Analysis
-
max time kernel
114s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe
Resource
win11-20240319-en
General
-
Target
459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe
-
Size
1.8MB
-
MD5
688dafd620f06e066f81bd4453bc41f9
-
SHA1
6d85ef29a93f3aa590913f8fe2fa64d9af414260
-
SHA256
459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599
-
SHA512
34fa4bf6b6b55e3fa25425fe9e80790b5c368cfa1d16f511c36089858f4cace9e16ef215f375cd4128dc2f3c4e499daff8b68260784956759928847e7aaf3275
-
SSDEEP
49152:CJWsp/GOtcK5C9nRtPfG9Vu0qiwG37YRsdun:F8+OtHCxDPuzPqitER
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
redline
LiveTraffic
4.185.137.132:1632
Extracted
amadey
4.17
http://185.215.113.32
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Extracted
lumma
https://resergvearyinitiani.shop/api
https://relevantvoicelesskw.shop/api
Signatures
-
Detect ZGRat V1 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe family_zgrat_v1 behavioral1/memory/4984-68-0x0000000000330000-0x00000000003AA000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/4244-74-0x0000000000400000-0x0000000000450000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe family_redline behavioral1/memory/5184-449-0x00000000012D0000-0x000000000135C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
explorgu.exerandom.exeamadka.exeexplorha.exee3e45246b5.exeexplorha.exeFD48.exe459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3e45246b5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FD48.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 81 1248 rundll32.exe 90 2932 rundll32.exe 109 5512 rundll32.exe 128 5028 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1032 netsh.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
FD48.exe459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exerandom.exeamadka.exeexplorgu.exee3e45246b5.exeexplorha.exeexplorha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FD48.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FD48.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3e45246b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3e45246b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explorha.exeRegAsm.exeISetup3.exeu4og.1.exeu4og.0.exeAKKKFBGDHJ.exeexplorgu.exeamadka.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation explorha.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation ISetup3.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation u4og.1.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation u4og.0.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation AKKKFBGDHJ.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation explorgu.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation amadka.exe -
Executes dropped EXE 23 IoCs
Processes:
explorgu.exeosminog.exegoldprimeldlldf.exerandom.exeamadka.exefullwork.exeTeamFour.exeexplorha.exee3e45246b5.exealex1234.exeTraffic.exepropro.exe987123.exeyoffens_crypted_EASY.exelummalg.exeISetup3.exeu4og.0.exeu4og.1.exeexplorha.exeAKKKFBGDHJ.exeFD48.exeF2B.exe199C.exepid process 4248 explorgu.exe 3872 osminog.exe 4984 goldprimeldlldf.exe 2420 random.exe 1196 amadka.exe 4928 fullwork.exe 2908 TeamFour.exe 3924 explorha.exe 5080 e3e45246b5.exe 4416 alex1234.exe 2776 Traffic.exe 940 propro.exe 3224 987123.exe 5184 yoffens_crypted_EASY.exe 5708 lummalg.exe 6064 ISetup3.exe 5692 u4og.0.exe 6040 u4og.1.exe 5752 explorha.exe 4584 AKKKFBGDHJ.exe 5752 FD48.exe 4808 F2B.exe 6076 199C.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
random.exeamadka.exeexplorha.exee3e45246b5.exeexplorha.exeFD48.exe459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Wine e3e45246b5.exe Key opened \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Wine FD48.exe Key opened \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Wine 459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe Key opened \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Wine explorgu.exe -
Loads dropped DLL 11 IoCs
Processes:
