Analysis
-
max time kernel
135s -
max time network
159s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/09/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
SetupMBAM.exe
Resource
win11-20240802-en
General
-
Target
SetupMBAM.exe
-
Size
261.5MB
-
MD5
98d22b94ba9bd9f5ade2a46fcc55d91b
-
SHA1
2f079d4fa2764cc4c769143be93f0305a07d920c
-
SHA256
2297bee34b1751b2ca0f20b6625bf822b3837a70f6f2b456278fba92a7188e0e
-
SHA512
4b0e15bf15f24ab15df27f178dec2e160e5acf70962a857ca0f7dd3c8b40f7817e5257fa9dc009ac477911e4dc616129a824d250601b97e51ef55faba6b2fa3f
-
SSDEEP
6291456:2s67aozPfjFufVrr70zgAKOU2cPSdYdcnUBp:2sidzPkdrrwMoPfadcUBp
Malware Config
Signatures
-
Drops file in Drivers directory 21 IoCs
description ioc Process File created C:\Windows\system32\DRIVERS\SET7A5C.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\SET8395.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\SET8396.tmp mbamservice.exe File created C:\Windows\SysWOW64\drivers\mbamtestfile.dat mb4.exe File opened for modification C:\Windows\system32\DRIVERS\mwac.sys mbamservice.exe File created C:\Windows\system32\DRIVERS\SET8B48.tmp mbamservice.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\DRIVERS\SET7923.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\farflt.sys mbamservice.exe File created C:\Windows\system32\DRIVERS\SET8396.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\SET83B6.tmp mbamservice.exe File created C:\Windows\system32\DRIVERS\SET83B6.tmp mbamservice.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File created C:\Windows\system32\DRIVERS\SET7923.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\SET7A5C.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\MbamChameleon.sys mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\mbam.sys mbamservice.exe File created C:\Windows\system32\drivers\is-FP61L.tmp mb3.tmp File opened for modification C:\Windows\system32\DRIVERS\mbamswissarmy.sys mbamservice.exe File created C:\Windows\system32\DRIVERS\SET8395.tmp mbamservice.exe File opened for modification C:\Windows\system32\DRIVERS\SET8B48.tmp mbamservice.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MBAMSwissArmy\ImagePath = "\\SystemRoot\\System32\\Drivers\\mbamswissarmy.sys" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MBAMChameleon\ImagePath = "\\SystemRoot\\System32\\Drivers\\MbamChameleon.sys" mbamservice.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mbamservice.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate mbamservice.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 9 IoCs
pid Process 1704 mb3.exe 5872 mb3.tmp 3796 mbamservice.exe 3876 mbamservice.exe 5680 mbamtray.exe 5580 mb4.exe 5392 MBAMInstallerService.exe 5748 MBAMWsc.exe 4068 mbstcmd.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MBAMService mb3.tmp Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MBAMService\ = "Service" mb3.tmp -
Loads dropped DLL 64 IoCs
pid Process 5872 mb3.tmp 5872 mb3.tmp 5872 mb3.tmp 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: mbamservice.exe File opened (read-only) \??\I: mbamservice.exe File opened (read-only) \??\U: mbamservice.exe File opened (read-only) \??\B: mbamservice.exe File opened (read-only) \??\H: mbamservice.exe File opened (read-only) \??\W: mbamservice.exe File opened (read-only) \??\Z: mbamservice.exe File opened (read-only) \??\A: mbamservice.exe File opened (read-only) \??\J: mbamservice.exe File opened (read-only) \??\O: mbamservice.exe File opened (read-only) \??\V: mbamservice.exe File opened (read-only) \??\X: mbamservice.exe File opened (read-only) \??\Y: mbamservice.exe File opened (read-only) \??\G: mbamservice.exe File opened (read-only) \??\L: mbamservice.exe File opened (read-only) \??\M: mbamservice.exe File opened (read-only) \??\N: mbamservice.exe File opened (read-only) \??\P: mbamservice.exe File opened (read-only) \??\Q: mbamservice.exe File opened (read-only) \??\R: mbamservice.exe File opened (read-only) \??\S: mbamservice.exe File opened (read-only) \??\K: mbamservice.exe File opened (read-only) \??\T: mbamservice.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 mbamservice.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EE44ECA143B76F2B9F2A5AA75B5D1EC6_847118BE2683F0C241D1D702F3A3F5F9 mbamservice.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EE44ECA143B76F2B9F2A5AA75B5D1EC6_847118BE2683F0C241D1D702F3A3F5F9 mbamservice.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CA4458E7366E94A3C3A9C1FE548B6D21_C2C3D990B393462F0B24251F41DF0EF5 mbamservice.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CA4458E7366E94A3C3A9C1FE548B6D21_C2C3D990B393462F0B24251F41DF0EF5 mbamservice.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Malwarebytes\Anti-Malware\is-IKB4D.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtWinExtras\is-1LQ02.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\imageformats\is-96IFI.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQml\Models.2\is-0H5TR.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\PrivateWidgets\is-DBBEU.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-V1J7L.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-VLK7D.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-2VHAD.