Analysis
-
max time kernel
600s -
max time network
601s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-08-2022 14:05
Static task
static1
Behavioral task
behavioral1
Sample
019338921.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
019338921.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
01970422_890527.lnk
Resource
win7-20220812-en
General
-
Target
01970422_890527.lnk
-
Size
1KB
-
MD5
76390978f26d3c6d7f799257542796ce
-
SHA1
4d3efb8f9db9519160fe13f79ef5be1c041eed0e
-
SHA256
03160be7cb698e1684f47071cb441ff181ff299cb38429636d11542ba8d306ae
-
SHA512
8c6243c7a93974dbf1a6878fbb2ad89861a4b960fb5262ba6c0e6274f78fcf93c90e80d1f007b9a6e3deafd53969fffb8f2e66adfd0e10c19fe7f65e4c597779
Malware Config
Extracted
qakbot
403.694
obama186
1654596660
67.165.206.193:993
63.143.92.99:995
74.14.5.179:2222
182.191.92.203:995
197.89.8.51:443
89.101.97.139:443
86.97.9.190:443
124.40.244.115:2222
80.11.74.81:2222
41.215.153.104:995
179.100.20.32:32101
31.35.28.29:443
202.134.152.2:2222
109.12.111.14:443
93.48.80.198:995
120.150.218.241:995
41.38.167.179:995
177.94.57.126:32101
173.174.216.62:443
1.161.101.20:443
88.224.254.172:443
82.41.63.217:443
67.209.195.198:443
70.46.220.114:443
24.178.196.158:2222
39.44.213.68:995
84.241.8.23:32103
210.246.4.69:995
92.132.172.197:2222
91.177.173.10:995
217.128.122.65:2222
149.28.238.199:995
45.76.167.26:995
45.63.1.12:443
144.202.2.175:443
45.63.1.12:995
144.202.3.39:995
144.202.2.175:995
45.76.167.26:443
149.28.238.199:443
144.202.3.39:443
140.82.63.183:995
140.82.63.183:443
175.145.235.37:443
85.246.82.244:443
47.23.89.60:993
187.207.131.50:61202
176.67.56.94:443
148.64.96.100:443
140.82.49.12:443
76.70.9.169:2222
217.164.121.161:2222
72.27.33.160:443
108.60.213.141:443
104.34.212.7:32103
39.44.158.215:995
31.48.174.63:2078
75.99.168.194:61201
117.248.109.38:21
83.110.218.147:993
82.152.39.39:443
180.129.108.214:995
5.32.41.45:443
83.110.92.106:443
197.164.182.46:993
196.203.37.215:80
186.90.153.162:2222
37.186.54.254:995
89.211.179.247:2222
24.139.72.117:443
201.142.177.168:443
37.34.253.233:443
69.14.172.24:443
125.24.187.183:443
208.107.221.224:443
174.69.215.101:443
76.25.142.196:443
96.37.113.36:993
173.21.10.71:2222
73.151.236.31:443
45.46.53.140:2222
189.146.90.232:443
70.51.135.90:2222
190.252.242.69:443
201.145.165.25:443
47.157.227.70:443
72.252.157.93:993
177.205.155.85:443
72.252.157.93:995
187.251.132.144:22
40.134.246.185:995
24.55.67.176:443
79.80.80.29:2222
179.158.105.44:443
72.252.157.93:990
89.86.33.217:443
201.172.23.68:2222
102.182.232.3:995
177.156.191.231:443
39.49.96.122:995
94.36.193.176:2222
120.61.1.114:443
217.164.121.161:1194
39.41.29.200:995
86.195.158.178:2222
86.98.149.168:2222
1.161.101.20:995
124.109.35.32:995
172.115.177.204:2222
105.27.172.6:443
32.221.224.140:995
208.101.82.0:443
71.24.118.253:443
143.0.219.6:995
217.165.176.49:2222
90.120.65.153:2078
5.203.199.157:995
39.52.41.80:995
148.0.56.63:443
191.112.25.187:443
121.7.223.45:2222
47.156.131.10:443
177.209.202.242:2222
41.86.42.158:995
106.51.48.170:50001
41.84.229.240:443
94.71.169.212:995
111.125.245.116:995
78.101.193.241:6883
201.242.175.29:2222
38.70.253.226:2222
187.149.236.5:443
217.165.79.88:443
85.255.232.18:443
103.246.242.202:443
41.230.62.211:995
67.69.166.79:2222
42.228.224.249:2222
172.114.160.81:995
94.26.122.9:995
75.99.168.194:443
189.253.206.105:443
81.215.196.174:443
46.107.48.202:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Ykdlydtcqpai = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Lqujhkuaxe = "0" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1396 regsvr32.exe -
Drops file in System32 directory 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 36 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A}\WpadDecisionReason = "1" explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A}\WpadNetworkName = "Network 3" explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-80-09-db-74-65 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-80-09-db-74-65\WpadDecisionReason = "1" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A}\WpadDecisionTime = 30977af91db3d801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\9a61166e = a33369b0eed6c218dd93d74c2968acee3f4648f8f9d679bc6eec14076558a99674080d2a086a28b1 