rundll32.exerundll32.exerundll32.exeyoffens_crypted_EASY.exerundll32.exerundll32.exerundll32.exeu4og.0.exeregsvr32.exepid process 712 rundll32.exe 1248 rundll32.exe 2932 rundll32.exe 5184 yoffens_crypted_EASY.exe 5184 yoffens_crypted_EASY.exe 5468 rundll32.exe 5512 rundll32.exe 5028 rundll32.exe 5692 u4og.0.exe 5692 u4og.0.exe 1848 regsvr32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorgu.exeexplorha.exeAKKKFBGDHJ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000873001\\random.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000875001\\amadka.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e3e45246b5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000022001\\e3e45246b5.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AKKKFBGDHJ.exe" AKKKFBGDHJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exeexplorgu.exeamadka.exeexplorha.exeexplorha.exeFD48.exepid process 2164 459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe 4248 explorgu.exe 1196 amadka.exe 3924 explorha.exe 5752 explorha.exe 5752 FD48.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
goldprimeldlldf.exeosminog.exefullwork.exealex1234.exelummalg.exedescription pid process target process PID 4984 set thread context of 4244 4984 goldprimeldlldf.exe RegAsm.exe PID 3872 set thread context of 4784 3872 osminog.exe RegAsm.exe PID 4928 set thread context of 4880 4928 fullwork.exe RegAsm.exe PID 4416 set thread context of 4756 4416 alex1234.exe RegAsm.exe PID 5708 set thread context of 6032 5708 lummalg.exe RegAsm.exe -
Drops file in Windows directory 2 IoCs
Processes:
459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exeamadka.exedescription ioc process File created C:\Windows\Tasks\explorgu.job 459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe File created C:\Windows\Tasks\explorha.job amadka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 12 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4144 4784 WerFault.exe RegAsm.exe 3716 4784 WerFault.exe RegAsm.exe 1008 4784 WerFault.exe RegAsm.exe 3012 4880 WerFault.exe RegAsm.exe 5336 5184 WerFault.exe yoffens_crypted_EASY.exe 5572 6032 WerFault.exe RegAsm.exe 5836 6032 WerFault.exe RegAsm.exe 6100 6064 WerFault.exe ISetup3.exe 2800 5692 WerFault.exe u4og.0.exe 3240 1716 WerFault.exe u45k.0.exe 6084 3248 WerFault.exe 299B.exe 6112 5384 WerFault.exe ISetup4.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
987123.exeu4og.1.exeF2B.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4og.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4og.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F2B.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F2B.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4og.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F2B.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u4og.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u4og.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u4og.0.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
propro.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 propro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 propro.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exeexplorgu.exepowershell.exeamadka.exeexplorha.exeRegAsm.exe987123.exeTeamFour.exerundll32.exepid process 2164 459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe 2164 459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe 4248 explorgu.exe 4248 explorgu.exe 3348 powershell.exe 3348 powershell.exe 1196 amadka.exe 1196 amadka.exe 3348 powershell.exe 3924 explorha.exe 3924 explorha.exe 4244 RegAsm.exe 4244 RegAsm.exe 3224 987123.exe 3224 987123.exe 4244 RegAsm.exe 4244 RegAsm.exe 4244 RegAsm.exe 4244 RegAsm.exe 2908 TeamFour.exe 2908 TeamFour.exe 5512 rundll32.exe 5512 rundll32.exe 5512 rundll32.exe 5512 rundll32.exe 5512 rundll32.exe 5512 rundll32.exe 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
987123.exepid process 3224 987123.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
