Analysis
-
max time kernel
125s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe
Resource
win7-20240508-en
General
-
Target
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe
-
Size
612KB
-
MD5
583401012980ccffb69c723f3cd5cce7
-
SHA1
b7f56e888ec9986e797e152c4c4c17fb69023b91
-
SHA256
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959
-
SHA512
8540195b297e3f20b3f89fe1130f2da939983ab541871a3cec5998cbb053628053eb53e2c4855b4e81d3f804cc499038af8065b7ea6bf563c798123b64883265
-
SSDEEP
12288:fpQrMIztyCK5x8CBmn+RrNbEyWYa0Ie1vUx0VRpY/s+0:fpKZyCA8CBmn+RrNj9ay51RpYE+0
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Processes:
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Processes:
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1144 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exe70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exepid process 2816 Logo1_.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Loads dropped DLL 62 IoCs
Processes:
cmd.exe70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exepid process 1144 cmd.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Processes:
resource yara_rule behavioral1/memory/2744-31-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-33-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-35-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-66-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-67-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-68-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-69-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-70-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-76-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-77-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-78-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-81-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-79-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-84-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-85-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-161-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-381-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-527-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-529-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-542-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx behavioral1/memory/2744-593-0x0000000001E00000-0x0000000002EBA000-memory.dmp upx -
Processes:
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Processes:
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exe70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription ioc process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\U: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\P: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\V: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\H: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\K: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\Z: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\N: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\T: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\S: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\L: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\R: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\X: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\I: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\Y: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened (read-only) \??\Q: 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription ioc process File opened for modification C:\autorun.inf 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened for modification F:\autorun.inf 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exe70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened for modification C:\Program Files (x86)\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.WW\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\{7ADE9966-696F-4996-9E1A-1D7786573DA1}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe Logo1_.exe File opened for modification C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\gChess.ico 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\gjabswitch.ico 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\gjps.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe -
Drops file in Windows directory 7 IoCs
Processes:
Logo1_.exe70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription ioc process File created C:\Windows\vDll.dll Logo1_.exe File opened for modification C:\Windows\bfsvc.exe 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File created C:\Windows\rundl132.exe 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File created C:\Windows\Logo1_.exe 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\f762433 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe File opened for modification C:\Windows\SYSTEM.INI 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
Logo1_.exe70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exepid process 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2816 Logo1_.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription pid process Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Token: SeDebugPrivilege 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.execmd.exeLogo1_.exenet.exe70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription pid process target process PID 2812 wrote to memory of 1144 2812 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe cmd.exe PID 2812 wrote to memory of 1144 2812 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe cmd.exe PID 2812 wrote to memory of 1144 2812 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe cmd.exe PID 2812 wrote to memory of 1144 2812 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe cmd.exe PID 2812 wrote to memory of 2816 2812 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Logo1_.exe PID 2812 wrote to memory of 2816 2812 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Logo1_.exe PID 2812 wrote to memory of 2816 2812 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Logo1_.exe PID 2812 wrote to memory of 2816 2812 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Logo1_.exe PID 1144 wrote to memory of 2744 1144 cmd.exe 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe PID 1144 wrote to memory of 2744 1144 cmd.exe 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe PID 1144 wrote to memory of 2744 1144 cmd.exe 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe PID 1144 wrote to memory of 2744 1144 cmd.exe 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe PID 2816 wrote to memory of 2716 2816 Logo1_.exe net.exe PID 2816 wrote to memory of 2716 2816 Logo1_.exe net.exe PID 2816 wrote to memory of 2716 2816 Logo1_.exe net.exe PID 2816 wrote to memory of 2716 2816 Logo1_.exe net.exe PID 2716 wrote to memory of 2096 2716 net.exe net1.exe PID 2716 wrote to memory of 2096 2716 net.exe net1.exe PID 2716 wrote to memory of 2096 2716 net.exe net1.exe PID 2716 wrote to memory of 2096 2716 net.exe net1.exe PID 2744 wrote to memory of 1112 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe taskhost.exe PID 2744 wrote to memory of 1172 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Dwm.exe PID 2744 wrote to memory of 1244 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Explorer.EXE PID 2744 wrote to memory of 1976 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe DllHost.exe PID 2744 wrote to memory of 1144 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe cmd.exe PID 2744 wrote to memory of 1144 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe cmd.exe PID 2744 wrote to memory of 2296 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe conhost.exe PID 2744 wrote to memory of 2816 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Logo1_.exe PID 2744 wrote to memory of 2816 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Logo1_.exe PID 2816 wrote to memory of 1244 2816 Logo1_.exe Explorer.EXE PID 2816 wrote to memory of 1244 2816 Logo1_.exe Explorer.EXE PID 2744 wrote to memory of 1112 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe taskhost.exe PID 2744 wrote to memory of 1172 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Dwm.exe PID 2744 wrote to memory of 1244 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Explorer.EXE PID 2744 wrote to memory of 2296 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe conhost.exe PID 2744 wrote to memory of 1112 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe taskhost.exe PID 2744 wrote to memory of 1172 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Dwm.exe PID 2744 wrote to memory of 1244 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Explorer.EXE PID 2744 wrote to memory of 2296 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe conhost.exe PID 2744 wrote to memory of 1112 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe taskhost.exe PID 2744 wrote to memory of 1172 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Dwm.exe PID 2744 wrote to memory of 1244 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Explorer.EXE PID 2744 wrote to memory of 2296 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe conhost.exe PID 2744 wrote to memory of 1112 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe taskhost.exe PID 2744 wrote to memory of 1172 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Dwm.exe PID 2744 wrote to memory of 1244 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Explorer.EXE PID 2744 wrote to memory of 2296 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe conhost.exe PID 2744 wrote to memory of 1112 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe taskhost.exe PID 2744 wrote to memory of 1172 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Dwm.exe PID 2744 wrote to memory of 1244 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Explorer.EXE PID 2744 wrote to memory of 2296 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe conhost.exe PID 2744 wrote to memory of 1112 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe taskhost.exe PID 2744 wrote to memory of 1172 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Dwm.exe PID 2744 wrote to memory of 1244 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Explorer.EXE PID 2744 wrote to memory of 2296 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe conhost.exe PID 2744 wrote to memory of 1112 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe taskhost.exe PID 2744 wrote to memory of 1172 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Dwm.exe PID 2744 wrote to memory of 1244 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Explorer.EXE PID 2744 wrote to memory of 2296 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe conhost.exe PID 2744 wrote to memory of 1112 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe taskhost.exe PID 2744 wrote to memory of 1172 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Dwm.exe PID 2744 wrote to memory of 1244 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe Explorer.EXE PID 2744 wrote to memory of 2296 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe conhost.exe PID 2744 wrote to memory of 1112 2744 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe taskhost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe"C:\Users\Admin\AppData\Local\Temp\70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a22BD.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe"C:\Users\Admin\AppData\Local\Temp\70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe"4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2744 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2096