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hixabdlwuopiy explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\680bceb3 = bde541b7f563d4210cd02e99b0cea93db9408f05e02c2fc3da0628ad0d7e2bc2d9b13c8d7ad86d64614c3500e03bb831924560269563d99f explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\680bceb3 = bde556b7f563e11424f1306d45e87736b0e28e14a1df086ec9d1dba47c00b411060c5f613ecbe38cb761974f737a52fa6dc9d2e7a9c002bca7c40eda05cb2ef59dcfece65b3f39905568cdedd8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\e76959e4 = 0d4e02bf11be4d2e4c85f5ec9dce3663883b82078434aeb1a0a8a95346b9ace46c0cbf2e12b2493e0bc24755508863cfcc2e48f736fd10da6a6ab635fe9772ba71f6f2d46a5b4c9942adbbd58c9b099676878cb67da07746933991132589b6cd8d91e92825d154 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A}\ca-80-09-db-74-65 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\5d941efd = 4759bed06932dfeb8c8bc59e4d42e7602a175aa4ae5e4bfcda7c1c9a521ec7431fd821e6fb98bf2d3aff174f4cac2f09a6c29a1abc7674325bed318b95a4349fd9f5a120b6bbbbd5939d1876e973a6a92e55336f4f289d07bf157518b25f0d655b3529e0dff7d4259dd946af36e9bdccfd68 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\1742a145 = d45d1124ae90269a32f299bb2e6eb18658729e6c62294d8c61f308056c9db973448cd9bfe46cae44e3c69025850a70ea5ed179e1fea7246c97 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\680bceb3 = bde556b7f563e11424f1306d45e87736b0e28e14a1df086ecbd0d8a47c00b411060c5f613ecbe38cb761974f737a52fa6dc9d2e7a9c002bca7c40eda05cb2ef59dcfece65b3f39905568cdedd8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\680bceb3 = bde55fb7f563e11424f1312740e37d34b2e78a14edd40065c8dfd9924429960cb7fe70bb04f769a1be989a460b6382a95391c4a940035a2067b350a05fc725e7b8c8f0cf4d163b1978f23e2f8d9d755b6de2f2e0ba95 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0092000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\22dd710b = f2614ac97854cddb1cf626ed1c942eaf76df5888dfef8747f68f5a418c703123cc6739b20c93f68e422389eacd41aa41527cf317aac5ebf9d32f045b4cfb2911ef0f3a56617668b68c524da1bf2106877646c4b646a1765233f1c8d8aec7b5b86459e5 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\e5287998 = eb3a4ad382b48b1529a22a955018bec7118ecc96c0702871a4cbd88ae31ad7704651b7f30fdf483001fa explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A}\WpadDecision = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-80-09-db-74-65\WpadDecision = "0" explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A} explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-80-09-db-74-65\WpadDecisionTime = 30977af91db3d801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Hixabdlwuopiy\5fd53e81 = 908791c3c1f2e479129b680b73f8e89589764331c5beafd3fbef777e7954aa24d5c5d3a135b99fb3b74fe0930cdaf55f722abc3323012141cf18e67d6bb1741fb68123921a33a8 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeexplorer.exeregsvr32.exepid process 1488 rundll32.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1396 regsvr32.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1488 rundll32.exe 1396 regsvr32.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
cmd.exerundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1660 wrote to memory of 1868 1660 cmd.exe rundll32.exe PID 1660 wrote to memory of 1868 1660 cmd.exe rundll32.exe PID 1660 wrote to memory of 1868 1660 cmd.exe rundll32.exe PID 1868 wrote to memory of 1488 1868 rundll32.exe rundll32.exe PID 1868 wrote to memory of 1488 1868 rundll32.exe rundll32.exe PID 1868 wrote to memory of 1488 1868 rundll32.exe rundll32.exe PID 1868 wrote to memory of 1488 1868 rundll32.exe rundll32.exe PID 1868 wrote to memory of 1488 1868 rundll32.exe rundll32.exe PID 1868 wrote to memory of 1488 1868 rundll32.exe rundll32.exe PID 1868 wrote to memory of 1488 1868 rundll32.exe rundll32.exe PID 1488 wrote to memory of 1456 1488 rundll32.exe explorer.exe PID 1488 wrote to memory of 1456 1488 rundll32.exe explorer.exe PID 1488 wrote to memory of 1456 1488 rundll32.exe explorer.exe PID 1488 wrote to memory of 1456 1488 rundll32.exe explorer.exe PID 1488 wrote to memory of 1456 1488 rundll32.exe explorer.exe PID 1488 wrote to memory of 1456 1488 rundll32.exe explorer.exe PID 1456 wrote to memory of 572 1456 explorer.exe schtasks.exe PID 1456 wrote to memory of 572 1456 explorer.exe schtasks.exe PID 1456 wrote to memory of 572 