osminog.exepowershell.exeTeamFour.exeRegAsm.exeTraffic.exepowershell.exepropro.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exedescription pid process Token: SeDebugPrivilege 3872 osminog.exe Token: SeDebugPrivilege 3348 powershell.exe Token: SeDebugPrivilege 2908 TeamFour.exe Token: SeDebugPrivilege 4244 RegAsm.exe Token: SeBackupPrivilege 2908 TeamFour.exe Token: SeSecurityPrivilege 2908 TeamFour.exe Token: SeSecurityPrivilege 2908 TeamFour.exe Token: SeSecurityPrivilege 2908 TeamFour.exe Token: SeSecurityPrivilege 2908 TeamFour.exe Token: SeDebugPrivilege 2776 Traffic.exe Token: SeBackupPrivilege 2776 Traffic.exe Token: SeSecurityPrivilege 2776 Traffic.exe Token: SeSecurityPrivilege 2776 Traffic.exe Token: SeSecurityPrivilege 2776 Traffic.exe Token: SeSecurityPrivilege 2776 Traffic.exe Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeDebugPrivilege 5236 powershell.exe Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeDebugPrivilege 940 propro.exe Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeDebugPrivilege 2112 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exeamadka.exeu4og.1.exepid process 2164 459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe 1196 amadka.exe 6040 u4og.1.exe 6040 u4og.1.exe 6040 u4og.1.exe 6040 u4og.1.exe 6040 u4og.1.exe 6040 u4og.1.exe 6040 u4og.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
u4og.1.exepid process 6040 u4og.1.exe 6040 u4og.1.exe 6040 u4og.1.exe 6040 u4og.1.exe 6040 u4og.1.exe 6040 u4og.1.exe 6040 u4og.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
explorgu.exegoldprimeldlldf.exeosminog.exerundll32.exefullwork.exeamadka.exeexplorha.exealex1234.exedescription pid process target process PID 4248 wrote to memory of 3872 4248 explorgu.exe osminog.exe PID 4248 wrote to memory of 3872 4248 explorgu.exe osminog.exe PID 4248 wrote to memory of 3872 4248 explorgu.exe osminog.exe PID 4248 wrote to memory of 4984 4248 explorgu.exe goldprimeldlldf.exe PID 4248 wrote to memory of 4984 4248 explorgu.exe goldprimeldlldf.exe PID 4248 wrote to memory of 4984 4248 explorgu.exe goldprimeldlldf.exe PID 4984 wrote to memory of 4244 4984 goldprimeldlldf.exe RegAsm.exe PID 4984 wrote to memory of 4244 4984 goldprimeldlldf.exe RegAsm.exe PID 4984 wrote to memory of 4244 4984 goldprimeldlldf.exe RegAsm.exe PID 4984 wrote to memory of 4244 4984 goldprimeldlldf.exe RegAsm.exe PID 4984 wrote to memory of 4244 4984 goldprimeldlldf.exe RegAsm.exe PID 4984 wrote to memory of 4244 4984 goldprimeldlldf.exe RegAsm.exe PID 4984 wrote to memory of 4244 4984 goldprimeldlldf.exe RegAsm.exe PID 4984 wrote to memory of 4244 4984 goldprimeldlldf.exe RegAsm.exe PID 3872 wrote to memory of 4784 3872 osminog.exe RegAsm.exe PID 3872 wrote to memory of 4784 3872 osminog.exe RegAsm.exe PID 3872 wrote to memory of 4784 3872 osminog.exe RegAsm.exe PID 3872 wrote to memory of 4784 3872 osminog.exe RegAsm.exe PID 3872 wrote to memory of 4784 3872 osminog.exe RegAsm.exe PID 3872 wrote to memory of 4784 3872 osminog.exe RegAsm.exe PID 3872 wrote to memory of 4784 3872 osminog.exe RegAsm.exe PID 3872 wrote to memory of 4784 3872 osminog.exe RegAsm.exe PID 3872 wrote to memory of 4784 3872 osminog.exe RegAsm.exe PID 4248 wrote to memory of 2420 4248 explorgu.exe random.exe PID 4248 wrote to memory of 2420 4248 explorgu.exe random.exe PID 4248 wrote to memory of 2420 4248 explorgu.exe random.exe PID 4248 wrote to memory of 712 4248 explorgu.exe rundll32.exe PID 4248 wrote to memory of 712 4248 explorgu.exe rundll32.exe PID 4248 wrote to memory of 712 4248 explorgu.exe rundll32.exe PID 712 wrote to memory of 1248 712 rundll32.exe rundll32.exe PID 712 wrote to memory of 1248 712 rundll32.exe rundll32.exe PID 4248 wrote to memory of 1196 4248 explorgu.exe amadka.exe PID 4248 wrote to memory of 1196 4248 explorgu.exe amadka.exe PID 4248 wrote to memory of 1196 4248 explorgu.exe amadka.exe PID 4248 wrote to memory of 4928 4248 explorgu.exe fullwork.exe PID 4248 wrote to memory of 4928 4248 explorgu.exe fullwork.exe PID 4248 wrote to memory of 4928 4248 explorgu.exe fullwork.exe PID 4928 wrote to memory of 4880 4928 fullwork.exe RegAsm.exe PID 4928 wrote to