Analysis
-
max time kernel
99s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-04-2024 15:42
Static task
static1
General
-
Target
713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe
-
Size
2.9MB
-
MD5
03e730ba718be34672a8b628c5d9edc0
-
SHA1
7a02203c03edd433dd0c500d80880a5e18a80433
-
SHA256
713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6
-
SHA512
fc6ce53929143c05ed007f1763bfae1b107e90f25913b23996b26b86ac6112b0d1016889d318eb4df1fc2cfb828f64df816f0eedc11341e83887cebfdcd80101
-
SSDEEP
49152:g9mio7tXs7BqfKuDeNZ5ZkYq1TuyaMg1zFNUTj:Qo7tXs7Bqz05p6TuH1I
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
risepro
147.45.47.93:58709
Signatures
-
Glupteba payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/3768-584-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral2/memory/3768-624-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral2/memory/2648-625-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral2/memory/544-833-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral2/memory/1476-834-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral2/memory/544-940-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral2/memory/1476-944-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
UFKR18i8F2F8sCqD8fhES1AS.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" UFKR18i8F2F8sCqD8fhES1AS.exe -
Processes:
file300un.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
Processes:
UFKR18i8F2F8sCqD8fhES1AS.exefile300un.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ = "1" UFKR18i8F2F8sCqD8fhES1AS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe = "0" file300un.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
chrosha.exeexplorha.exeUFKR18i8F2F8sCqD8fhES1AS.exe713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exeexplorha.exeexplorha.exeamert.exe0cff54a004.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrosha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UFKR18i8F2F8sCqD8fhES1AS.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0cff54a004.exe -
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 44 2016 rundll32.exe 45 1408 rundll32.exe 93 5840 rundll32.exe 98 5904 rundll32.exe 45 1408 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 5936 netsh.exe 3992 netsh.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorha.exeamert.exe0cff54a004.exeUFKR18i8F2F8sCqD8fhES1AS.exe713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exeexplorha.exechrosha.exeexplorha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0cff54a004.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UFKR18i8F2F8sCqD8fhES1AS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UFKR18i8F2F8sCqD8fhES1AS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0cff54a004.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe -
Drops startup file 6 IoCs
Processes:
regsvcs.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XoVrANc5jWbxbcaSjp7I5GYy.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0uQbiFhw9rhkEhJlK2064Mvt.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jp7ljCJMMvXy7U7LgSCkn9UM.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NHMbdQwjxKWAakJwAHdK9uqs.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aaMeMlZcF2SifmTBZmhN4S7d.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\E6SB4yx6VhYUn7H8tlr38Og8.bat regsvcs.exe -
Executes dropped EXE 24 IoCs
Processes:
explorha.exeexplorha.exeamert.exe7646ca2722.exe0cff54a004.exechrosha.exeexplorha.exefile300un.exemXvTe1U48oJGd9zN2dhSR0YE.exeDzQuBkvbEM6BGCsK9Sntk0ne.exehOweUv2OreQy6EE5XLgDZ7bm.exeUFKR18i8F2F8sCqD8fhES1AS.exeu1f0.0.exeu1f0.1.exewtd56cyxOffP28QyEpSNMJS9.exewtd56cyxOffP28QyEpSNMJS9.exewtd56cyxOffP28QyEpSNMJS9.exewtd56cyxOffP28QyEpSNMJS9.exewtd56cyxOffP28QyEpSNMJS9.exeDzQuBkvbEM6BGCsK9Sntk0ne.exehOweUv2OreQy6EE5XLgDZ7bm.exeAssistant_109.0.5097.45_Setup.exe_sfx.exeassistant_installer.exeassistant_installer.exepid process 4308 explorha.exe 1728 explorha.exe 4780 amert.exe 3772 7646ca2722.exe 4136 0cff54a004.exe 2228 chrosha.exe 4772 explorha.exe 1032 file300un.exe 1836 mXvTe1U48oJGd9zN2dhSR0YE.exe 2648 DzQuBkvbEM6BGCsK9Sntk0ne.exe 3768 hOweUv2OreQy6EE5XLgDZ7bm.exe 2824 UFKR18i8F2F8sCqD8fhES1AS.exe 4548 u1f0.0.exe 5672 u1f0.1.exe 6032 wtd56cyxOffP28QyEpSNMJS9.exe 6088 wtd56cyxOffP28QyEpSNMJS9.exe 772 wtd56cyxOffP28QyEpSNMJS9.exe 5504 wtd56cyxOffP28QyEpSNMJS9.exe 5624 wtd56cyxOffP28QyEpSNMJS9.exe 544 DzQuBkvbEM6BGCsK9Sntk0ne.exe 1476 hOweUv2OreQy6EE5XLgDZ7bm.exe 3008 Assistant_109.0.5097.45_Setup.exe_sfx.exe 6116 assistant_installer.exe 5484 assistant_installer.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exeexplorha.exeexplorha.exeamert.exe0cff54a004.exechrosha.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Wine 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe Key opened \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Wine 0cff54a004.exe Key opened \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Wine chrosha.exe Key opened \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Wine explorha.exe -
Loads dropped DLL 15 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exewtd56cyxOffP28QyEpSNMJS9.exewtd56cyxOffP28QyEpSNMJS9.exewtd56cyxOffP28QyEpSNMJS9.exewtd56cyxOffP28QyEpSNMJS9.exewtd56cyxOffP28QyEpSNMJS9.exerundll32.exeassistant_installer.exeassistant_installer.exepid process 2856 rundll32.exe 2016 rundll32.exe 1408 rundll32.exe 5804 rundll32.exe 5840 rundll32.exe 6032 wtd56cyxOffP28QyEpSNMJS9.exe 6088 wtd56cyxOffP28QyEpSNMJS9.exe 772 wtd56cyxOffP28QyEpSNMJS9.exe 5504 wtd56cyxOffP28QyEpSNMJS9.exe 5624 wtd56cyxOffP28QyEpSNMJS9.exe 5904 rundll32.exe 6116 assistant_installer.exe 6116 assistant_installer.exe 5484 assistant_installer.exe 5484 assistant_installer.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\UFKR18i8F2F8sCqD8fhES1AS.exe themida behavioral2/memory/2824-398-0x00007FF7FE4A0000-0x00007FF7FEF82000-memory.dmp themida behavioral2/memory/2824-400-0x00007FF7FE4A0000-0x00007FF7FEF82000-memory.dmp themida behavioral2/memory/2824-402-0x00007FF7FE4A0000-0x00007FF7FEF82000-memory.dmp themida behavioral2/memory/2824-403-0x00007FF7FE4A0000-0x00007FF7FEF82000-memory.dmp themida -
Processes:
file300un.exeUFKR18i8F2F8sCqD8fhES1AS.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths file300un.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe = "0" file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ = "1" UFKR18i8F2F8sCqD8fhES1AS.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7646ca2722.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000055001\\7646ca2722.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Windows\CurrentVersion\Run\0cff54a004.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000056001\\0cff54a004.exe" explorha.exe -
Processes:
UFKR18i8F2F8sCqD8fhES1AS.exefile300un.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UFKR18i8F2F8sCqD8fhES1AS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
wtd56cyxOffP28QyEpSNMJS9.exewtd56cyxOffP28QyEpSNMJS9.exedescription ioc process File opened (read-only) \??\D: wtd56cyxOffP28QyEpSNMJS9.exe File opened (read-only) \??\F: wtd56cyxOffP28QyEpSNMJS9.exe File opened (read-only) \??\D: wtd56cyxOffP28QyEpSNMJS9.exe File opened (read-only) \??\F: wtd56cyxOffP28QyEpSNMJS9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 75 api.myip.com 75 ipinfo.io 77 api.myip.com 79 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000055001\7646ca2722.exe autoit_exe -
