743a3221a632c0cf59d5b9bd73681444f1b6797973c1098953d50deaeee315f42aaa6949890cc281024e30258350f74a7959e2de80a3
-
Filesize
4.1MB
MD5105f3de24a97884559ba933061f7c46c
SHA13088f13998ee97020394f584a76c05a48c3ca073
SHA256c59efa3d6fe0d425b42bfc950fa83b307058c704eb896376e93f346c2cb818be
SHA51269420543ee5cecd1cb98e34e6293238394a01118ff94b324dc48ccc2c3d060f6d0002fa805d05611c99892c6769e095fdf3093f53cc8f3f320912baad07102d3
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
727KB
MD55dc36ffbdf9face7d614560922f3691a
SHA1e228e19cb15b9b2048b16712f72bd7e366be60cc
SHA256b325992b3e758b5f8bc5b38d5ff26d7f05708ff720f49d5ce3963a7bc738ef3d
SHA512de51660bdd4021268b9d08b8de45487880588ef5fa4b684ef7a844933fb82e157c0f5b23641781add8dcea16c3753a92f75261e59af0c6065de2ea15ed2209f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
Filesize558KB
MD59773ff948729b73a8e12abc9543cd0ce
SHA15371bacd1f64aafdf0572ee636617abb394ce8dc
SHA25613e699ff9255e0771d567a4ff5e2e1776f1bcf2443ffbcd6531e88548416b584
SHA512e642a575a1f19287fc26a1d93996939dafbb74943479d51447fad25441e050b41a77454c3b9cd28ef9802104671331596dc612da47bf7328f6f3849c4fb200cb
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize209KB
MD50d42de7455d04dd82766067def4c1cb0
SHA12341b9166de42ee8d3716a6c739101a35c13a139
SHA256e5829248802e027b5d1e57a749dc5af8db7cc734e78b55e204ea6afcf12f1ede
SHA512188b73e8ad76be196482de75d1170168b1ef95e72df3563657d4ed4df52e1f991a2ca40fbed75c7bce29f2c14742ee30ffc78c05a9d996617011a3cb1ad28c89
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
2KB
MD508c6cc8d50634b50e77fbf3458fe7ea6
SHA178408feeeca2ca515309440d7aa7151bef673306
SHA256f275e5de26ffe5b2fa9f78405a2bc9177e0462f88e848a09f62ad4c1b8004d62
SHA512db049b17cd1305ea50526ac96405caf3d0cc0a4e870ca2a9ce1c97629a184841fbab05550eb73dff18d4903202dcfedb80e4cd7fdcd2ab5b54ee3cd505407524
-
Filesize
5.3MB
MD51afff8d5352aecef2ecd47ffa02d7f7d
SHA18b115b84efdb3a1b87f750d35822b2609e665bef
SHA256c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb
-
Filesize
228KB
MD5f20fb4a7f457ccaa95cfb94679b826da
SHA1d894fb6bfa15065e2edfce778c42604914f50ad3
SHA25641d20787826b7a650f66d551b4095b14e2998a39b1a6a0e9a703a1f085e3037b
SHA5128988271a8add94a39dbd299902d1ca3199854c920311f6f2570bc2dcf33a194263f9286b062be8c44b5346c822b1d0936889844c6c74610ed8a75c029a295b79
-
Filesize
193KB
MD5578499b5c73b9dd84e80f31e42e72528
SHA1e875e38ccca756a14a6c1083e8054b8b1af05565
SHA256c0c3fff2150deddfdcf4c891a88a9cfc7d662438da07caad2fb0648a716c7e2a
SHA512d3c3890cb98d02b65a5fae1f4d3e95701866a1e9d08424b9e475257fab1cc28941d72ae3f29393219c3398b46c84c6d6cd29ee25198d8f55f04c63a7dc16e0de
-
Filesize
364KB
MD5bbd82bf2376559f3334c0f8d85da940c
SHA1721ea7303cf2fb70f2f6b57591e25b7bb41bbec5
SHA256d440a0e06023f0932657547cd2e82c79e6840131502f99aefc1159262f7063ac
SHA512c761e0b49645ecccf7259214a61b9d2589385f6bfa9acaddbc5d16c82263ef95ead0d2d1fed1a95c46ff71582e1150ebf605fda83af1e317c4b49ece30711780
-
Filesize
45KB
MD5469dbf70f0de5314022b6b50ba15a16b
SHA133cc63ce1c1f12414e0ad1079cb123a1a94c8ad2
SHA256de3277d438db9854ed187428afa264dec8444cd0cefdae6e28fcd913083b76e7
SHA512118ea88231a25983c623d845ff081f702705d5e14bee9589ddaa41065560cfacbfe349a75cba870ad99ba9d68903c2f93019b5f4ac4f48b240c09150bb0b8987