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-CL6UQ.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-NIKFD.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-47F0J.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-QM2NL.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-B67AM.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-US1CS.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\mwac.sys mbamservice.exe File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Layouts\is-VVGSP.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtWinExtras\is-F8K45.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQml\Models.2\is-8HJQ1.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Dialogs\is-HGI1P.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-HS7LH.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-2LUSL.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\mwac.cat mbamservice.exe File created C:\Program Files\Malwarebytes\Anti-Malware\is-9QCOG.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-22U52.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-RFCMT.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\unins000.msg mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\mbamchameleon.sys mbamservice.exe File created C:\Program Files\Malwarebytes\Anti-Malware\platforms\is-21LM8.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-1A4QE.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-BHRJ2.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-DCOSA.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\farflt.sys mbamservice.exe File created C:\Program Files\Malwarebytes\Anti-Malware\sdk\farflt.cat mbamservice.exe File created C:\Program Files\Malwarebytes\Anti-Malware\imageformats\is-7H717.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-TNIGL.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Qt\labs\settings\is-FB50P.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-E02NH.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-OMH3V.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-KFL89.tmp mb3.tmp File opened for modification C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\mbshlext.dll mbamservice.exe File created C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\sdk\mbam.cat mbamservice.exe File created C:\Program Files\Malwarebytes\Anti-Malware\QtWinExtras\is-LL8GD.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-43FTK.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-EV1OP.tmp mb3.tmp File created C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\sdk\mbam.inf mbamservice.exe File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Extras\is-FCTQA.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Window.2\is-CKQIQ.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Dialogs\is-JIDJQ.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Extras\is-ECM81.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Dialogs\Private\is-SCAE1.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Controls\Styles\Flat\is-NTH7E.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtWinExtras\is-FNK1B.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-8B3EE.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-C033T.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick.2\is-LJH74.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\imageformats\is-HR480.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\imageformats\is-JD8JG.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Layouts\is-TN5OQ.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\QtQuick\Window.2\is-O86CR.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-K5OFV.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\Languages\is-V50AL.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-76ACG.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-2LGUS.tmp mb3.tmp File created C:\Program Files\Malwarebytes\Anti-Malware\is-195JV.tmp mb3.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\security\logs\scecomp.log mbamservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mb3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbamtray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbstcmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetupMBAM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mb3.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 5080 ipconfig.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION mb3.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\mbamtray.exe = "11000" mb3.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\mbam.exe = "11000" mb3.tmp -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs mbamservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs mbamservice.