Drops file in System32 directory 4 IoCs
Processes:
UFKR18i8F2F8sCqD8fhES1AS.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy UFKR18i8F2F8sCqD8fhES1AS.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini UFKR18i8F2F8sCqD8fhES1AS.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol UFKR18i8F2F8sCqD8fhES1AS.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI UFKR18i8F2F8sCqD8fhES1AS.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exeexplorha.exeexplorha.exeamert.exe0cff54a004.exechrosha.exeexplorha.exeUFKR18i8F2F8sCqD8fhES1AS.exepid process 1644 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe 4308 explorha.exe 1728 explorha.exe 4780 amert.exe 4136 0cff54a004.exe 2228 chrosha.exe 4772 explorha.exe 2824 UFKR18i8F2F8sCqD8fhES1AS.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file300un.exedescription pid process target process PID 1032 set thread context of 3488 1032 file300un.exe regsvcs.exe -
Drops file in Windows directory 2 IoCs
Processes:
713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exeamert.exedescription ioc process File created C:\Windows\Tasks\explorha.job 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe File created C:\Windows\Tasks\chrosha.job amert.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5528 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5616 4548 WerFault.exe u1f0.0.exe 5760 1836 WerFault.exe mXvTe1U48oJGd9zN2dhSR0YE.exe 3456 544 WerFault.exe DzQuBkvbEM6BGCsK9Sntk0ne.exe 5708 1476 WerFault.exe hOweUv2OreQy6EE5XLgDZ7bm.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
u1f0.1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1f0.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1f0.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1f0.1.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5376 schtasks.exe 240 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133579285911109863" chrome.exe -
Processes:
wtd56cyxOffP28QyEpSNMJS9.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 wtd56cyxOffP28QyEpSNMJS9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 wtd56cyxOffP28QyEpSNMJS9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 wtd56cyxOffP28QyEpSNMJS9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 0f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e42000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e wtd56cyxOffP28QyEpSNMJS9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 04000000010000001000000078f2fcaa601f2fb4ebc937ba532e7549030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e19962000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e wtd56cyxOffP28QyEpSNMJS9.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exeexplorha.exeexplorha.exeamert.exechrome.exe0cff54a004.exerundll32.exepowershell.exechrosha.exeexplorha.exefile300un.exepowershell.exepowershell.exepowershell.exerundll32.exepowershell.exeDzQuBkvbEM6BGCsK9Sntk0ne.exehOweUv2OreQy6EE5XLgDZ7bm.exepid process 1644 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe 1644 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe 4308 explorha.exe 4308 explorha.exe 1728 explorha.exe 1728 explorha.exe 4780 amert.exe 4780 amert.exe 1592 chrome.exe 1592 chrome.exe 4136 0cff54a004.exe 4136 0cff54a004.