memory of 4880 4928 fullwork.exe RegAsm.exe PID 4928 wrote to memory of 4880 4928 fullwork.exe RegAsm.exe PID 4928 wrote to memory of 4880 4928 fullwork.exe RegAsm.exe PID 4928 wrote to memory of 4880 4928 fullwork.exe RegAsm.exe PID 4928 wrote to memory of 4880 4928 fullwork.exe RegAsm.exe PID 4928 wrote to memory of 4880 4928 fullwork.exe RegAsm.exe PID 4928 wrote to memory of 4880 4928 fullwork.exe RegAsm.exe PID 4928 wrote to memory of 4880 4928 fullwork.exe RegAsm.exe PID 4248 wrote to memory of 2908 4248 explorgu.exe TeamFour.exe PID 4248 wrote to memory of 2908 4248 explorgu.exe TeamFour.exe PID 1196 wrote to memory of 3924 1196 amadka.exe explorha.exe PID 1196 wrote to memory of 3924 1196 amadka.exe explorha.exe PID 1196 wrote to memory of 3924 1196 amadka.exe explorha.exe PID 3924 wrote to memory of 5080 3924 explorha.exe e3e45246b5.exe PID 3924 wrote to memory of 5080 3924 explorha.exe e3e45246b5.exe PID 3924 wrote to memory of 5080 3924 explorha.exe e3e45246b5.exe PID 4248 wrote to memory of 4416 4248 explorgu.exe alex1234.exe PID 4248 wrote to memory of 4416 4248 explorgu.exe alex1234.exe PID 4248 wrote to memory of 4416 4248 explorgu.exe alex1234.exe PID 4248 wrote to memory of 2932 4248 explorgu.exe rundll32.exe PID 4248 wrote to memory of 2932 4248 explorgu.exe rundll32.exe PID 4248 wrote to memory of 2932 4248 explorgu.exe rundll32.exe PID 4416 wrote to memory of 4756 4416 alex1234.exe RegAsm.exe PID 4416 wrote to memory of 4756 4416 alex1234.exe RegAsm.exe PID 4416 wrote to memory of 4756 4416 alex1234.exe RegAsm.exe PID 4416 wrote to memory of 4756 4416 alex1234.exe RegAsm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe"C:\Users\Admin\AppData\Local\Temp\459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2164
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 12204⤵
- Program crash
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 12284⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 11444⤵
- Program crash
PID:1008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2420
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1248 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:4144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\134859772495_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\1000022001\e3e45246b5.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\e3e45246b5.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵PID:3584
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Loads dropped DLL
PID:5468 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5512 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:5548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\134859772495_Desktop.zip' -CompressionLevel Optimal6⤵
- Suspicious use of AdjustPrivilegeToken
PID:5236
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 12404⤵
- Program crash
PID:3012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks computer location settings
PID:4756 -
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:208
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:5172
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3224
-
-
C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5184 -s 7843⤵
- Program crash
PID:5336
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 12164⤵
- Program crash
PID:5572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 12364⤵
- Program crash
PID:5836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001010001\ISetup3.exe"C:\Users\Admin\AppData\Local\Temp\1001010001\ISetup3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:6064 -
C:\Users\Admin\AppData\Local\Temp\u4og.0.exe"C:\Users\Admin\AppData\Local\Temp\u4og.0.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\AKKKFBGDHJ.exe"4⤵PID:5324
-
C:\Users\Admin\AppData\Local\Temp\AKKKFBGDHJ.exe"C:\Users\Admin\AppData\Local\Temp\AKKKFBGDHJ.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:4584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\AKKKFBGDHJ.exe6⤵PID:5956
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:5592