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7F95C137-46FC-42FB-A66A-F0482F3C749C}\TypeLib\ = "{F5BCAC7E-75E7-4971-B3F3-B197A510F495}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C5201562-332D-4385-87E7-2BB41B1694AA}\TypeLib mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DC97FF29-5CE2-4897-8175-94672057E02D}\ProxyStubClsid32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B860FC17-5606-4F3A-8AE5-E1C139D8BDE3}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B860FC17-5606-4F3A-8AE5-E1C139D8BDE3}\TypeLib\ = "{A23C190D-C714-42C7-BDBB-F4E1DE65AF27}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{17A7CC72-3288-442A-ABE8-F8E049B3BE83}\TypeLib mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{40D6E119-3897-41B3-AC5D-5FE6F088C97B}\ = "ILogControllerEntryEvents" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1097B101-1FF8-4DD8-A6C1-6C39FB2EA5D6}\TypeLib\ = "{5709DEEB-F05E-4D5C-8DC4-3B0D924EE08F}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A0EB1521-C843-47D5-88D2-5449A2F5F40B} mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\InprocServer32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8A574BA8-3535-41F9-AB73-FA93F8A7DC3B}\TypeLib\ = "{FFB94DF8-FC15-411C-B443-E937085E2AC1}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8F1C46F8-E697-4175-B240-CDE682A4BA2D}\LocalServer32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D5599B6B-FA0C-45B5-8309-853B003EA412}\ = "ScanController Class" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{172ABF99-1426-47CA-895B-092E23728E8A}\TypeLib\Version = "1.0" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{81701AB9-0B9C-49FE-9C79-C3C4DCA91E7B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CFFF19F6-ECFE-446D-ACAD-8DC525DA2563}\ = "ICleanControllerEventsV2" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{226C1698-A075-4315-BB5D-9C164A96ACE7}\1.0\FLAGS mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{332AFEBA-9341-4CEC-8EA6-DB155A99DF63}\1.0\0\win64\ = "C:\\Program Files\\Malwarebytes\\Anti-Malware\\mbamservice.exe\\7" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77AD284A-4686-413D-AA76-BDFC1DF52A19}\ = "ISPControllerV3" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7196E77C-8EA5-4824-92C9-BAE8671149FA} mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{40D6E119-3897-41B3-AC5D-5FE6F088C97B} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78E69E6F-EC12-4B84-8431-1D68572C7A61}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D4AC5360-A581-42A7-8DD6-D63A5C3AA7F1}\ProxyStubClsid32 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FA484BC6-E101-4A87-AAF3-B468B3F2C6BB}\TypeLib mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DC2F8F62-D471-4AD5-B346-9F214FE941A7}\TypeLib\Version = "1.0" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D5599B6B-FA0C-45B5-8309-853B003EA412}\VersionIndependentProgID mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C842243-BDAD-4A93-B282-93E3FCBC1CA4}\TypeLib\Version = "1.0" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DE35F2CA-6335-49BA-8E86-F6E246CFCEA6}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8D488C7C-023D-4561-B377-DD9FB7124326}\ = "ICleanControllerV6" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E0987E3-3699-4C92-8E76-CAEDA00FA44C} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5250E5C8-A09C-4F87-A0DA-A46A62A0EACF}\ = "IArwControllerV3" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{566DC5CA-A3C4-4959-AB92-37606E12AAFF}\TypeLib\ = "{59DBD1B8-A7BD-4322-998F-41B0D2516FA0}" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MB.TelemetryController.1\ = "TelemetryController Class" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7AEBAD20-B80A-427D-B7D5-D2983291132E}\TypeLib\ = "{5709DEEB-F05E-4D5C-8DC4-3B0D924EE08F}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD3CFEBD-3B8E-4651-BB7C-537D1F03E59C} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB30855D-36DF-41BD-9EEE-03BA7E8E70B7}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0F2D6C4F-0B95-4A53-BA9D-55526737DC34}\ProxyStubClsid32 mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FC34538A-37CB-44B4-9264-533E9347BB40}\ = "IRTPControllerEventsV2" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{616E9BE3-358B-4C06-8AAB-0ACF8D089931}\ = "ISPControllerEventsV2" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MB.CleanController.1 mbamservice.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F36AD0D0-B5F0-4C69-AF08-603D177FEF0E}\TypeLib mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B471ACFB-E67A-4BE9-A328-F6A906DDDEAA}\ = "INormalScanParameters" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ADA09B8D-A536-4429-8331-49808442D24B}\ = "_IScanControllerEventsV4" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{53260A87-5F77-4449-95F1-77A210A2A6D8}\ProxyStubClsid32 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0F2D6C4F-0B95-4A53-BA9D-55526737DC34} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2446F405-83F0-460F-B837-F04540BB330C}\1.0\FLAGS\ = "0" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A82D6A8-59F8-4B47-BBD0-8F5E5DBB3C7D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C2E404A3-4E3F-4094-AE06-5E38D39B79AE}\TypeLib\Version = "1.0" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B5186B66-AE3D-4EC4-B9F5-67EC478625BE}\TypeLib\Version = "1.0" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F128CCB-D86F-4998-803A-7CD58474FE2C}\TypeLib\Version = "1.0" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{983849D5-BFE9-43E9-A9A0-CBAFBC917F39}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C5201562-332D-4385-87E7-2BB41B1694AA} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A2D4A69C-14CA-4825-9376-5B4215AF5C5E}\TypeLib\ = "{74630AE8-C170-4A8F-A90A-F42D63EFE1E8}" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D8258E71-3A7A-4D9D-85BB-C7999F95B7E4}\TypeLib\ = "{2446F405-83F0-460F-B837-F04540BB330C}" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A583D5DD-F005-4D17-B564-5B594BB58339} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{993A5C11-A9B8-41E9-9088-C5182B1F279A}\TypeLib\ = "{226C1698-A075-4315-BB5D-9C164A96ACE7}" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{97DA9E74-558F-4085-AE41-6A82ED12D02C}\ = "_IMBAMServiceControllerEvents" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C842243-BDAD-4A93-B282-93E3FCBC1CA4}\TypeLib\Version = "1.0" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F927AD37-BA5F-4B86-AE22-FE2371B12955}\TypeLib\ = "{C731375E-3199-4C88-8326-9F81D3224DAD}" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7EF16D72-5906-4045-86BC-16826F6212FE}\ = "IScanParametersV3" mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{553B1C62-BE94-4CE0-8041-EB3BC1329D20}\ = "IScanControllerV5" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7F95C137-46FC-42FB-A66A-F0482F3C749C} mbamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E0987E3-3699-4C92-8E76-CAEDA00FA44C}\ = "ITelemetryController" mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3DCF0F42-EF8F-4450-BA68-42B61F594B2F}\TypeLib mbamservice.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3700 reg.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 mbamtray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A mbamservice.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 mbamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 0f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47420000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\674A26336407F1334E8846B54727A0D81285E88F\Blob = 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 mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\674A26336407F1334E8846B54727A0D81285E88F\Blob = 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 mbamtray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\674A26336407F1334E8846B54727A0D81285E88F mbamtray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 mbamtray.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5680 mbamtray.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 3876 mbamservice.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe -
Suspicious behavior: LoadsDriver 9 IoCs
pid Process 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: 33 3796 mbamservice.exe Token: SeIncBasePriorityPrivilege 3796 mbamservice.exe Token: 33 3876 mbamservice.exe Token: SeIncBasePriorityPrivilege 3876 mbamservice.exe Token: SeRestorePrivilege 3876 mbamservice.exe Token: SeTakeOwnershipPrivilege 3876 mbamservice.exe Token: SeRestorePrivilege 3876 mbamservice.exe Token: SeTakeOwnershipPrivilege 3876 mbamservice.exe Token: SeAssignPrimaryTokenPrivilege 3876 mbamservice.exe Token: SeIncreaseQuotaPrivilege 3876 mbamservice.exe Token: SeSecurityPrivilege 3876 mbamservice.exe Token: SeTakeOwnershipPrivilege 3876 mbamservice.exe Token: SeLoadDriverPrivilege 3876 mbamservice.exe Token: SeSystemtimePrivilege 3876 mbamservice.exe Token: SeRestorePrivilege 3876 mbamservice.exe Token: SeShutdownPrivilege 3876 mbamservice.exe Token: SeSystemEnvironmentPrivilege 3876 mbamservice.exe Token: SeUndockPrivilege 3876 mbamservice.exe Token: SeManageVolumePrivilege 3876 mbamservice.exe Token: SeSecurityPrivilege 3876 mbamservice.exe Token: SeSecurityPrivilege 3876 mbamservice.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 5872 mb3.tmp 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe 5680 mbamtray.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1564 wrote to memory of 4304 1564 SetupMBAM.exe 82 PID 1564 wrote to memory of 4304 1564 SetupMBAM.exe 82 PID 1564 wrote to memory of 4304 1564 SetupMBAM.exe 82 PID 4304 wrote to memory of 3684 4304 cmd.exe 84 PID 4304 wrote to memory of 3684 4304 cmd.exe 84 PID 4304 wrote to memory of 3700 4304 cmd.exe 85 PID 4304 wrote to memory of 3700 4304 cmd.exe 85 PID 4304 wrote to memory of 2292 4304 cmd.exe 86 PID 4304 wrote to memory of 2292 4304 cmd.exe 86 PID 4304 wrote to memory of 2800 4304 cmd.exe 87 PID 4304 wrote to memory of 2800 4304 cmd.exe 87 PID 4304 wrote to memory of 5080 4304 cmd.exe 88 PID 4304 wrote to memory of 5080 4304 cmd.exe 88 PID 4304 wrote to memory of 3388 4304 cmd.exe 89 PID 4304 wrote to memory of 3388 4304 cmd.exe 89 PID 4304 wrote to memory of 1704 4304 cmd.exe 90 PID 4304 wrote to memory of 1704 4304 cmd.exe 90 PID 4304 wrote to memory of 1704 4304 cmd.exe 90 PID 1704 wrote to memory of 5872 1704 mb3.exe 91 PID 1704 wrote to memory of 5872 1704 mb3.exe 91 PID 1704 wrote to memory of 5872 1704 mb3.exe 91 PID 5872 wrote to memory of 5240 5872 mb3.tmp 93 PID 5872 wrote to memory of 5240 5872 mb3.tmp 93 PID 5872 wrote to memory of 3056 5872 mb3.tmp 95 PID 5872 wrote to memory of 3056 5872 mb3.tmp 95 PID 5872 wrote to memory of 3796 5872 mb3.tmp 97 PID 5872 wrote to memory of 3796 5872 mb3.tmp 97 PID 3876 wrote to memory of 5680 3876 mbamservice.exe 100 PID 3876 wrote to memory of 5680 3876 mbamservice.exe 100 PID 3876 wrote to memory of 5680 3876 mbamservice.exe 100 PID 4304 wrote to memory of 5580 4304 cmd.exe 101 PID 4304 wrote to memory of 5580 4304 cmd.exe 101 PID 4304 wrote to memory of 5580 4304 cmd.exe 101 PID 3876 wrote to memory of 5748 3876 mbamservice.exe 103 PID 3876 wrote to memory of 5748 3876 mbamservice.exe 103 PID 5392 wrote to memory of 4068 5392 MBAMInstallerService.exe 104 PID 5392 wrote to memory of 4068 5392 MBAMInstallerService.exe 104 PID 5392 wrote to memory of 4068 5392 MBAMInstallerService.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2800 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SetupMBAM.exe"C:\Users\Admin\AppData\Local\Temp\SetupMBAM.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\setup.cmd2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\system32\fltMC.exefltmc3⤵PID:3684