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 1472 powershell.exe 1472 powershell.exe 1472 powershell.exe 2228 chrosha.exe 2228 chrosha.exe 4772 explorha.exe 4772 explorha.exe 1032 file300un.exe 1032 file300un.exe 2484 powershell.exe 2484 powershell.exe 2484 powershell.exe 5200 powershell.exe 5200 powershell.exe 5208 powershell.exe 5208 powershell.exe 5208 powershell.exe 5200 powershell.exe 5840 rundll32.exe 5840 rundll32.exe 5840 rundll32.exe 5840 rundll32.exe 5840 rundll32.exe 5840 rundll32.exe 5840 rundll32.exe 5840 rundll32.exe 5840 rundll32.exe 5840 rundll32.exe 6068 powershell.exe 6068 powershell.exe 6068 powershell.exe 2648 DzQuBkvbEM6BGCsK9Sntk0ne.exe 2648 DzQuBkvbEM6BGCsK9Sntk0ne.exe 3768 hOweUv2OreQy6EE5XLgDZ7bm.exe 3768 hOweUv2OreQy6EE5XLgDZ7bm.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exepowershell.exedescription pid process Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7646ca2722.exechrome.exepid process 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 1592 chrome.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe -
Suspicious use of SendNotifyMessage 56 IoCs
Processes:
7646ca2722.exechrome.exeu1f0.1.exepid process 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 3772 7646ca2722.exe 5672 u1f0.1.exe 5672 u1f0.1.exe 5672 u1f0.1.exe 5672 u1f0.1.exe 5672 u1f0.1.exe 5672 u1f0.1.exe 5672 u1f0.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exeexplorha.exe7646ca2722.exechrome.exedescription pid process target process PID 1644 wrote to memory of 4308 1644 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe explorha.exe PID 1644 wrote to memory of 4308 1644 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe explorha.exe PID 1644 wrote to memory of 4308 1644 713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe explorha.exe PID 4308 wrote to memory of 4780 4308 explorha.exe amert.exe PID 4308 wrote to memory of 4780 4308 explorha.exe amert.exe PID 4308 wrote to memory of 4780 4308 explorha.exe amert.exe PID 4308 wrote to memory of 3772 4308 explorha.exe 7646ca2722.exe PID 4308 wrote to memory of 3772 4308 explorha.exe 7646ca2722.exe PID 4308 wrote to memory of 3772 4308 explorha.exe 7646ca2722.exe PID 3772 wrote to memory of 1592 3772 7646ca2722.exe chrome.exe PID 3772 wrote to memory of 1592 3772 7646ca2722.exe chrome.exe PID 1592 wrote to memory of 896 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 896 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4040 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 3168 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 3168 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe PID 1592 wrote to memory of 4680 1592 chrome.exe chrome.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
file300un.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe"C:\Users\Admin\AppData\Local\Temp\713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\1000055001\7646ca2722.exe"C:\Users\Admin\AppData\Local\Temp\1000055001\7646ca2722.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffac878ab58,0x7ffac878ab68,0x7ffac878ab785⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1780,i,6008172154086563742,14939695886924833334,131072 /prefetch:25⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1780,i,6008172154086563742,14939695886924833334,131072 /prefetch:85⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1780,i,6008172154086563742,14939695886924833334,131072 /prefetch:85⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1780,i,6008172154086563742,14939695886924833334,131072 /prefetch:15⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1780,i,6008172154086563742,14939695886924833334,131072 /prefetch:15⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4112 --field-trial-handle=1780,i,6008172154086563742,14939695886924833334,131072 /prefetch:15⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3028 --field-trial-handle=1780,i,6008172154086563742,14939695886924833334,131072 /prefetch:85⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1780,i,6008172154086563742,14939695886924833334,131072 /prefetch:85⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4472 --field-trial-handle=1780,i,6008172154086563742,14939695886924833334,131072 /prefetch:85⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 --field-trial-handle=1780,i,6008172154086563742,14939695886924833334,131072 /prefetch:25⤵PID:5332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000056001\0cff54a004.exe"C:\Users\Admin\AppData\Local\Temp\1000056001\0cff54a004.