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5692 -s 23124⤵
- Program crash
PID:2800
-
-
-
C:\Users\Admin\AppData\Local\Temp\u4og.1.exe"C:\Users\Admin\AppData\Local\Temp\u4og.1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6040 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6064 -s 14403⤵
- Program crash
PID:6100
-
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵PID:5948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4784 -ip 47841⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4784 -ip 47841⤵PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4784 -ip 47841⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4880 -ip 48801⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5184 -ip 51841⤵PID:5316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 6032 -ip 60321⤵PID:5480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 6032 -ip 60321⤵PID:5796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 6064 -ip 60641⤵PID:6096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5692 -ip 56921⤵PID:4572
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\F5F4.dll1⤵PID:1548
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\F5F4.dll2⤵
- Loads dropped DLL
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\FD48.exeC:\Users\Admin\AppData\Local\Temp\FD48.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5752
-
C:\Users\Admin\AppData\Local\Temp\F2B.exeC:\Users\Admin\AppData\Local\Temp\F2B.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4808
-
C:\Users\Admin\AppData\Local\Temp\199C.exeC:\Users\Admin\AppData\Local\Temp\199C.exe1⤵
- Executes dropped EXE
PID:6076 -
C:\Users\Admin\AppData\Local\Temp\ISetup4.exe"C:\Users\Admin\AppData\Local\Temp\ISetup4.exe"2⤵PID:5384
-
C:\Users\Admin\AppData\Local\Temp\u45k.0.exe"C:\Users\Admin\AppData\Local\Temp\u45k.0.exe"3⤵PID:1716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 10164⤵
- Program crash
PID:3240
-
-
-
C:\Users\Admin\AppData\Local\Temp\u45k.1.exe"C:\Users\Admin\AppData\Local\Temp\u45k.1.exe"3⤵PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5384 -s 15443⤵
- Program crash
PID:6112
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵PID:5696
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:6072
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵PID:3264
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1584
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:5832
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:1032
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5204
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵PID:848
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3224
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:5408
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2776
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\299B.exeC:\Users\Admin\AppData\Local\Temp\299B.exe1⤵PID:3248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 7042⤵
- Program crash
PID:6084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1716 -ip 17161⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3248 -ip 32481⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5384 -ip 53841⤵PID:5876
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
3KB
MD5fe3aab3ae544a134b68e881b82b70169
SHA1926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6
SHA256bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b
SHA5123fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
3.0MB
MD5006c492bf5363356c8dd9c9b15aa045e
SHA18be3a5c361914312b44fa3e8ad662b6337ba3891
SHA2569e8fb107d378b681e49f3b07b034b7a288b57be9f6422fa09e8a5457dcae9cf1
SHA512fe099b98d92b6f7f287b3628bb1490afcb7c31a7e5c2ec62d7202b09d45813e6ccea1caf7cd27ca4523812d325c713d4522ac5e169c9aaafecc2c1b4cbc850cc
-
Filesize
1KB
MD59b8cd5b67f091304dcc6dc753f884a85
SHA1247182a63593f5d2113df5ecea863d28ec5a576d
SHA256dac3eb5463b8b7ea45f7d2f44768c9e911d1b845f5ac88cbf7d4c88b7163baa5
SHA5122d1cdd4d59f6a25819b7e94bcad9d532e78e477ca9fe1a9bcf37768514eb94be45c4becbc045246f7e0cd7c36491ee332774faabfec1f17c1e778d30fefbcb4c