-
-
C:\Windows\system32\reg.exereg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{35065F43-4BB2-439A-BFF7-0F1014F2E0CD}_is13⤵
- Modifies registry key
PID:3700
-
-
C:\Windows\system32\findstr.exefindstr /i /v "malwarebytes mwbsys" C:\Windows\System32\drivers\etc\hosts3⤵PID:2292
-
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts3⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:2800
-
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:5080
-
-
C:\Windows\system32\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Temp\7zSC1634328\MB2Migration" "C:\ProgramData\MB2Migration" /i /s /y3⤵PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1634328\mb3.exe"C:\Users\Admin\AppData\Local\Temp\7zSC1634328\mb3.exe" /verysilent3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\is-P4TRG.tmp\mb3.tmp"C:\Users\Admin\AppData\Local\Temp\is-P4TRG.tmp\mb3.tmp" /SL5="$8034A,75987422,119296,C:\Users\Admin\AppData\Local\Temp\7zSC1634328\mb3.exe" /verysilent4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5872 -
C:\Windows\system32\certutil.exe"certutil.exe" -f -addStore root "C:\Users\Admin\AppData\Local\Temp\is-EMNPC.tmp\BaltimoreCyberTrustRoot.crt"5⤵PID:5240
-
-
C:\Windows\system32\certutil.exe"certutil.exe" -f -addStore root "C:\Users\Admin\AppData\Local\Temp\is-EMNPC.tmp\DigiCertEVRoot.crt"5⤵PID:3056
-
-
C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe"C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe" /service5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1634328\mb4.exe"C:\Users\Admin\AppData\Local\Temp\7zSC1634328\mb4.exe" /verysilent /norestart3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5580
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3308
-
C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe"C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe"C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5680
-
-
C:\Program Files\Malwarebytes\Anti-Malware\MBAMWsc.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBAMWsc.exe" /wac 1 /status off false /updatesubstatus none /scansubstatus recommended /settingssubstatus none2⤵
- Executes dropped EXE
PID:5748
-
-
C:\Users\Admin\AppData\Local\Temp\MBAMInstallerService.exe"C:\Users\Admin\AppData\Local\Temp\MBAMInstallerService.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5392 -
C:\Windows\TEMP\MBInstallTemp\mbstcmd.exe"C:\Windows\TEMP\MBInstallTemp\mbstcmd.exe" /y /cleanup /quiet /nomb4uninstaller /noreboot2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4068 -
C:\Program Files\Malwarebytes\Anti-Malware\MBAMWsc.exe"C:\Program Files\Malwarebytes\Anti-Malware\\MBAMWsc.exe" /uninstall3⤵PID:5040
-
-
C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe"C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe" /LOG /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /log="C:\Windows\TEMP\Mbam3x.log"3⤵PID:3808
-
C:\Windows\TEMP\_iu14D2N.tmp"C:\Windows\TEMP\_iu14D2N.tmp" /SECONDPHASE="C:\Program Files\Malwarebytes\Anti-Malware\unins000.exe" /FIRSTPHASEWND=$10058 /LOG /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /log="C:\Windows\TEMP\Mbam3x.log"4⤵PID:4544
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Safe Mode Boot
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5bbf8d1bd3fed70264553c43933c0778f
SHA1ee482444cd5c8751b1e593f0ee9c4102a6b3e73b
SHA256541236c5093e7d561049a9aa4aef0f4610d2229ac0f268098d028ac0acd0ebef
SHA512427d177da0fb71869f604d316d3cf2a49c426d743bc0c48e2f75bf9dc6a574a82a25a1096d26d774c0221da4c9efaa21e2371dea3aaa7226fed0ff6a51dd9d04
-
Filesize
3.3MB
MD592e9642560b3824d14886b5a07abc0fe
SHA1ea27777f0ac8c84d8f2acf14f4f3d76beaa3600f
SHA256ee7bf546ff261caefe63b9291a359681e8167d3eae48529c8b03df83992d5f3f
SHA51231c17b5019767980f900d7fc85a2a21e39e01ab52425418c2aef877584c26379b0bd0e79fffc155b14efb7187a7f4d1d6c57420ed83c028ab94574b5644f5bf3
-
Filesize
5.1MB
MD56fc8a69f6702c7dffadfdcd17101f737
SHA16fbeb417b75098df88c364638e0cc703a87a0ae9
SHA25628b7288e810e61871cc60ba7095401d0a241601a15a3c119e0a49e07355bd813
SHA51296b1963255bf8581c49a8fbb200e8ccd88e2ca2dc188724dea8725eb3bdca49490f495b67f0511e3946c43ec584801a832fc257187b33cdbfd05be0d180db8b9
-
Filesize
3.3MB
MD5c091823974c144a4ad60253346be986f
SHA16268491af4b35824a25b3a879412aa3894073c90
SHA25653aad200edbab6e1591c1502afab7e2014aaa98e52c4be6bdfdd5332248d2032
SHA51202fb68f67eb49c7e76f3772ef830b9981487eda9c87243dd8b6b4406a9bcc2de0253ac63271e7c35dc27102211ffc31ef550d5b6d49734dce762f0c47bd563fa
-
Filesize
4.4MB
MD5357fc4ccbec4ba925ceec54ba1940de6
SHA116ff9d20c00b575c7fe3d19ed47ba2e1c025446b