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵PID:4588
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
PID:2856 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\777591257247_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1408
-
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"2⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵PID:952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"3⤵
- Drops startup file
PID:3488 -
C:\Users\Admin\Pictures\mXvTe1U48oJGd9zN2dhSR0YE.exe"C:\Users\Admin\Pictures\mXvTe1U48oJGd9zN2dhSR0YE.exe"4⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\u1f0.0.exe"C:\Users\Admin\AppData\Local\Temp\u1f0.0.exe"5⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10926⤵
- Program crash
PID:5616
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1f0.1.exe"C:\Users\Admin\AppData\Local\Temp\u1f0.1.exe"5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SendNotifyMessage
PID:5672 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD16⤵PID:5732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 16005⤵
- Program crash
PID:5760
-
-
-
C:\Users\Admin\Pictures\DzQuBkvbEM6BGCsK9Sntk0ne.exe"C:\Users\Admin\Pictures\DzQuBkvbEM6BGCsK9Sntk0ne.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
PID:5200
-
-
C:\Users\Admin\Pictures\DzQuBkvbEM6BGCsK9Sntk0ne.exe"C:\Users\Admin\Pictures\DzQuBkvbEM6BGCsK9Sntk0ne.exe"5⤵
- Executes dropped EXE
PID:544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1988
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:5916
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5936
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5068
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:6056
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵PID:3960
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:2584
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:5376
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:6100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:3956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵PID:5480
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:240
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵PID:5968
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵PID:1864
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Launches sc.exe
PID:5528
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 544 -s 8366⤵
- Program crash
PID:3456
-
-
-
-
C:\Users\Admin\Pictures\hOweUv2OreQy6EE5XLgDZ7bm.exe"C:\Users\Admin\Pictures\hOweUv2OreQy6EE5XLgDZ7bm.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
PID:5208
-
-
C:\Users\Admin\Pictures\hOweUv2OreQy6EE5XLgDZ7bm.exe"C:\Users\Admin\Pictures\hOweUv2OreQy6EE5XLgDZ7bm.exe"5⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5376
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:1844
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:3992
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 7326⤵
- Program crash
PID:5708
-
-
-
-
C:\Users\Admin\Pictures\UFKR18i8F2F8sCqD8fhES1AS.exe"C:\Users\Admin\Pictures\UFKR18i8F2F8sCqD8fhES1AS.exe"4⤵
- Modifies firewall policy service