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1976
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "386333227-14893388841441367332-10895862594644664991947629895-7482887031889766231"1⤵PID:2296
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD50f097461fa47aa96a93e30f7d2035d90
SHA1abc83b6cd09069111bec2e0a3d5fab263031eacf
SHA25634cec2dcca6d44f6749fb03d884bef2e35afc78b9243ab2655f8571961bd045f
SHA51263392200161e9cd6c954b562408828193d6ab6627c17338a24c805ecec673ca5841d4e12fcd75421f27bbc6849018ace4aaf676e5b27d1d8e778542db0f6d46d
-
Filesize
521KB
MD5ff53be899f715d55051fe238ed2dcdee
SHA1b038619c467b813d510d9f0b937fd393e6f45468
SHA256bc64910c45ed35d85dfe9c4a3b47da40bfd1f7d8d9476c2fc0f6ab4a84810edd
SHA51260c75ad01599c816b5f96438de47fd0c455572be59d6849dbf5a24f257ae9375fbf6597cc854ef8898f64360c615a22be0118712d2e136b6d8712ce772f1886c
-
Filesize
4KB
MD538b41d03e9dfcbbd08210c5f0b50ba71
SHA12fbfde75ce9fe8423d8e7720bf7408cedcb57a70
SHA256611f2cb2e03bd8dbcb584cd0a1c48accfba072dd3fc4e6d3144e2062553637f5
SHA512ec97556b6ff6023d9e6302ba586ef27b1b54fbf7e8ac04ff318aa4694f13ad343049210ef17b7b603963984c1340589665d67d9c65fec0f91053ff43b1401ba9
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD5d10cd0bb6ae0b1484feb176d73ae1386
SHA1f41d93685b20400dac6d4da83ddc7bedf83c9ec6
SHA25620108ac0eccb83bb57e75c38994458ca29b827ddc1f1f2dbba3d74e8872ea19a
SHA5125549f51c448403d9ce5007009b85d16a0877989a65ef1eba71b101f72d031e1ba6e6e624a4e02581385ae9df639803fed7e1fe4a2ddd1849811bbf05c53313ee
-
C:\Users\Admin\AppData\Local\Temp\70d1a1554071372e73e495e809de5b70e1c1305d5fa8d11012c38096e4d48959.exe.exe
Filesize585KB
MD53a74db3473f99ec0c7cda0fe71f1f629
SHA17c8aa3b4900b41504ef879fd31df39213d472583
SHA256aded4324e2c30b5c8a43654735c624c20fa75af987807df0804cfd38e89adba1
SHA5129bcea2642e05a80d2b52d5dff9b1a5181d3dde8adde12fe5f7c080296ffdef5cb2e5232128c22fd109f66ab025a1e9dde8299f986a8321a123491f5ca3a4d801
-
Filesize
27KB
MD52131b24dd8f450aee38379e5f4d8e03d
SHA1ae22b4b4341c7ac99a9a88d27722fbdb95336d03
SHA256a67439004db54760ad766c8c5ca5f3e7ab7a207a7250c16198251c69e94cd916
SHA512dc2dab3fb3ea7f78b2787bb5f5fc417981c5d0aa93a8b60e1bc4ec297db63bd4824fc128a332d15fef652172ba6f26cc78e43a2cfe4786c9b03b87e0ee03acf5
-
Filesize
9B
MD5de299d58575b595bc358a5c5edd0767d
SHA10d30c906a5b5647289c7788d31dd3afd642350a4
SHA25632ef1af1131d89e96d59ac0d3f8e232e839355587a679a2df2479b5277a704e3
SHA512c8e20bb98c427a3a0eea8769df090d59353f0b484321e82b381cfca18b111bd1d782713f2f5bf815e5832a0e12ec909a0324fe9ba013c626327cabf27a464bbc
-
Filesize
97KB
MD5121a0f6a018bb147e8247650fb383242
SHA1ffc43f98096d9a1b396a745811b3500ec5a54f0f
SHA25659251fc857f28f03df53aa832d6a67e24ead71e3cb35350ff264c49d1a1b91b7
SHA512a6dbb48d3bc05a7c6b49ef726d5332542fdb950c86efa15203349e8718a8aa75d75d9a4b125b652f2c34cb50733c98f5c0e81f0cf793accc66e4cca9b82da8df
-
Filesize
544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
14KB
MD5ad782ffac62e14e2269bf1379bccbaae
SHA19539773b550e902a35764574a2be2d05bc0d8afc
SHA2561c8a77db924ebeb952052334dc95add388700c02b073b07973cd8fe0a0a360b8
SHA512a1e9d6316ffc55f4751090961733e98c93b2a391666ff50b50e9dea39783746e501d14127e7ee9343926976d7e3cd224f13736530354d8466ea995dab35c8dc2
-
Filesize
118KB
MD5f45a7db6aec433fd579774dfdb3eaa89
SHA12f8773cc2b720143776a0909d19b98c4954b39cc
SHA2562bc2372cfabd26933bc4012046e66a5d2efc9554c0835d1a0aa012d3bd1a6f9a
SHA51203a4b7c53373ff6308a0292bb84981dc1566923e93669bbb11cb03d9f58a8d477a1a2399aac5059f477bbf1cf14b17817d208bc7c496b8675ece83cdabec5662
-
Filesize
4.7MB
MD561bffb5f57ad12f83ab64b7181829b34
SHA1945d94fef51e0db76c2fd95ee22ed2767be0fe0b