SHA256a99c1e7a2408fde154a259894bdce12486ba8aaff9904098c2febf60cf2d0142
SHA512fe20f82a16001c3919bf8ada707532c7ecc3b0ff01170a8063dac7dbb6dca2f23c18a1fd2894836d1ad9d8cf5efc3f376d1a0536b29b77297709ded9306ab366
-
Filesize
2.2MB
MD59461138ffbdb975a8e125163bf948158
SHA18275135bf4ceaf57c5ba8f66dd49d69d992c0c66
SHA256373cf9d48fbb81f4ff07713428d50a62c7bbc0fc594af3987e0bd655f83ed3a0
SHA512c0f7978527c24c9d767e58dfb53e346f9d1af1c09674bef723830754125985ae3846da262fad641e8cdc615779a244710fbb8d9e0e36a1205da4392c7782a34a
-
Filesize
2.6MB
MD5ddc20450bd11ef763fb94d5e4b9c9734
SHA170d9cd634984746b0bfc16a9b3558f0c08299f95
SHA25640b795529049730cd841654c73a499c0ff3cbee6f5e05df96359c2d968f362be
SHA512dd0d7e0185eead8d6104f3bebbd2d78825ec28eabadf488c0d58a594854b37784a8d0b7c9b4852e618395662b0427dfb31f39e81802b9d0a9a20c0eec100b759
-
Filesize
1.9MB
MD5744524ba97e4f000a05ad256add6d96b
SHA12cc1a6b0ecc17db129bf479724e12ae1374cbc77
SHA256c529264098ab30cb6a79ba8db9c5e208cf221e72aee47b70878986f19b2acf45
SHA512ed0a99defe9ce9c2df2fd089b5ebe9a08b4b61e19017638269be53a74ce28d1e31e1e34519585d6b8a934eda7108e5610147f92d83414f5adf6b1f91e52d2717
-
Filesize
3.9MB
MD578f99c1fb3d8205824c758285f7967c9
SHA1b4be038a5320a558ca6743cf96255b054a89e60f
SHA25612b1d507ac03e261558e9f7da15a0dada975e1ae930ea0df6b3bb62e141e15a3
SHA512afe82f1867f2bdde6af7d1b8474bfbf8a23fa0a3f20323980f701b1e6944c1e7237675169e0ef7c65f2c4b8c939b679555ac91d332c106dfc3560f5d1b4599ff
-
Filesize
50B
MD5f92c71ddf5b699d9bf113cc80d5bc826
SHA11a8091b51c8328cffe98958c3098e4b9c1228bfc
SHA256b110e26dcf57e8d3923c7b0e6a660e06a70246a2d0285fb3fd4a775579dda83f
SHA512463c8f4810ac52b12e8620d748a8a087ef140e5d6ab6a3afdd1baf28beca17a0b6c069003391c66cf0fd2ef75112be1306201915c6a8942404c80e5b99947411
-
Filesize
46B
MD58fb6a018f79059337fc548f2994bee6a
SHA12bfa752f3c9f4d8f952682614490fb1014c14823
SHA2564e1a6a6dad48a69944d19afd8258c34f2880dea9b2c0a5515e6f64f1336de276
SHA5122c2d8b835435fcb9f4e97c354165040417b5e7e37db4cccf9247b8ccb8c7be9b6a7c62b7ef7f6327cc049ab91a408439ebea221ab51365482106ebc6aa7bdb19
-
Filesize
1.6MB
MD57580437d0fb8c1ae60d96dafb6883d30
SHA1be89b488b258555a8cf971e4d29c40ce92bf881d
SHA2563dce36d583ba1c741e95df1a265e47f0de581bef77ab48165dd67266be7a42ef
SHA512e67be84fb4c9bc87c20b72a1169f068b0afdbc9872be2cb0bfcf9eff65b2b246c60c7237350cbb38cefc004a75645f49d30c9acab12efb0e914450886c21e1eb
-
Filesize
2.0MB
MD581cf22f2206cc72aa0430943042cc57d
SHA1b1548ab1f95c2f99747be7f4758d48f2a97f3d66
SHA2567ab470e83005cfde857d7d45a40058f790c097852a7fa3e252cf69f1de9eba88
SHA512e9b094a6ec9ed8b5d69aabc3f89963df5ffc14db88dec2d67c494911498979f9ab703e1c7f007e59075dc871fc44fff4d27fb2b88a0a20bc53025fca908bfc7d
-
Filesize
3.3MB
MD5bdb0adcf1fa2d6ad11ca148925fc6056
SHA114348951d1749ac6fa25edb26fbdfc38261ed0ca
SHA25656e54267ea2594d7b2a7b69d751f6aa70e99b7006dfff2f6ab516c83f5a5a09b
SHA512017658186f962376de6affc45535f9e156f4a11027a8000ae1ed37b0699d598e3b41a3a29c2031982127adf2a575b3978bc7a2183fca822049efa61214b8d49a
-
Filesize
239KB
MD515cf1cf7b807776cc0b326fb13346dae
SHA149729240f86b74067183413aea526e9f9a769642
SHA2565d4df71edd63c510af04d27aa15aaa009c24e07e53efb0559dc6cc6b67e1c6cd
SHA512ffe781c632aa839cc66377ae31384bbeb4c4443d1e4875a902a6e1fc9c272ef1b911dfc7a423fb4902dd3033638919934a077639d19314380c5b219b52d102f7
-
Filesize
6.2MB
MD5f7265b7490428499f2fe409fa9247866
SHA1aa7ef4ddfa80551e0e636a3411ea28c5217d92b6
SHA25643a406c74689b72020e4669b45f19d377a5ff3efe79b03af58c2679d14405e9d
SHA5120b239376a42ea094d2ae202f0c05504de7f8317c414c3aa6f5e4571b435aee2940075f5d88dc89756cb447b96356ee6c4ad44efadbdc1d80a9992d8d21048164
-
Filesize
1.9MB
MD523d71c3090e1de46e5e5686f58f4571b
SHA1c8ef6443aa1cb7bc74ba1f48e5b5c1dcb0b65c24
SHA256a64270ddf9af5db895be90e913475e8c456e097d53075e19b7a8265dc81490cf
SHA5128feeb817968b9d2b93a40c9271d79724cde852b26d959cabf106b97d24b4d8b4896cf88e151d4031f14f7546737004909eb4e93b0411ecb8417b4e05324f592c
-
Filesize
4.1MB
MD5a7e39e856a7a4846c6fc0b4cd31c18eb
SHA13c1b6029fa3a80b02963a7627e1f8016015512f2
SHA256b22cfbea6caa65db558a70e98a6a3a03135f6ea76636dcae78835da1f5cfb885
SHA51217f3ec344b4c20c2a585258cf4f7841d2089e7eeb02943e4bbc8b89c92ec302c99643fd8ebeb4b8ff5a1ecc78586b77952152412331813c17422de11d7c1437d
-
Filesize
607B
MD52d930d3fa093dcad58ce661c7652de60
SHA145d75af6898e324f3aa1a575e63b4901fd7b0829
SHA2568572133206702f0c4681da5aeb2feea75e64955078af6512a18917c811f3a41b
SHA5123074efea7e78530bc82a09febb81a1b2fbfc676bb0751f869e725a9b295714d1287705122ce1635a770988c9a42656c3e08ad09025e052436e1d5a387c144db6
-
Filesize
3.3MB
MD5441ec847e501ddd547fc10492fd5a287
SHA1c67e70d2d0ddfb46b4fa0c80856c90feb918dc93
SHA2563e63054601f976aeda5c2fcdf0d222bacf38f48eb729e51b3392c915b4686e36
SHA512435241c11918276714079f98c67ebde4834ece5c0ac973594d2f28e9b8d444df1735ceec459a977868ddabb226d5c1e461f2bdd178710761b31bf3018d162356
-
Filesize
10.8MB
MD5bc378eebe3b5ad857a0c2a3d6759d1f1
SHA1accc2aef3f96ba1adfd31ade0dd5716599b8d2e2
SHA256cb0c0072d1690c5e0a4aae29d13496cd7ecfd48fe618c3ea4b3a65cefb26668a
SHA512e5941c023524510c66a37bfc55ba6b28f02ca53d4ff6e85016411bfbff0fbd5e3a013fdc77985380f87fe291c526b9db11151ff6e2c0d419a2e37c51d1f9bf75
-
Filesize
2.1MB
MD55265576f992af1de32d79b8570f95922
SHA1e355fd829c9eb02f56cd60103438164e79643c4f
SHA25685e2fcb69ee45cb81cfdfcc4ece39caf3fc25a545df30a0f04d6c4c64520db7c