-
Filesize
1.8MB
MD5688dafd620f06e066f81bd4453bc41f9
SHA16d85ef29a93f3aa590913f8fe2fa64d9af414260
SHA256459fa5f48e6d8a3b33305863b39038a7e664e2b34e605f40c4f703e3d2555599
SHA51234fa4bf6b6b55e3fa25425fe9e80790b5c368cfa1d16f511c36089858f4cace9e16ef215f375cd4128dc2f3c4e499daff8b68260784956759928847e7aaf3275
-
Filesize
1.3MB
MD5ef866b611cbc8ded6112d4ef00804eee
SHA1611d19656ef8737116657315c240ab19fef8292c
SHA2567c33883a0575a3b7c665e0ac126c9a159978d202be7717dc3958f228ab045f8f
SHA5129cb8249073340a6e4b8c260ba56baeb262002ba429694f3421af4e526e0de09ddb6438d1ade257752808e2a11d7f061cb15a89d11b9ed219d1f1b1cf48ab4d7e
-
Filesize
832KB
MD502a68eb1f1a414a723142ea1c9f9a2b3
SHA10c0ea6e23f1a0d57c0f16ed1a14f0d891922ea86
SHA256fb685fcafa28d6fc6a613723d7779739589dacbae262f650dcdf877f86b2ba13
SHA512dccb1fe0b6d25a0b816292c1a8152e24c5a27ae3fcbf37b286512d8bb31780f26fc87f00d20ecb1aae1d5fbdb016c9e9b38b687a5424512fc02b6aee7032d6fe
-
Filesize
534KB
MD5a3f8b60a08da0f600cfce3bb600d5cb3
SHA1b00d7721767b717b3337b5c6dade4ebf2d56345e
SHA2560c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb
SHA51214f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d
-
Filesize
464KB
MD5c084d6f6ba40534fbfc5a64b21ef99ab
SHA10b4a17da83c0a8abbc8fab321931d5447b32b720
SHA256afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
SHA512a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
Filesize
500KB
MD511b7d40f7da57cbdc932963b1664876c
SHA1eed68d3698be52c344cf1fa0a4290074ebea0690
SHA256d185065bb6cc8d42043822305d4779829610829b2c0053087181b24e80cc466a
SHA512387a83148b6de771a44f5695592b8e0e498811f6beb5ecfc107e8c0f111056aa0093b186f1b2981679976c6caf1cd0130f16119f2fb3f1b229977c470f790af5
-
Filesize
1.5MB
MD571913f716e9605100dba2b605abeb469
SHA1f04aed38771c2b30df157782aa8399335c480608
SHA256cda62ef1b7775ad3f02dd45231de3afb2c2b3d6f4e0e7ce42f095219958f8654
SHA512f3376f64ef018630b1edc46c037132300b2bceffc597c56c587655c9520669e14310a5ec7d4b025525c3e80da664d87b7d61157875bca40e02eea4d8e42d8d56
-
Filesize
1.3MB
MD5ac2a45f729aa9f34910e6757735567c1
SHA169c32c33f52ecf75094f77000a5f14374eef5a1b
SHA25644368f032ef2fbb9dd9b1bdd32c4301cc8e3ad430fb7b9f9077a381232a458f4
SHA5120db48a7b06a5721b1860c101ff9641d5b79185420c94408a9f1a4a801e779710f9bac8604693defa182c6451a78ab6dcc335c2effa4d263f784114843e6b93f8
-
Filesize
89KB
MD5f6c799db2b867a8ddf38fab0411cc277
SHA1dfcdf938062dc0881d485a4bbf4eb6cbf70ecdae
SHA256c08c575dc98017a7a283550526225fb97dce01417579504d62819095a995a0c3
SHA51260f8fccc72ed65f0e75b02ff5603c27ac232ae3ac177b2951732c3e06b69189250dedbd3ea95276af5d81d3678236018b12ab3040162022cdf2fcc7184fabe89
-
Filesize
1.8MB
MD5a11afca60cd88e89a2f5aa480014d539
SHA1a2bcf40e5217d5da76eae41cceae326e93cae01e
SHA2567d913e7decf2a6ec70533e9af6b81bd693eee0260b32346bc44720e8148d4124
SHA51249f94e6b2c5dfd27cb1fa96d0b2e4e56684e2f2c21f5324f6f7ef213d9c8c74b4325e4b17bf5a7b42cabdffe774f3489d0df208a2e34a3247545351a67d30b5e
-
Filesize
451KB
MD5b2b60c50903a73efffcb4e33ce49238f
SHA19b6f27fc410748ae1570978d7a6aba95a1041eea
SHA25629d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1
SHA5122c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126
-
Filesize
541KB
MD53b069f3dd741e4360f26cb27cb10320a
SHA16a9503aaf1e297f2696482ddf1bd4605a8710101
SHA256f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e
SHA512bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9
-
Filesize
179KB
MD5453215754312c4313f3f0a9c071b6425
SHA1fbed31ae426d6334418d66848673dae7d3f07b70
SHA256d7c06fb2412b7c22b7b5c417eef96eb368843cc512dc0babcd38626f95f38b52
SHA512dc035862e5618e44913edc8419aa2fae53763f35e8044e9e5407ce78420549febb1c26658182ff18bc1915848e6e85aac7e0d4c533052ce1cf9c2c9da2dbf851
-
Filesize
1.1MB
MD57a38d76606a4415e78120dfc8b30fc3d
SHA16b3cd359229f78377b551792267dc10fd42b9772
SHA256196080f3a46c02560f261b84830b0ba5a42da1b13c90e6e5abcf6aab25ef032f
SHA512179fd316b4878a0d4a38a6d11566fc4357f83a952f11620c8d79e69302daedbc93a04961c76428a9c7b8c48bf8a5116f0e612edd3c25cbd9e5cfce27320f505d
-
Filesize
64KB
MD53f9c11d6040e389745a1ce7933dae8a9
SHA185b21ed68c79eebf658d10cd9098801575a38c46