- Windows security bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2824
-
-
C:\Users\Admin\Pictures\wtd56cyxOffP28QyEpSNMJS9.exe"C:\Users\Admin\Pictures\wtd56cyxOffP28QyEpSNMJS9.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:6032 -
C:\Users\Admin\Pictures\wtd56cyxOffP28QyEpSNMJS9.exeC:\Users\Admin\Pictures\wtd56cyxOffP28QyEpSNMJS9.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2b0,0x2b4,0x2b8,0x28c,0x2bc,0x6eb1e1d0,0x6eb1e1dc,0x6eb1e1e85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6088
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\wtd56cyxOffP28QyEpSNMJS9.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\wtd56cyxOffP28QyEpSNMJS9.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:772
-
-
C:\Users\Admin\Pictures\wtd56cyxOffP28QyEpSNMJS9.exe"C:\Users\Admin\Pictures\wtd56cyxOffP28QyEpSNMJS9.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=6032 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240418154415" --session-guid=ae510d12-49ea-48d3-b9fd-99b445109ea9 --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=2C050000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:5504 -
C:\Users\Admin\Pictures\wtd56cyxOffP28QyEpSNMJS9.exeC:\Users\Admin\Pictures\wtd56cyxOffP28QyEpSNMJS9.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2bc,0x2c0,0x2c4,0x28c,0x2c8,0x6e19e1d0,0x6e19e1dc,0x6e19e1e86⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404181544151\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404181544151\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"5⤵
- Executes dropped EXE
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404181544151\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404181544151\assistant\assistant_installer.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6116 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404181544151\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404181544151\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x6d6038,0x6d6044,0x6d60506⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5484
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"3⤵PID:1464
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
PID:5804 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5840 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:5892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\777591257247_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6068
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4548 -ip 45481⤵PID:5572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1836 -ip 18361⤵PID:5720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k smphost1⤵PID:6068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 544 -ip 5441⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1476 -ip 14761⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵PID:5352
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:6012
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5a6eaa8e8512da841c62ee04bb5b10a59
SHA1aa371ace9175ac221469c83e71e3afa2d835520e
SHA2568360579b14d7975c0a063235c6d4a6613cfe036c9deb2ccb64b71e83accdc100
SHA51254c4e5c2b2cc7b634180990c07e76d351deb47776145ca45a46bff19e4e61d998a5992c8668f737adb03c82df476013861526e6945c9ce35c67291dae193c7af
-
Filesize
2KB
MD5ee58a3f1f0ff5232d6b8111cb870e7ab
SHA1ca0131d1b5908702ff9ce8ad6bf292658f3cbf93
SHA2563e395c9ba002866670d8a10565334cb7be25ffeff34f7fe8a76c2e659f17d23f
SHA512d01b0a3aa0b3b53ee808887034a2585260e7ecfcab2ef144ce264f6b1f86e7a7c032c459fd105810203d5845d48397b2b1863b2c65b9ca161188818bc9a3a598
-
Filesize
2KB
MD5d850134184b7ec66a58280fa69fec2ba
SHA1247659ead9b3ba076bbcaf77a5cf9ef715898cec
SHA256f1675ee2b6a85f7a875388921da0cb86fce85e232a70df68e1fa065d999475a5