SHA512fec8316d3fba8470d6d7582f1e494110a6ba4fc30eacaf134f093350361fe789278b13be5ddac23e42b1ae7a1956d0cff8cb702da5e637e0d2621e81d9a16869
-
Filesize
2KB
MD5674f323a2e134b22b02c2eb1b1418442
SHA11f3f8db5c273fb2111d35b44e5083060df73a356
SHA2562de57f636e51584faeb018f36689f02b4daeb69bdc34504d82622898c481cf48
SHA5126f814ffe09a768f359691b0f7214ac1cf658640ac746ed1240425c3d994f71061b1adef57ee6faf2cec9e68edd4845de9c817a20b38c36ae15b0ede52db7a089
-
Filesize
247KB
MD5351bf8f77b0a15a7b5a2ae098c52a387
SHA1be04e8000a3352f41588aa084c2b1ac7ca5145f2
SHA256a84330df5c4f0e5d6251d311b5dc78722d7724e87daf5de5a11eb73bb3502e26
SHA51204d062b5b5f5c3285aa9b3fa921905a0ac13b630eb5bf7fa412eaf432b415c3b33dda4fdfe5e73dbcba4575aa3610cbcfeddc498b8439a90415969a9ae1151b9
-
Filesize
110KB
MD530531264292dbc7507aa1ff4123f1f39
SHA15f938678984b63695b061c43e7c58d59d7035a9a
SHA256ad27317bfab1d5c1b332000df51336424b4b80af725392eb4a0fe53dc0695c41
SHA512344dea38a565a7f9fb8349e2a32226526ef8b546598c63a6465093e53e39512b509c7c3774b646231614b665d474c5b104805a4f1dbda173cbced67e06811bcd
-
Filesize
43KB
MD50987b4bb03fa1f3c0c7d37347b707d4e
SHA1282b0c57a2b5a2af3c3393e8ccbeccc05faa9ec4
SHA256edea667695a680b955f42024ad349a9b795a2365c59312edcc3fe5bf362f59e6
SHA5120bb44543ee6acd08d22270f9d4ccdcaf35e72867d2a12f888ad7f93d77237e83a5df3f140178f787c1a0ebfd02cdf3006066298862a36da74d8d1d8bf3390a53
-
Filesize
186KB
MD50b4a62420642b842df8656dbff663b0c
SHA122a89c1d2085a4aa8b1a99f54e2d75fe330067fb
SHA256acb7961eca32a50fcbd51b194488ddf40e610c2384edfd06235ae427bcb80c96
SHA512e9ad9be23bbeb1c2fcfc17ce16c48af67f380e72dbb3ba292965e340f2a868402b5812934b56864486cb890af80f5316a2b81cc916da9b01f7135bc02c972bf5
-
Filesize
101KB
MD5a2814db0a52a490ae674ad06ecbdc4cf
SHA188bfe28759135d87377999596286fb5233766d79
SHA256d3fa7326afbc7a5a94f7a4aec84a51acab89179d7caf0cb5f2af3794e6dba7f5
SHA5126d3ac4bad74c226063aa2ea951dd72608ac884be0a7d9b5347de2e363811207b5a9ee3e8177ef44d11a6bab6538ae691a4825185784e47aa483c11c17be075de
-
Filesize
100B
MD5a1e5a9e508fc1ffd94da7ff8474cd74b
SHA18e24fc7a0d84a58ce19d4d54eea5b2e9a0c6c7b4
SHA2561b936920211bf35d9bc8cb198ddc582e903a5f5f98a213fbcc50d52e336b5026
SHA512b2de1aae006ef6f0223dd032ca08714489cf90446c7154de8ae514427017af420abd1b9bf90330f05dcebf83bbde4a57225eda45574dd1be1efb871686e2b881
-
Filesize
104B
MD5481e08b086e1663fabd9afa850093696
SHA15b283959d8f5d356b25890f89babc22a8cdc7d73
SHA2568990dd342de96d5849ca93f4bc87a96cec4f33227e440e679668ee11207f3e38
SHA512e01fb0c54923a11a2956eb5797513c1a6525b9d66b5ef044c646ae957b95e2b16bb19ea1b6214e94f65c30834f8b43d401bbfde1ae50290e06ab73af4375febf
-
Filesize
9KB
MD5e07dd9bc24c84fb03c6e02f9102e6412
SHA1c56d201202484bfd2c110ca7b51b7abbe1b51ae1
SHA25690f29da695873fe79d6e1abacd18d4ca7899e847d816464b28fe4433f2aa3963
SHA5127da3ac60838f81a1d7cc6d915745ec37385fb87461e2e08e459157bbff33e7a1d31d929f070b117719b78fb126c8036938814270d445d0e431c7c1ad1e86f6af
-
Filesize
1KB
MD56ff45884a2121d5279cc4040fdc32fda
SHA15e6893661b5cd74fcd513c1795ef993879148ee0
SHA2565c84e76601b4915077cf311a0943c8c4e0db511e6f906530b6faaa8e38f36c84
SHA512f9bd817f33da8e389fa05340071772db02898b5c76bfbe1adae65fcf6292d4a7a60bd82e53847b2c76d9cd8726b5c55ca04f0fe15ffcb592737ba65c0e72e660
-
Filesize
1KB
MD5c34ad23e7b187819fc41ffdb9c295054
SHA10f58553fbfb29bc8d4848dc90ada02c4a6d81e58
SHA256d630b85406c7aeda282fe0df22811245a67bc796f638840cf095773741391b49
SHA5128641737c124fa5d708bde1d81535c7872942c9e700be7ab1e61f96d98c738e0683dc1217256ee723582216aa937d9b19e24caf865c9f87a30f8544148d04d4ed
-
Filesize
925B
MD5bb611d1fb3d9de286654a3452b68dde8
SHA1ca83cea150021f45366009d2e8be21dd6bac5967
SHA25698ca121caf041799e9727fd822d9b7eddc5ca2558ad182fb3d966c90569dc4f6
SHA512beddbe97d3b1039c16fa32c8b7eb30890413ff575b823433c165afedc3aa36bccfc4691eb0ccd6ee1517c58a1aaa0f3d3af4e5123e8cff1ea58c0b0433f17b15
-
Filesize
2KB
MD50f0736f905759295d5d02816214757a5
SHA142b691d544f5148dab66c3ea977d662c322ffc9e
SHA25616d4085ed3aa7c00ccebcfdb8e16de53158d2a0a15b926fe1a6c342e2a94fc96
SHA512bc009847b9de56e5fd8149d0a17f083cc236bbd26e68f8c2814bad365d3896b7f66a6f4e48ced060400f08db167146e5b0d0ff4a6b46c21cd97e8592f21ed59c
-
Filesize
24B
MD5546d9e30eadad8b22f5b3ffa875144bf
SHA13b323ffef009bfe0662c2bd30bb06af6dfc68e4d
SHA2566089fbf0c0c1413f62e91dc9497bedc6d8a271e9dc761e20adc0dccf6f4a0c1f
SHA5123478f5dcf7af549dd6fe48ad714604200de84a90120b16a32233b6d44fa7240f5f4e5fe803f54b86bbdfd10fa1bfdd88fb85eb6a78e23e426933f98d0a2565ec
-
Filesize
3KB
MD54ab0d936d15fad1bfe1c9843c975a5b5
SHA1c79b4a6d5ef3544bb9428b4fe1aa26dbddbd7f09
SHA2565dfdd203c6aa96909fcca1eada34ac9f7fff0adf1db655e13753a84958c95874
SHA51280829716ed63eff784767a0d316eb890f9065a80a8cfb26dfec34422c70aa02796f730b61b24ae6708e66c76a8cceb972a51ec93dfe423fb9c46b51cad79e6a6
-
Filesize
775B
MD5b3381f9aa89142e99b7cb53b3bb4c75c
SHA16af16450d96d258759850b45c22fe343b8b26b09
SHA256de77da47eea08b013f3a17511cfbf078110ed62c35cf301d9fa916b7297a0b4a
SHA512806e9f117ec6d60521fb95dc3da3b575aaba9e5d943817a05d5252d771d58578be64b44f98ccc6a88870936c13bbe02a5b683ed936b9f7df32959214e99f7dfc
-
Filesize
775B
MD5f3880fc3faa78872a9ebe2130344809a
SHA15592ab261f4ec22698106124fa49d335bf7179c4
SHA25663bc73d9a26148537b51234ed4a7a8d03fba2529e78be052617cee6f06b130d6
SHA512198fd603d3f45baf95f0515a931c41d528d90a77324822649185757cf18eaa0aa223779f7b52a071358c862ef99593d7fb145d47164c22c2319b452174d0969c