SHA256b670f3b22c900d03fd1f72378140c357b9623e01ad9d9172384de6349dcf6958
SHA5125aca6a08eb55c0737dc7f57d95f9031a72124718a16e2c31d0eb743a6a22cbf62aaa03ee0abd502777a1d4e84ecc301f95c01953d0f236c4281babc9f76da4ec
-
Filesize
1.7MB
MD585a15f080b09acace350ab30460c8996
SHA13fc515e60e4cfa5b3321f04a96c7fb463e4b9d02
SHA2563a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b
SHA512ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f
-
Filesize
316KB
MD53c970ed4f7760ca59cf73e92cb3085bb
SHA15b05ed69970dbca8fbcd55abeee57f47b6c5cab3
SHA2563c81277ccac8102cffb8756e1bab20483396dd663f2c1e982948d765ba4ce87d
SHA5123f8861208e28389d462c0ff237c37a4893fec91c405037f1317bccb16ce3214ef84c63bd6238b2f95965535181e4671d5c213f171de9d041253b0288b2cd3c72
-
Filesize
611KB
MD5b6523a0cb4610640f31ccb33af688249
SHA1e258824b31b5702a498dcc84f4fc74cc59e75954
SHA256b656093530602471951130263d4622758d74c58a1f3e448ebd6c2c99262c2f2c
SHA512401e1fd8d744044aaa9638b162ad8f252f50a50377b8038f9f618041d181a2ce160c90fa7f669de20f2073336c71a49f7a8b1a048fd830349fbd11c0bf3ca469
-
Filesize
360KB
MD5eb3d593267f9885b8024dcdac14e538a
SHA101c582e964fbd3037a6b38acd460b80b6dc0e311
SHA2563767531d7f152ef71a8716d557228c40069c7ce9f16eca2b5c3efb8c0119c0d0
SHA512105f3c04be1735dfa2fb154e2184742f414d49ab3928126764d6f04cbee012b9901cbf6c5679a71d5c6d8de11b31b2e21bb8717780439f57e014e7142d2a2393
-
Filesize
832KB
MD5e3c0b0533534c6517afc94790d7b760c
SHA14de96db92debb740d007422089bed0bcddf0e974
SHA256198edf9613054f8a569ac804bf23081fbfa8566270fff05bba9dc3c9a32d9952
SHA512d12631796afca877c710b9308d1236fca1bfe3abe6582445d9df1bbb404160cff220316e3f600b3a87b46dd3bfb859734008b5c668e410466e82be9dc033249e
-
Filesize
350KB
MD504df085b57814d1a1accead4e153909e
SHA16d277da314ef185ba9072a9b677b599b1f46c35b
SHA25691a36d137ebfa812b055728807e11338d15d3a5d869cb4babdf779266688e4dd
SHA512f37678424e46e4f28e1047161db60ad737515558c8c8905ed598ca96b198304da7356e49e7bb9d1e77fe75372f0b5a7f670a353d093749c37bb85c40ec7fdafa
-
Filesize
464KB
MD57599133127d8efd9d32c0d7d23bb8d7e
SHA19ee25aef60cb92fc014ec8ff4591e938d29f41ff
SHA25632b6c62576cf668b8735accafd271f8ed7250ca15fa1c3876ea82d359502b3b5
SHA5121df87da263c834a98bb172f6e400d5c8d134a534ea00420858fbe28758cab2858d92f468648a66c4decae906ee34c5a237fc37fa5c7ee59eb71cef92edc41f18
-
Filesize
4.7MB
MD54645adc87acf83b55edff3c5ce2fc28e
SHA14953795cc90315cf7004b8f71718f117887b8c91
SHA2565a03eb8534caf92f4c3d7896d1af7fe61292b5f0995567be8c783ab28c3b74f8
SHA5123d8853dd1f28062f7554628565bc62e42296b0ab69da28665bf29771d78c50fdcdb2432aea09dbeb69d935e0dcf6d3b703af8ba1b7a0aed70b5be93b7959c602
-
Filesize
4.2MB
MD543b4b9050e5b237de2d1412de8781f36
SHA1125cd51af3ca81d4c3e517b8405b9afae92b86f2
SHA25697bb5c78c753aa5e39ffc3d4c1058f584d0241e9b19aff20a248f1f159fdca6d
SHA51224e90d5a5d4a06e0d62ff2b5bc91e686f5cdb2e77fb4c31ef3b6a59f62afae9fc6642bb57576c334e46e234d10300a2814cca747cc315b52ea63b0226a6695d3
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
316KB
MD5186c557ac1202fbf5c3e7a3c59160dc2
SHA1909596bf0058767d8bcdcf67f6bdc0ecf960ec90
SHA25645adaf06099b3fe4b99755bfb693a7bc08bfd89e4f6697934c446c0d1f8bbf90
SHA51294cfb5be5d43f8529a2223c1298d25c969f0818a2ff23b9b0cd9ce1a63a748daf3d881177d1fe344527c3983641d215fa127c62266fee51f49db1d5aa4ee6bfb
-
Filesize
2.2MB
MD5e69125300a060d1eb870d352de33e4c3
SHA160f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea
SHA256009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355
SHA512257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9
-
Filesize
1.8MB
MD5b8b5138dc6f97136cfebece16f80203d
SHA1e020d3ac6d101791801e8ce8c921a5f54f78abf5
SHA2567d1e736b876ad9f4effc5736323bbb1db9d53b49abda5a13d238cbe5f56e136c
SHA512f26e295c0845b57520ee8392761c532527ca41974f68f189bb37637b45455edceb098ca23d2952e495635719a8da8a39d86d880467bc6ad79071afd870dd9877
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5023ab9f0462e53d600df8572d391167f
SHA181a55f3152cd04c00a432a12b3ae98eca2f2bae6
SHA256e3d801710e9b879c8ae3b9a0e19ef2bdb3a5510578dfe609a56eab3d874ee380
SHA512c743380cfa3e2ba28439402d07967d8f4de6780de4e17ae06c0836049d6e47f457be93ead0d8ae41d9d4ee2289284d7949de1a6f4bca250b81c63e5f61416752