SHA5129dc6cb1650fa7772ec37a09945f2b1890163bf2f42c51c80f8cb7d3b44d3821edbd613b1751520250ae90675ec43c5a07f7e399318240344b33d9ff215b35b32
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5d1e1989dc565b1499bc1806ccba06f7d
SHA151f9b3063ef12df31781bd453b262f26d583ba30
SHA25691a97cd6ebed613917dee6320f6bb9f072b7a9a1252be5978660fca95762e464
SHA512a0e5da04d773614f091d2b2cc52f3c2b52df9a25a34d18e22cb1c4cefea78648c532293ace9483cf1a2d1e5500e18f5112236aa7e08600f468cd62c2ab6aebb2
-
Filesize
7KB
MD5329096fc1009c04f981b0405b47b3b72
SHA1198b5326cf1792f0de96ae3b0ca552c9e0694d5c
SHA2561548e7eccc73f46c3b5e16767d84e03dd2f1bab954aa766cc278cf47bdc7a430
SHA51264e638e40d1671d62da97aa66440b5625ec237bdb5dd05289699f3f34897924487c937a9786796fd32fa26995e0c8d0e1bcf394ddbb0e6134ea48e1e8908013b
-
Filesize
251KB
MD5e0864e79ad43c1ead98a4c7d770c1035
SHA1cb5f6ea5b70fcf4eed0ccc9aaf8e942337e2ab6f
SHA2566590c94fb3f96344489383d782fa74f678770705a5506c74ac377ec106afae57
SHA512dc427edba986dd685db368405adc7e0dafb45db73f14add90f24a822022fcba82ef6882a5612d402166f06344a134a8e867f1a9703e1ea7853529cab1e3319c2
-
Filesize
3KB
MD5ae626d9a72417b14570daa8fcd5d34a4
SHA1c103ebaf4d760df722d620df87e6f07c0486439f
SHA25652cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a
SHA512a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
19KB
MD59627dc51675d49df1c2472cc9b53e048
SHA1f55a9d624310e72e75010c94b18614b17e711dbe
SHA256ef3dd3aa568f771146a152f2952bdc2f2a98117f319495db01971804ed32f99f
SHA5123fe5af7d50d256a719fdfdf40cd06f5a072b768ded88730853b67c850802b2005023eb46cd60b3d310c91803b5565ff3fc7bc005db1db84c7b8c0f62e7813409
-
Filesize
1KB
MD5b3a83d0196afc480a90a1e7444210036
SHA16376ef283df20976769287b3bdc6bcd5d5ce371f
SHA2563ac4190b1c447f3b5365b056150575ec779ffba10b82d940c93009e2f6809a07
SHA512dfff8f23370ae8ab390b8a3dd675dd71ca6a8d0fac0f0c9a8b43453763ba5fa96a79a4b5a8891bcac86996471b912ca51dfc6b877d647391d14e355191d77370
-
Filesize
944B
MD5ad710b09f5c11c011cabe6b92e5d363d
SHA120fbb454697ffd893718560bd1dbd2504469b5b8
SHA256777ee805d5c5797e2d8a5aad192acba10f07501bcad3772914284607db108608
SHA51291e3973259774ca3e8f14dfab1d6660b5dd3f92e338954072861f273aa2555c0cb2a5a81de06658d07fcfee3dcab4303e2980d382bb69f280758ace11d26f6ce
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404181544151\additional_file0.tmp
Filesize2.5MB
MD515d8c8f36cef095a67d156969ecdb896
SHA1a1435deb5866cd341c09e56b65cdda33620fcc95
SHA2561521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8
SHA512d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404181544151\opera_package
Filesize103.8MB
MD55014156e9ffbb75d1a8d5fc09fabdc42
SHA16968d1b5cec3039e53bbbedeee22e2d43d94c771
SHA2567a01e11e1830ba3c154e5a6c383da15938b1e48f89a2fe4045cdd260924b6802
SHA512bfc5c44881d0fa7bcbccfd530d874fa624adec50e1a16063a72de12876d2db10ca5edd6fa841ea63e9deca3ff2adf54065f50719fe051d41de92bb68edba4016
-
Filesize
2.9MB
MD503e730ba718be34672a8b628c5d9edc0
SHA17a02203c03edd433dd0c500d80880a5e18a80433
SHA256713cd004a6204a5e0ec7753c99ea7c3ba8229396dfced5627dffd8680d58bcc6
SHA512fc6ce53929143c05ed007f1763bfae1b107e90f25913b23996b26b86ac6112b0d1016889d318eb4df1fc2cfb828f64df816f0eedc11341e83887cebfdcd80101
-
Filesize
1.8MB
MD55abb99c3187d39e8fd12dd035a765f39
SHA145c00ecefbbf62cf6b0228aa58152f37a5d47e58
SHA256827a153e7f70b6345a29a7377980a3c80187126192ccc0775c5e9b71b933598f
SHA5129e56ca70b1d4b17168b887b8851b341de407b969b1b5c465eaa132b73294836d97e4db6af476ec18eab9c07ca85286c47d87f897a288460faa5679fa3f0dbd30
-
Filesize
1.1MB
MD533546136afc0d09a181f3444d9c7264c
SHA15f1bd196dc568299aa05211999cfef7970c83400
SHA25671bd3a4a876d34302700699f58da99d7cab7878dcb7a440a942cf6946d98f7b4