SHA2561dd0dd35e4158f95765ee6639f217df03a0a19e624e020dba609268c08a13846
SHA512e569639d3bb81a7b3bd46484ff4b8065d7fd15df416602d825443b2b17d8c0c59500fb6516118e7a65ea9fdd9e4be238f0319577fa44c114eaca18b0334ba521
-
Filesize
97KB
MD52abe4614a5d80878832fc7e91c8a3146
SHA13808489961c56e3cf49f8791c152c7db1085107a
SHA256259be6f52760b376a5b8b53211e5405fbf4bf2339b63d341df2dd9d7a7bcf041
SHA512f461297fde475649eb6becf576a932b6eb65f102c3674cfbcd5d4c8027d23e38c46dc8abef0d53d0b6441f5630930d34ffb5706bdaf0c19ee6c4f2cb2e59edc5
-
Filesize
4.3MB
MD52161730a7ae00a1fb8c5020a43be949f
SHA18db6b820472cdfa266c874e0d3a9395412995aa1
SHA25607e7896b2304e3b9966294a02d2ed32f41994ee7bd0a284e4160743edaeb9e15
SHA512aa3659b6184f4273b7fcf1f7d2cd0a5a9129b8856d15e4ca8904b709e85cd432538ce0510ca9777760a1a9d5391671232a79908860e7d665260a54910f6fea5a
-
Filesize
1.6MB
MD5527e039ba9add8a7fac3a6bc30a6d476
SHA1729a329265eda72cada039c1941e7c672addfc19
SHA2564b8a72fc81b733ed2e6e70d4c5401f954002783dbf14927849ad579860780b94
SHA5129e73e14e33a5f07a87e9c1fecfdaee09d1408471052aacfde3d1e877dad4d253b525ebefca6bddabc23cf81d8dcce0785aedcc2f135d171ecbb1feaeb922c449
-
Filesize
1.6MB
MD5ec6386b63c3a5ffe0577905e94262c3a
SHA18f8c428d0e7f32c9d733ca28384ded413a060588
SHA256302c968ab3e1227d54df4e72f39088d7483d25eeb3037f0b16bc39cef2728fa4
SHA512ddbefb759858493de1f9d7addc6ff4488c8be3164374e0a88c3cbe97751510005dfe6d91c5499fcbdc35aa33a8eda2d45591a66e54ab9462277dc833faef77c3
-
Filesize
1.2MB
MD581664a918656ecd5e8eca90cedba1150
SHA1580d0eb98bb2c838ff89eb54efd86535ee8882f6
SHA2562f664c756727c321a3a0fb6c6e68842ca1a5f20575a02312ea10675dbd5dc40e
SHA5127a211a01c674aaa5e8052dd339b412892c452309b651e835f0b8e27f15ee3fed42c58f43910a202150ca90704f522499deb7bca055451f1e6c8515b2d491df3d
-
Filesize
2.8MB
MD5095092f4e746810c5829038d48afd55a
SHA1246eb3d41194dddc826049bbafeb6fc522ec044a
SHA2562f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588
SHA5127f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400
-
Filesize
1020KB
MD5b65d7344b0a7faa207d2e1a7adaafb60
SHA1755ad15b1745b0e730d658d4a92e2b754425b7db
SHA256f4b91fbbcba8a46eefe4965e4a24c6ede3decbd1fec96e141a1953173efd1c92
SHA512f17ac73c2df7c73a31b11ce0f533d6db91bdb0cdeea653dcd52ac72c3cf28da0c236b79586ddc7a6c825fdd171290722f888465e776f12ac2cae75be82726b22
-
Filesize
15KB
MD5c9aaf1247944e0928d6a7eae35e8cdc4
SHA1af91d57336d495bb220d8f72dcf59f34f5998fd3
SHA25605b153ba07dc1a262fb1013d42bfc24d9000ce607f07d227593c975cdf0bb25b
SHA512bf3bc64135810948626105a8f76dc4439e68ee531f20d901c3082ae2155f2ea35f34d408de44b46ede61ded832fcc61ac1cb9719e432f0f07b49479c95847e51
-
Filesize
15KB
MD5407d2d7dab36cdea871d4c6b9c62b258
SHA186cd158ad810c6772c22a5799c7acf4b9d7c9f57
SHA2563c040679ea4be0cc5ca20c9f24caf6c13d3002560347e7446dc963b611523bd9
SHA512dcdb53a3ca2a3637216a9d8133d1dbda336a6d3a98c6b956af42f94adbc136dc5a0245e87512d0314f23dbf3cab4900bc40ac13c79ee93a677d93a89e0cd9e17
-
Filesize
15KB
MD51cb4c95888edfdedb61628680fffd415
SHA13336670c701c61bb8062d7620c4244dbc01756d1
SHA256182d8ab5ec2ee2ec57d60c2d2d75df6c852810e74c50289aa9c2c99a6b050fc6
SHA51224c8c05baef516fba5aa763c0abc603065a75e5816501c713b24ec8baddad4fc290b3973dad89ac65f09d0277c2fa72d8b00f0eb2871170dbd89a8d9062bacf3
-
Filesize
15KB
MD526b70aa2ab871a72a3fd30829f2f1f29
SHA173934bad6bf5ca22484a88e1a4b1263ae278c419
SHA2564e11bf944fb0a34c5cf1871fec3c8f7473e1944642cadf89a86db2eed874d35f
SHA51240cacfff6c7f47aa0703e8cb3186f8bacbff1d56dc0547d67c44e716fc0d28705995a439a88a02ce8a262628b33cf2f6ec6f0586cdc2fc86597e3da4fb6a1d84
-
Filesize
54KB
MD5502e87232756dfacda7d1686d4bc9ea4
SHA16e40897d0a957783b8b88f2a6487dba028954b22
SHA256d230ada81f3add58fd8a646d25b8f25fe6271b3eed5edef9fdc8945baabd5631
SHA51296366e76942f6da30c02e9f6cf7cdf0cb7550455c8cbaaae7358d15a2258e1f0b2bfa960d52cb774039f2070dc8c383c3df187805f4910d40601b853e4309d9b
-
Filesize
15KB
MD53eeb342d48cfaa4c568a93ffdfc847d0