-
Filesize
342KB
MD526544ec9adc1864de80222fb0b38e6dc
SHA12ca52374bb468a8e2c10d39b64d1e4e9d7d0adee
SHA25603b38ccf2c3145839d5ea7c5ccec609de3a67a7e435e94ca05c8c080d9df4411
SHA512f7eb99db8eb4df15ac252bd4523a407b32089d22c435303499bc3813ecdf1ffbc8483417bb97e901fba3e3f36c6e9e47eb30fa78b7c461d3f78f5d5899fae730
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4S2DFP4FUW4OTGNKFCOR.temp
Filesize7KB
MD597591baec46f7adc9f3a4d6deaff5d5c
SHA1adac9e07b67d5906330f2297d2b692d8266964b8
SHA256638a11a8b867f82ef68a326a0a15d7d9cde3a84555b13f8b11970ce465aa7c46
SHA51215e2f99b12341e109b5adc10a186443c735a49c65bb3960582dd203fef5690a594586665fdb3017c51382420223f2cb37cad54657a44f47dfeb41a39767066b6
-
Filesize
272KB
MD517ba7dfb767f18ff3c001842fe020cf6
SHA11491eeefddb1610136f6d1a00d2e676866ccf241
SHA2560fa5677447e0086879ae3bbeea9a6eea9502f44c0fd3eb7d8cb19b394f1a7267
SHA512282754e8007f3525a6ed51922b4820f6dfe80ce59a97ca51b9e3e6f394c0d59cc3f6a8621d881be032624bf4fb9981b139a79924468affc63c9d15327cc68d40
-
Filesize
389KB
MD5643c85822c8dc79d1d145ed38f9ca00a
SHA13b991447c39ed8c0fce036db108742ffd8c256a2
SHA256c6ab589faa26679e6ebe124131fa895aa5b6da53e7d20e63e6756490b4e413d7
SHA5121d311253a2cd6039e27877e9c1d1d4ef642cb8f41db3fa6ed16aad974859b9fa13b2004ba31ce3022e8e61ab9b1ae838c019484599c0ebb01fbb98195fe3f400
-
Filesize
640KB
MD5cfec9f6ac8357c5671c34fca88eb1118
SHA191bfdfb908daf4a105e034459033218d0047f9d8
SHA25675665ab285a7b2cffcbdbf77926ac18cb35385ff359c93af3f9506d943e5db60
SHA512568b35a65e34afb1bb0234994c9d27ba66a95ba57c87c78a046df4b2059d4f12761d832198eec5b0b7ba68b3343b855ec87cca99117b11492c3dc3c27b007964
-
Filesize
261KB
MD5606625739201aa74813d211613b2aa82
SHA14409efa953358e31d940d698470bd0e2d952e8a7
SHA256848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2
SHA512d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1
-
Filesize
1.2MB
MD54141025fead27b4040cc5aeb56b721cc
SHA1dd1c19423218ec171010aa4255a879bab4c5a232
SHA2569deeb95af6bbe254f8365e3df7541a52b012c7fd492fe29b874ccf11bcaa7f7a
SHA5121d90df90132b91fcb86c12b89cc82829c1afb2841736f5a36809157d80b0a26b87b11aef643f402f8f196eb0d64885ecca73333a945c490694a7c48a56176f02
-
Filesize
276KB
MD554d0e2131daef2b41a2169660058469c
SHA1516935b75ec5457e0b9478ca4b2a3c09c5a39476
SHA256fc14491db3698a4c46839a90acbac2094776162e968e052288c6ad5cf45ee372
SHA512f836557ecff9dd169e17a568e3239dbc7b08272a4532eb3d1d3e35dd6786685451b8156c347091be49808518a3056bb98d160c6c9739caadc6d4a4e5c7be712b
-
Filesize
314KB
MD556c8183f691a8a1aa4e5a1ffc839b6e8
SHA1f5125317f9fe57018e7ec42a9b7cee99845d91a5
SHA256b1b463375abf8bf7871d8e4ff6f429fa8803f426352ef345d82aa5130fdee709
SHA512a5c09a0056b58361d6010194b1a3cd611fbfa4aabd8f21190b01cbae0a76737adac6441444861cb2378edf8c7ff93ab055967c53e4e6b15499129ad5bca01950
-
Filesize
192KB
MD567649f670972f4f86127948c86db6065
SHA1eb2f58d62e49341a451f56a00b1c280bf38523fe
SHA2564b3f155666368a446ad91723ef98305e78dabd987e38862c12372508189ac79a
SHA5128f334c3013b628fc709f37d7f701d655172302573a71c766d33dd9746c1d7587f5b0d911c47757a28e4fbd87e2f1010516f9bb2d2442f0486c56dd31e7c23292
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319