SHA512fa4ecd30b473e88030c99e004f9588f8cd24be4873da59ccef8eda4ab75a042138bbdd189c996d24dcf2f21ee50cbebc4930f8c9a85d0a3043635b0d88dec159
-
Filesize
2.3MB
MD536df7d16eb7e02d9e938fcbd0ff04cea
SHA13f28cac8613eda877a6da75f56b1c48c3dea3dd0
SHA256fb9b09c093a0caa2135717535ce142efe6b1639f6aa780f2794526bab3ec3219
SHA512a148047cf39714716251d693389e657163a533f16b8026e3708382e6ab74c86cbfa89f9ec9eedd89e8e884a6c5ed2679df35ec2baf9fe38e251716c03c9df567
-
Filesize
559KB
MD59ee0c556e1b952495a74709e6b06459a
SHA11b631e41b43d6f7ef3f7d140c1eb14ecf1cd861d
SHA2560e236536f9fc793be5f2e276555817d0bb9206e9d56904bc509188bc42515129
SHA5121ec91c9e0ab4e359be73677f81150922ed06fc58e621e2115d4c607afb94dbf69a8362db14a531ff6aba69b1dc8e3cd2a0aa0ba626320caa9c250060bbe44558
-
Filesize
4.6MB
MD50415cb7be0361a74a039d5f31e72fa65
SHA146ae154436c8c059ee75cbc6a18ccda96bb2021d
SHA256bb38a8806705980ee3e9181c099e8d5c425e6c9505a88e5af538ca6a48951798
SHA512f71c2b9e1559aa4eb2d72f852ef9807c781d4a7b96b8e0c2c53b895885319146bd43aa6e4223d43159f3d40bc60704206404dc034500e47fca0a94e53b60239e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD562600b2015612735d7aa8b0f7bd5fbe0
SHA170274188e947bf10374bb1b334985c71a4f34dbd
SHA256104f6285ecb88551ede806219c1587ccd021ffb1d5f82d76850d913af6af9a6f
SHA51219d1a0a95f38f503ed706fe865715e92cab8b157655c4d46f466c75f02fc83800b0b6aa2df0679306d8bde3337cabbd8e806ec2bb67c40e0b769ab6272fcac3f
-
Filesize
3KB
MD5b50bce877d4ed9ed0833f8630009ddcc
SHA15c0eb3d1d796c951ce44c9f35ed2c234f6e2f6d2
SHA256b12d495304dde5d46604c59bd298d923ce68023638dc599a818b67462f6f77a5
SHA5126e1c7d38032b03e2a6d7f22127ae2cdc74999093e4cbf6f4a56a8a00749bd59131fb9e971c62600063eb2594fe5f721beb6e03dfa82fb6c6b10b8a7c092bb186
-
Filesize
270KB
MD533d4908e1f29fdf496f576cee380f29e
SHA1273e70126dab9b45b4820f8af05cc4575925705e
SHA256e54774efd14dfd4473cad145f9db71433cda5133b88c822048342de96bcedfe0
SHA5129a74c8212ab2cbda8520ecc32632ed0630946d1432a0996cddd3186e26959995a12435bcb64000611e4edb45e1be490c617ba67dbc704e6e0829eae3c0a87cfe
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
40B
MD5dec67b83162ec5a22bfda8833cdf4406
SHA1e618383a9ab2e6bd1d5701c136ba8342f20e80fb
SHA2568c043e840232685997d9a9084cd6ad1a21cec727e7da91ef691f926e6df79ff7
SHA512673368a6b1cafae5af6f974a8a287982ff90fdf9b0bddb81c8d206981d513e315abfe4d1d828def7dd0bbe56e12fefdc564278667ed926f623157222a2c20f91
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
4.2MB
MD5e497ea444eadaff158450e085d7b3c38
SHA1d177434d06c78424835520eef0e139073ef11873
SHA2562f1b09f69d4c8e83edbb37dbc2614d31be587cda032b0bd3837dc5fa13fc6fde
SHA5126568f0a0c1328c4bdc2a0ce9fa6609304c02c226c23dae1031268ab962c27b9d2ed09b0f7d3875285b42fbaf35e2dd0179a1b882147d4592669284d5ba0fe826
-
Filesize
3.8MB
MD5193692e1cf957eef7e6cf2f6bc74be86
SHA19d1f849b57c96ca71f0f90c73de97fa912b691d7
SHA256fcc22a367ed0a8d8de94f5159ab12c32606f97326b832eb47327b7707ba457a6
SHA512d0bcad2b98e5efc9c767f9a6ad87a6d62638131753bff22b21b883d90c23be17b65594b6d8c4510b255f28806b2a1dc2a01fc0e2138c3146d6e64abcd4a37697
-
Filesize
411KB
MD5fbcdae36ca34d39c90297b86f8864c9f
SHA1d40d822d5a3118d86c2ca291292fef774d413df5
SHA25694838c226d5427c2dca469873f750da73bf501b4bf37c978c04d278ebd524909
SHA51200e01bb70f2e5ab537dad8caf5b302e0fe209b6ae2be34fa77a42e2ff1e674fdd8adec0348eae31594389be1e491e890fb3882fa2f10e05df4598322575a496c
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
5.1MB
MD5582667003bd6fad543aebf227199eedc
SHA17ed4b0fae07799069097f46472e4f7590ab0c17f
SHA25657c1906ba806ffdd1e53d1902d19dc61e3855307554ca30e341bee3e56a646e5
SHA512c713118f24bd4629c3042752795237164b7a679eed7f00a69f9bcaeca23305c153283e9a2b95231938e0bb861d2fce465f334cc0ee8dc65b030fc024e54067fa
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e