SHA1ed5fd565c4a1867ca554314f038fc20c7de01b90
SHA25629e65344e34c2354da05e8de64b106aa0ec99d8c5c22b58797d0047e227879ff
SHA512db5b84233d40139c44cb8fd1a43e1c8a41c967358641e1488cc19474a8de381c5aa2c84f61b10d69d019f0d7170177cccea47ce9460d409a480c8537232a2ef0
-
Filesize
15KB
MD52f7770a34bb22b99f8f6966851331d82
SHA12a2860cde1482df656544e1983e957f815be4193
SHA256f873c02b69408f905c2c0b35b188d2c0b0a7cccc98a59d18dd0c297f761d2ef7
SHA5128611f8bace081711d6f5dcd41177f594314970c5b2f328755027383e4ad2a239bbd85e0cedf6d1a76d9d1f54afbd340c9bd4ab119bb87cfd5a11149a0cb71dfc
-
Filesize
15KB
MD5a5f4cccc602a42b4ddbd8acbcf34f158
SHA15f26277884b2f6cdac26267f9b582ac5a5d21b08
SHA2562d9044e9265fc09680d5f0c054c4ccac7d8d14b3a4a42e803a2097108e0f1acc
SHA5123cb0d0028468edb1687c6142ce3ed6b594428bd209bf8b85ab2315e7992af12c4d622f26e652d6be0718d51d0d6a171c0a881b36d2e67a199998442e91621149
-
Filesize
185KB
MD5641b4ed6ab90a6f52ee512ea88a64cd1
SHA128d014900accc98e6089d83d0b2a8cb8735ed101
SHA25613590945a04037dfd15d61166e0771682c7809674fca42f53fdb3afdcbe21410
SHA51200a588556196e305dbf1714e573a5c5516c2988356b984a7284ba017a78bacb8d576b590da35be40171d6dca73580c5b9ab06808c7246c2e13c8d9b816f2ca09
-
Filesize
15KB
MD5000b77a2ed92887856174641dfb6f485
SHA17872d9768f3a4b0601b91bd0b55f08c8992819e6
SHA2561100a8d298426491aeb34288f7d6e600622f2d94fc01bfeb093fcea3ac32a8e4
SHA512cec8642269bee8162b8d317ba61777b4005cb2dae8e9837bfd336bc6fd633066cd52b878160f4496113c147a7d0374619367e9bb451e82f7a5a39f0db3fde152
-
Filesize
15KB
MD5516f6320ae4d755b9ea0c7c8347f5801
SHA1bfce7c2869725ec8f327b083be57d20671fcb2a2
SHA2569e696aa5772e8cba27545b47b00be4a3b8fc888f8c83ca11939b753850feab14
SHA5120e12bc2f01f2897df41e56cee150177a3cc09ca5e889b61fcb9dbe07391a6f2537454401a2ca2ad93c652303a8e5782fd9860ca83734401393e314570175a6f0
-
Filesize
78KB
MD5cace8f27a66ffec4f9823aa258c307a9
SHA1dc515d29aa43d2b6b7e157f05e97e87d5f785884
SHA2563cf626dac6e91a03f688bf5ab674871a3e0411314f261bb2c69346a1c46bc733
SHA5124a5d5b564bd483e1949826d388e41c63a7b056236c5972c76721fd98c9b704a79622ed4c1b045080e4470340a9953595df955148999e15677f0e38e529a6a5f7
-
Filesize
15KB
MD58ffd9b7406e8aecf1d6117606d2bd149
SHA1edf1f0f2f1024cd0fb6b39dadca251c99ccdedcc
SHA256dd6b65e78cb194055494bbb7736ef917d3d6da1863567afe50b8abfc8e51267d
SHA512ee54a1bec20608477053e87c641cc59dfe3c5a77061395c9d41759c3c559d6d5e8761b75327f3a05e62c602031650ec0be375a1b2235a944048ab340efce7397
-
Filesize
15KB
MD595cf3bf094a35c9e7434bc402c09630c
SHA12b4d21ee55666f0664a644ec443502a942b9e7d4
SHA2564973b97a274648d53977499891b919f98684fdbebce10751d71ce4d2754f6622
SHA51209db399afec354ab699701f4196e93178db613421beda9e695bc36414698f83084d05b70595d2b31fe2a0d757ba98640f7e3953defb8dd71df03e4c01391fe8e
-
Filesize
185KB
MD50266d98252b6beee2e842d5e876031a8
SHA18d57c6d94835ac6b1b0f9a657af6baa4be25779d
SHA256c5d59069dcaf86222c9c189c8ba8932ced66ab77b4baad485e1f0ac715e6037c
SHA5127eebbff75a67a0408ff2f507d9f1b387dcfbe6765ccd4247fd78a64c2ea6090e88fd30f561e30f48bc107dd9378364fd18dba4ea22eedee76a1f993fbb1e9f32
-
Filesize
312KB
MD5bf91501c9b39c728ade2cf3788b647c8
SHA1fbcb53c4ca9836f5bbfbb2b63e7a1a00a6bf10c6
SHA256d602330327fd3630d625c9023131fd2318f677c67aa421631b8a4080dba38578
SHA51201a6639a580bd418cc4d1dd2bd8794f356c08b6f7fa801245e9200c883d32c6b103aeac2615195868a8e63e3515911de2a9afcced21f62fc41edefdd0a66001c
-
Filesize
15KB
MD536e8cb42bbfc16e1395a88d183caed83
SHA1ca1c513aaa7d49adfe0f43ceec81e6d0c0ae67d8
SHA25640ea55ebd7ef975135dafffb396871a8ab728abc24b42eaab76f08859994e996
SHA512f7620b06a5d43d21a0d492b66b0e5bacea6918f1490fb0504e9440524b7ef02ba83d2ae3c2211113b478b8325a3a6b6c8f65939ef5a01b835451cce2e72de00f
-
Filesize
16KB
MD5805f6272e5e3a80aac3540cc5b42b08e
SHA1437bee3476647f7b55a49630cb86ed4befc34293
SHA256910dbe44d17bd60a295a956e98e18347080cc879ed7ef7241cd2d0edfc060551