-
Filesize
3KB
MD5ef907965ba4bb8b677831ceef6c25be6
SHA1e4758a545fd7c0463f4d95c8010a5c046d55e316
SHA25664f7d9a05d8e20ad7872b6d9dbf36b5774adcb83f04d80d26f614118ae8a85ca
SHA512799fedc4bb4237b3192d2410de5417b851d5edada1408f8f6c8c85c470a036b6dd51b8c3b7e0b17741e281b5a225bbd24d1feae146ec32098fe1a9af3d1f69df
-
Filesize
4KB
MD59ba8c34c67cba57da8596f999f31aaa7
SHA18be3297113b5549ea5c6683b8aa2a52c21fb04fc
SHA25610e79b76455b14a663adbff797b959733906b512c2790be192ace5d5a1e85d3f
SHA512065f0440b48101b236bd80c2c0fadc0327d40cbef2a760de9cb1d0b12591ca6924e184f10a6ab821ef8aae300c8011a8a20502edb1ad1bcaa5fd9c70ec6ea700
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
315KB
MD5ae2b67fe16f078fc5d8c242c0abf128b
SHA1383059bcd455c8ae9d23e7f3679581ef54eca567
SHA2561fc92b44f6be765911febe55ccad61e184f84ab651f49f4e7095ffbe134e1ea2
SHA512f318aa58926c0c50a8f307b7592685897a8321ca5551efe7dc513946558455f0ffbf1554e81a6eaf76d3ebd9b057a77eeefc07a4c7a39905937d7bd00d4e7735
-
Filesize
2.9MB
MD5f15dba86e608dcb3ffde2ba6f816f3cb
SHA188c67a22b2be3bb08ad0e0cc502a4d45088da3ce
SHA2564472cfcea09329e6f767078d0b7be5962e1e3c43e8a65326645111d780a1d3b4
SHA51212c8a54cefcfef092e5c2e7766be927995a87b9c4c4f2de891b641e81dd822a91892a6aef5091477a88731c783a6bb60e68a8f9e279462a7f380ec445dbce361
-
Filesize
1.5MB
MD51f0189d6d6f0e58a8ed2e988ab753ef0
SHA144c7f9e627e9771f978a41696590474a853debd6
SHA256f637c3fb5710f0f58d4016480ff04a4a08bf1b7efd7dd762be69bb36a7f1306e
SHA51239002e3edd3ac06aabc0dbf0a0154942781f1967f33183d87121727d3b0bb3ed8f54b97532994e4e950b38e0e4b3a46a955ca863f27a78caec34a64291fa5e36
-
Filesize
1.5MB
MD5a993d62aad1846d2969f51025a99bac6
SHA1df41117fc6836fe15f646d36d23bbe62fcee3330
SHA2568dc3cf8db2efb1192abb1a81e415e73abfddf1701c555bb1d582f68b6e2f8192
SHA5124f4a9134a797390ccf1aa897f156fe84587e0c7b9ba1bbecb3bc0449cf6da5e0925557dc9fe0269d328327170fc1cae41a61330eef8f9edde65ef356af5ee65f
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
25KB
MD5d56c2f270044d00c7030dab5646d291b
SHA1410ab0f271c2924c6517b8845b2daf6ecc0bc119
SHA256381a7b216203fe0d47caafdb2d0cf562b1345149ea80fdf2fa4cb806a8e70367
SHA512a5c9d748d94eec46c21f2949ba3761c250a91776bf75a8195790b92bd71621bc9e0fea88b20e83a518af7b85442a604467818b99df9513e7da7887d1305bb585
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
1KB
MD55881ee7d0d790539bcfd3037e0ac16a8
SHA1fbd3990117e5ad0d66bf62253e924daeff516aa8
SHA2565e566c8cb35e5c47eeb7bdb08f84553ca7249d43a5c15f200f3d0a3b0f5728b9
SHA512fc9c759b6f1e436088bf20a8a9114737a1ba4af995ba82c6b0d8f015207fae85cab55bc8f9aa12aed6700ed2618fe265020b0bcd54937aad338e8e07f7be9a13
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
384KB
MD5c735f4832ed95f2910bdda3a715d56ef
SHA16a70e0666441b32077196fbb9be4e374bcc0d120
SHA256c4ce05978e7608dffa56e9499380a8b1dbc8307b600ecd0bc9e6a1068d82db36
SHA512f40ff750330c4c4026a4f5dbd75ba3cd7a808ca15d88db01a4849e5a36873b77b22139c79e27dbdfe94c155443058612cdb2156c780c3f3e3d6156fc158c29bc
-
Filesize
320KB
MD57231ad98e69d2ba58df80af3be66839a
SHA1e55424cf6e8ca49e73267a7896e212608f7ebf7e
SHA2562c75c357bcd4761f494cec669ef3425caa83998ebc2dbf96935527ca24c7c6bd
SHA512981f199058668fb9b340165ff083405533e4e24c671442994e8a474d157873b96aa78932f126926071907da4f45debeac0dbdea1c27fc238de130546aec49cc0
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
541KB
MD51fc4b9014855e9238a361046cfbf6d66
SHA1c17f18c8246026c9979ab595392a14fe65cc5e9f
SHA256f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50
SHA5122af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12
-
Filesize
304KB
MD5cc90e3326d7b20a33f8037b9aab238e4
SHA1236d173a6ac462d85de4e866439634db3b9eeba3
SHA256bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7
SHA512b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521
-
Filesize
2KB
MD5b32b002de392a0a194f98097dc86255e
SHA10cbcbface9bdffe63ad459c911d456ba3b00d2b7
SHA256a3199e45aab88e652fd0e1bc892ca03f6335964d881b2b409b0b6f131105c4f1
SHA51250deefa1a3685b7b4caea545cf6b1e6021dacfc1c121280775567130a03e95d860e37c4bba86847fe240535ba5cab186e8196b82566750657327ae404f16006b