-
Filesize
22KB
MD5885d647474d6eab46dd4b5197bbcf6c6
SHA15a8bd3b8f17b6501354dd646a6baf0a22cb55695
SHA2561d7f22839b23f76773fdaed74aecc5bafc09aa24cd8500f3609ab2aa09d05845
SHA512c876d81e32cdcbe244930b6c6a9fe870bb14f8f9dde47300ce08daa05bdac0f8960facbde7f5f78546f5dd777cc0371984cf8dada79bba33c961ca633ae68f99
-
Filesize
10KB
MD59a4ac2b44a9ad3ec5cf9534c2acde781
SHA1a61d029ac93ada329c70633a7fcaeb754a22dded
SHA25696813f362732ed0516316ae0f3119a6ea6bcefd53c940e59232546600853444f
SHA5123c0ccc6ed19728f61e9075888427edf9b6bb9d47274b61beb6da9edf52c526848a07d6a559300d5a5696614ffdd9432ff007b1b853e601e4c8f28fc3bd2b51ff
-
Filesize
514B
MD5dd15d093dc51c98167f736d69a349add
SHA1957f340b5f3690bdee750bdbfdd1f1c698ca7be6
SHA256e54e69d1293b6a7058fc580d749b643cca6aa823d1fc00ae7e245665fc62a7f1
SHA512467417445c106ebf06620b1c33fadfd578f8cba28465ad09fb5147e914dd3607c420ed79fe6d3be80bc31e45b54bdf8fea17d14767ff984c3eaeb5d9841eba6e
-
Filesize
514B
MD598b4099b3d487621c580a0d29c722efc
SHA10d533cf45a311b6033db4532448d04492b5491c8
SHA2564eae4a8483bce998f40bf1247185bf5bbcc9a844d3f1ee2262aad0bd7bebd78a
SHA5120c6997ed4a7580b6f545a0da91fb8bee2af692bb45468235c646f09acb1efc326a1b20652c8471a136386be712be4a45e953c676aed07726d4342231742954b8
-
Filesize
24B
MD52f7423ca7c6a0f1339980f3c8c7de9f8
SHA1102c77faa28885354cfe6725d987bc23bc7108ba
SHA256850a4ea37a0fd6f68bf95422d502b2d1257264eb90cc38c0a3b1b95aa375be55
SHA512e922ac8a7a2cde6d387f8698207cf5efbd45b646986a090e3549d97a7d552dd74179bd7ac20b7d246ca49d340c4c168982c65b4749df760857810b2358e7eb69
-
Filesize
18.6MB
MD5be363c81439b1875e81cb6cfbd53f6d4
SHA1b02017e19deffe541ee7613fa5efcee41d864178
SHA256fe8b403929c13bfc48e91c5b5ae71d1efb3f52397a4832407914b313b81a0b62
SHA51281ca1e7996c602fc7ed7c790f16557b4b269e0fce723c22167a0f1389d1ab28d8fccb7ebdb81149f1f8a235e5251738819b8dc24d9200c8f4e5ff8e8f2adf624
-
Filesize
1.8MB
MD5dd762b25660bc1301ad50631f9dec302
SHA18093cd2bd83572646b8d6a9ac55b6758c6839be8
SHA2566e62ed7029d73f8625db3309bf3146a3a1a793353faec7d1b70f67e71204e936
SHA5121b0d5fb2d5cc0fb4b3494fa84502364d6582f054bd47d2ba58e2fd8ea00be6a7b660c80b4eac86b04ec8823d04cb611b0e9b46dc16cf9d0353a5a1a9c233a2b7
-
Filesize
198KB
MD57ae4464544f8ec6dc2a19d7413fb40a1
SHA1d6a48e08d9f43388544ced6e6ee0c3387bf358bd
SHA256bd4acfc46b74046d5fc2a8fe1fc3c88fef43fda04681369347f762e21b7f0065
SHA51219ef8eabf6b2d7069be05fd33e85d2b0774f67175c2cc033103ff966d15c5aeee815b9457e2acbfa5c188ec4e8bf4f963fa5c831cc054a88a50d0db4759d1041
-
Filesize
9.4MB
MD5bb2294822ae2c2349907d0b5b7d0bbe7
SHA127f10b774ce5a1bf5633a73b2b12e7dc9cf38c88
SHA2567f9b7a30ad2ed3f40a2285afc1c8526916e7b7a2fcdfd33265e76e6471696333
SHA51284666ab71397e041a068aeba6ce8deb7d8bd26b8c60d566d3e156ec874cfd7ce95d4a59d7e41a9f0be215d880cda670f4c56e57c1bb53b5bb8288ae4e1b13d0c
-
Filesize
6.1MB
MD5b48e5f5448fe8fc971128a8686e17e40
SHA1c8ba1082c02262c881a842fe16b95c3eeaf82b7f
SHA256681dbb59a2f88a2c498940534761801c341a5c901f2c41b2f94dd8cb42a4350e
SHA5129da5e8da866112686f49b61ec29151ff293baa810975f6e49019a742630904cfcd706e4a9825c1fedc182e7252c934c0553772bd554cc07f359860cf94b3de0d
-
Filesize
2KB
MD5670d1358da6ceb98522768c559bb0c52
SHA18ddea4b7cfa63c2c4c1fbc9904af4c5ada97f5b5
SHA2569579dfd0b67a233cc54201082bd0a6fb6ce500c541cb6055a412c0d202004678
SHA512333899e94a1b4412fa76da9220d9981c5c755ebf9f14340127df0dcdab109f2dd67a009ba72d865ac9ce39c4de74b7a82e4164536cdee7cd403e784c9438bb1c
-
Filesize
1KB
MD5379a301592736712c9a60676c50cf19b
SHA1c103790503bf8c2ff3f119adee027ebb429b9d21
SHA256cc7400692bd90e1b5fc44e11c8dd7c788cbb462f52ea3f3decb579e4d51eb268
SHA512dec25a31f2930eb575a43e654c29f170c261c1c4516767c0e71cc172ad6ad115914fb58d9cd79f681ff3d7c6baa6b7c0d6de99de09d7582c9807ae436f15572f
-
Filesize
1KB
MD5d25e0f479b9601edf2c9c2dad7ba2706
SHA12f1d0001e47394f4c4deec9645c5f2df99f91a95
SHA25663ff360aafde5ff959fb9671ec27002f99cbfae4907b410046b6a1b0f51cba9e
SHA5123ba164dad3cadf1ea9f0c555695e4d39cba47612599f547d0d0d59014577995c0ddbff0ef6a5e436867454da02d500136b54c034c2223586271b26108b2cfb5e
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
7KB
MD54f8b110e37a818130310f0c34ec90dc5
SHA13bef6199fa0ba4c7b98d9c6a6c5a29c52ef9f3b1
SHA256db72101e43020be81ff304f50cf593497d66073be946502c16bcd64e7b2adcc3
SHA512d998b6f09e8750f8f99491e2c2dcbb0cec4a65f8154d795ca070eb131a4f88a30116715b67d1904a0b774e77d0b3ffdb994d10de5688e47f1e2901b10202402b
-
Filesize
2.5MB
MD5fad7ff3ad298b98af90ee28e8ac9e8ea
SHA18ef1656215747bbeaaabc3ca1a82d4d2de4166d9
SHA25686f1c7b02c2c1cb100757b18719b1613f9035ae89cf7dd460a39da9f9f163c95
SHA512812a04bd6e6800ca2f78224356a1035a78b3b4cc5c921c2c1d6a13a8bd5063cae8fd5352e39d2150a6f18790a23a02f4d45079cbfe52f854e006aefb9f167fd3
-
Filesize
1.1MB
MD54fbe9e047364e20b94e885e54d8846db
SHA1e087573ec32542cd413b98de241f07b6d0a53552
SHA256011678bfa9d1d8bd25b6131ae5d887326f46bda9b1b82c5795121bfe8b75d53e
SHA51265870b8b8d1b9b6221701e7af646d26ca14e583663276728f0e962d2a49e3b84b951d248cd9c7f5389c607f9424c2bb9cf8e20780a23a6b659e6f8f1474fcf27
-
Filesize
243B
MD576c2ccd03b6ae4f8d94a48bef946dc4e
SHA175fe9765bcb3315358cba7959de398f7e80b6d61
SHA256803d94cdf262f2097aac64c9f2f6e5e766e27089a6a12eb9606d03a08b4555a6
SHA512191243d94989402a126f604b34b2e35b8d5e0ac46ecf843434860cd64c25fc1d4be807cbbb25ba109b87eb851718d1daf79ded88487476eee8d6ef5233630e30
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3