SHA512319f8f50dfca4adf148edf878fa7c83bc6e4f1053da0c7d412645fcae9c63e67b838c876838805d9a33b28067947d3844479c9ddab11eb9e760b9df285f27041
-
Filesize
15KB
MD50b5681808a793728fc658f1e9b94ec52
SHA105763b10f153447edcc08afeeeee71fa2f221033
SHA256d18fab0d0e24e8f1d9551e2667f6b2c34fcd75232c39e85ce50660588174079f
SHA51265e64980a30285b29888b9eeb66ec1c27c98a15effd67d761c3c62358e3ec008fbda61feda4fada8f9af8bce740b8f38236495c6f1b274d98c14209cd56b414c
-
Filesize
15KB
MD51dbd51882c2b82a5496106c31db425f1
SHA1f47bee48a7d0da0c4930cccc6fe7a8d8600d4b05
SHA256659fecc81e846405613c2080ac81a567df17c97449a9c2ba179ac216280223db
SHA51281418b0510b58f782b843312069842aeeede8d35feb8f393807169398464896f281dc13bc82d51279a07adfbe97758b82143218cf9a56d653b3a9d11da62f50f
-
Filesize
16KB
MD5f499825b88d200d9348b5f97ff297ec7
SHA1366adce5911c160fa26d6fdb4d65af357cf0e3bc
SHA2568b2d599efa66da695e503b480f355fc5f22347fcf5c294100abaeb3e9a20c1f6
SHA5123017bf630ba53ee0855d1e657df197732e4fe2fa6455fabad2085e5a24918589d487362fc2819fff85b3fcf7e684376d4b7a5bbc6e71ea57cc62ab397a87dba9
-
Filesize
16KB
MD530989429490b9ccbde4fae1fc6df84e4
SHA164c8cf20ebb4e8dc31521f0084eb046a9e3f0500
SHA256aa98634e3668beae535738d25c2094a7ef0d855ebd9d945b484368f9e543bc0d
SHA5129a78ed9cd8dcf333ea240ff309e24a2e5de39bbeba4e9291b55d51fdbc10ee672c674a9f4393b13819562a0d9bc99667eb03519cefed0218444874f15729eefe
-
Filesize
314KB
MD5c8db7998995218d59addc586ce9679d6
SHA1694f18eef5aa6dfe1aa607ad5a08980f9656ed07
SHA256e3712cd917e4d41696165a98233443d63dbfb28560967de92ca4e707c50d7df2
SHA512ba7bdfae350c4b98067a2875295a20fbee1b7e9cb1f1afde1a299ca1b8d6aab3996dec59119cd83214461018e5e4ff91894ad3f0e909359382cf5183811d3d12
-
Filesize
15KB
MD54ce9dbe70ae911f1fef704e2c5594214
SHA13431c1d6fa21e04e79f0b2f48cd30b037ab009cb
SHA256e45733934ff8c01f79a98ea2fd6b2a78fc5f0164e5d4fea7aef5119c7218a5fd
SHA512291420138d84108ebbb8f3dc81bc4595206144b8eac0a459ae63754aa137a3d6789330dc764c6dafb5cecc76908166d93cccaecbcb3987d4cbba662980ee6359
-
Filesize
15KB
MD5c77fa8599058f2f08f6f028ad1ba3d29
SHA1ea42e7eed011b8b71f32d4d47827a5b56198d134
SHA256db2beff59876773d223f4813c05c65a1e582604c420ae6d7f6f3844a0a060398
SHA512f2834be1925ca448884877e7236d2febb72190ebf43a2dab29a76b71c4976360d56df17879966ec74c60b3d62dadd81d577e3034961ed64418c0300f9710f43f
-
Filesize
15KB
MD5da1c77dc8b88afc927144ac6814ffecc
SHA1ff50b5fefd7275f3972f2e3f228384816fe22e63
SHA25678d50c2ca489676456b3a0ccd1696dda0f1e1e144baacd26cdbc472869578b30
SHA51202fbc972c889a71947b2671bcc7e22f9a0edce3e0462f332753d974d73035315aef7b4ae1069e309aa560f98065b792447b2ef8f1e8be1874969de916b2f3e25
-
Filesize
16KB
MD5095d24917473c666b8906e45852378f7
SHA12ca5842715ad03982eb9094786832775926e4b4d
SHA2563289a0fb8c701e7eae9fc792329c0eff6cd2a42ffbf1845f4e630a3e1a019529
SHA512fba9fe4ca6498c9fcf0d251906b537286f2e7bdb2399293c71f9b0bce379c2684da14212231535a81889928fcbe0adf7354bc83e272a3f6d9082f125494cc50c
-
Filesize
15KB
MD5f9ae41a829d457685c00b08ea9185e1d
SHA154eeb13931bfdd989decb7e807996b46b75f1cd6
SHA256d122b3df7c2b81c5eee0d3165a6741fffbc2298a8eb41740dbe0092eecf3cd47
SHA512fef83f2670a11536b57dc3a1d86d014b49b83c720976a5592bf6fef2ec45aeb62e269ce0759b150accfc77a94a28423c833b4ad0fbec6a7e0a4132a2b152a538
-
Filesize
15KB
MD5d33a2ad454c698dc6cc87ff9e484229d
SHA1cdf4c8db79f2530bdfec32a1909be5d129a23058
SHA256bf9aef8af2046c69ccc29ab1f9fa0f4b31cfcb1892158877c01e7b3a8c4eadb3
SHA512682e0b292f0f0cb1613c634a99df53d242ba465f1f754058d508ba8506654ebcb35f79e6e6714a288c2018ab9cdb929ef48a544071bc3ffbf3d362bf3478a818
-
Filesize
54KB
MD5529a2a19485ba337e8c0b6970583e94e
SHA11cc15db40d7bbef978b74ada8aa308e2f1731c77
SHA256e9c0f8e00e3f884edfb0b776e4d9bb336dd7fba12f0c6d5604b4530d7016861a
SHA51230598f68560ce73d02a8683555bbba0c316c5f04f05543dc30a273e51fda19567f375d1855d33fb7b2aa66d0faec8d8b43b064cfb5debe4f0d3f06996a416158
-
Filesize
44KB
MD5db9c946a0f96b6971d8c206b763a12f9
SHA1f489499793ec2089d4fa8155f0dce9cce3224a01
SHA256dcfb9c195b17ad00722e50c3f28181e12e3de6f209e756bdde8f137950ab5b89
SHA512eb23828b588ace5e3468d0f5aedc1cdc5b0c7c362d76481fa53a5b881ddd459661b6cd6b4e3179b16960538b0ea1103ea02174cb5a26a8227fc0ec06837ea98e
-
Filesize
154KB
MD52d721aa8133aae9cedce6601b08344d7
SHA12d7d17947fc92e4908e43d5b235bd387890f29aa
SHA2565dbf3b499d387e4a811f75c79a3e8671aa27eb35cdbbedb28429092e48c2e685
SHA512669a7acd991438de338862439f8f8acf8f163620e3a4ed2b9972c8e6b1c7c2c0f478f078e3750197bd1c0ad0500de1c7e474c505d33098690014e674553f0567
-
Filesize
54KB
MD5e795eb03297dd66d2efac2c33920a69f
SHA1bf41799164d6ab2690c39afa458122ed82f2d0a8
SHA256133afb441f29c697a5232752483ef2eecc297446f6db941bd68af7ed056cecf1
SHA5126a334a07afadcd5c29c30add22142392bdc70d8ae0f36140f2ba7c9b4e70a9efd87b7fbd8b3ef862cea7aebdddfd18bb0521308d9a69070ae4a84432f522c4ef
-
Filesize
3.0MB
MD507dd9dcd1cc2840751a1f8772f3c0195
SHA1c6203a3990cfbf396ae87110e341f773cd6be4c1
SHA2569b39147e1ba781ea8e463c22700f6ce354ac5e775e36657fd87bf41074835602
SHA5125e547dc18a2b44a6dd67f6b43ee5b5b1bbd4ec1e8b5507b0d990837a7adb72b66808e7487f97062d54e4d3c2c7b791e3b580c9ed316e9d003849f7a6f6a3d56b
-
Filesize
829KB
MD5bef8be93965ec65c51d70030b9b6b058
SHA1f12148107460625f4f1900c25bf411f320d1b41a
SHA25693609f1c460fb778e4ae7809455febba3476dcca7c14a461066767442e166f8a
SHA5126717750cdbfa01da56448032c6515f38560dc39f1c05d7c587d9800f72db0495ac337402a2d29244955b7942c1a3b093d8ebc659f3b3d7ddcf19f6caa69cc68d
-
Filesize
750KB
MD5a8524f6c3aff774911bca26ab8322602
SHA11f4e5b034d74f3c44d0b6744e03da1dd3d5f7531
SHA256a5bf1cc9dad3f2c8f6212f7bf7e98ddd65528c1243b2b1f697fdd12fbfbe9e7b
SHA512990b4462faeb5cad5237f185a6fa8fa984a4fbda8ca9d183d2ac6f3fbd27cd10f049c815203d3915c3764e82a3cbdbc59caf9978b7d3c6b524ad2b4a08048172
-
Filesize
800KB
MD59aaade86a4659a69cf5aa298c8aeec22
SHA194841d5f07be7b55f3b0fd23b4af9b72073ca51c
SHA256c59f21a65dcebb5e4195087c21e71e055061763c80fd9c681c6a4c0e4b276bcf
SHA51267b4ea11cc87e899269eb269427f6f4f452332a4666defb84163e74c97f25a5fac4fb9e660ee0c7185ec69311665f4649eb5b655505bab102c5126a2c0008343
-
Filesize
848KB
MD5b3ee7bd189c5925d4c0d2bbfca00fdd1
SHA142b99d7da633aa4c3b23cceade23dbf41b313342
SHA256f46beabb222d534a11fc3f88b295f9e20962fc8a75cbc19ca25ebfb9b89013ac
SHA51258695d84e1827a3391ef55df8ab06399d2a98d071245e6161374dc380957e36fbfcd558ef38c6334a928418c6bf37c9b2430701cf67bf65b03a1e9c4c28eb01a
-
Filesize
91KB
MD51c9289324b5558aa5a59fb98359b3fd7
SHA1b32666e34faed4b0acf1ffcfdcc284568ff61269
SHA2569ad98be79538dce70f850c5f6c22c029053d51e83781e1da194f3473d9c1bad1
SHA512f3efe541733842926540166ba7404ee90a659f7facfa480a683cc23dc2050a6222a8acf4cacb84c8c3a75ea9370e7880981511d5f43adde8eb030712e4d2e92b
-
Filesize
100KB
MD5ab0a8849029b4ce1109ba4e86481ab4f
SHA1ea296baa8b55e744555eb12f890d4fde94dfd6aa
SHA25661bcc5185bdfe1ec76b4aecdde640be6a8587f4d286c88bd518186e268ed2921
SHA51237ea780b38a592504561de3864318908554818115bb2070428a1d3fa88187a1ab253e730ba414c45b7cbf02f6eae7a63afb1d0b9731c1f00c6e3d5d79207410b
-
Filesize
93KB
MD589f37ffa37b28807b1e7628be13664c5
SHA1c85fdf9b8b47d4d62eec66ba7d15d3232e87033a
SHA2560c71fa7b4382aff51048a6295a17683edb4eced025263e9f185f2429fc95f549
SHA5128e0de51e523e173b2378a5bb39690e7d70531cfa3b48aaceb5f3c696865482c7c8ddb5e855b56815980abaab17c95db67b8cf4c2d291f53988e3dd9ed1d08464
-
Filesize
1.2MB
MD5eb596e72f63b7c31be8df75fa8829b3f
SHA13ef9b9128e2b3108b77ccd493716f76595141724
SHA256e10f315021eef7585b086547741c3b78da85e1220c161a063fe0126b17938112
SHA512d296f90a0d547db202f985738d81d2a6f37a440e7229707730ecc1dac97bacc3e62ca809819cae50ae30fb8d30176ea0d14bbb8c6656505430f83429cd543d50
-
Filesize
843KB
MD55bacfd51d926774c8dd8028bec9b4374
SHA182bfd05e61d9b2c5849c5dfc35e9bf533c52ec57
SHA256fd8a8fcf5c1d869864145fbbed7c2dabadd368e4e5b755821ffc4812c0eacf9f
SHA5125c2a6552501bd73041d8210c68b9a00f960448a6423a183d6b99b7ab40016c916a27f12f7f959b180de4227471a23b19bd977059e0065e987b8012928e042d44