1456 explorer.exe schtasks.exe PID 1456 wrote to memory of 572 1456 explorer.exe schtasks.exe PID 1920 wrote to memory of 1104 1920 taskeng.exe regsvr32.exe PID 1920 wrote to memory of 1104 1920 taskeng.exe regsvr32.exe PID 1920 wrote to memory of 1104 1920 taskeng.exe regsvr32.exe PID 1920 wrote to memory of 1104 1920 taskeng.exe regsvr32.exe PID 1920 wrote to memory of 1104 1920 taskeng.exe regsvr32.exe PID 1104 wrote to memory of 1396 1104 regsvr32.exe regsvr32.exe PID 1104 wrote to memory of 1396 1104 regsvr32.exe regsvr32.exe PID 1104 wrote to memory of 1396 1104 regsvr32.exe regsvr32.exe PID 1104 wrote to memory of 1396 1104 regsvr32.exe regsvr32.exe PID 1104 wrote to memory of 1396 1104 regsvr32.exe regsvr32.exe PID 1104 wrote to memory of 1396 1104 regsvr32.exe regsvr32.exe PID 1104 wrote to memory of 1396 1104 regsvr32.exe regsvr32.exe PID 1396 wrote to memory of 1500 1396 regsvr32.exe explorer.exe PID 1396 wrote to memory of 1500 1396 regsvr32.exe explorer.exe PID 1396 wrote to memory of 1500 1396 regsvr32.exe explorer.exe PID 1396 wrote to memory of 1500 1396 regsvr32.exe explorer.exe PID 1396 wrote to memory of 1500 1396 regsvr32.exe explorer.exe PID 1396 wrote to memory of 1500 1396 regsvr32.exe explorer.exe PID 1500 wrote to memory of 976 1500 explorer.exe reg.exe PID 1500 wrote to memory of 976 1500 explorer.exe reg.exe PID 1500 wrote to memory of 976 1500 explorer.exe reg.exe PID 1500 wrote to memory of 976 1500 explorer.exe reg.exe PID 1500 wrote to memory of 1936 1500 explorer.exe reg.exe PID 1500 wrote to memory of 1936 1500 explorer.exe reg.exe PID 1500 wrote to memory of 1936 1500 explorer.exe reg.exe PID 1500 wrote to memory of 1936 1500 explorer.exe reg.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\01970422_890527.lnk1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" 019338921.dll,DllInstall2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" 019338921.dll,DllInstall3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn aqnrzjefxb /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\019338921.dll\"" /SC ONCE /Z /ST 16:10 /ET 16:225⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {190C66A0-FB44-444B-878C-1F0574B5D3D4} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\019338921.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\019338921.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Ykdlydtcqpai" /d "0"5⤵
- Windows security bypass
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Lqujhkuaxe" /d "0"5⤵
- Windows security bypass
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\019338921.dllFilesize
1.4MB
MD57bbeafc1ab9f9d1a48a99338ffec561c
SHA1a4ce6de223addbdc66e747d3abd00b9f190fb5cb
SHA256fca807ab91e7328195cafebe5761402f4d7066aef4c766c78a37f2c27fcf812c
SHA512a32b34d9c03b6a1eaa1d409968d6d211a22320cc8b46955f8cda156f4956ea4a3d2e6d0a5fd8578e274e67db36e2696a7e8722647313333d3b7825d3e3a2c263
-
\Users\Admin\AppData\Local\Temp\019338921.dllFilesize
1.4MB
MD57bbeafc1ab9f9d1a48a99338ffec561c
SHA1a4ce6de223addbdc66e747d3abd00b9f190fb5cb
SHA256fca807ab91e7328195cafebe5761402f4d7066aef4c766c78a37f2c27fcf812c
SHA512a32b34d9c03b6a1eaa1d409968d6d211a22320cc8b46955f8cda156f4956ea4a3d2e6d0a5fd8578e274e67db36e2696a7e8722647313333d3b7825d3e3a2c263
-
memory/572-105-0x0000000000000000-mapping.dmp
-
memory/976-124-0x0000000000000000-mapping.dmp
-
memory/1104-107-0x0000000000000000-mapping.dmp
-
memory/1396-117-0x0000000000480000-0x00000000004AD000-memory.dmpFilesize
180KB
-
memory/1396-110-0x0000000000000000-mapping.dmp
-
memory/1396-122-0x00000000006F0000-0x0000000000712000-memory.dmpFilesize
136KB
-
memory/1396-118-0x00000000006F0000-0x0000000000712000-memory.dmpFilesize
136KB
-
memory/1396-115-0x00000000006F0000-0x0000000000712000-memory.dmpFilesize
136KB
-
memory/1396-116-0x00000000006F0000-0x0000000000712000-memory.dmpFilesize
136KB
-
memory/1396-114-0x00000000006F0000-0x0000000000712000-memory.dmpFilesize
136KB
-
memory/1396-113-0x0000000000B30000-0x0000000000C95000-memory.dmpFilesize
1.4MB
-
memory/1456-100-0x0000000000000000-mapping.dmp
-
memory/1456-102-0x0000000074801000-0x0000000074803000-memory.dmpFilesize
8KB
-
memory/1456-104-0x0000000000080000-0x00000000000A2000-memory.dmpFilesize
136KB
-
memory/1456-106-0x0000000000080000-0x00000000000A2000-memory.dmpFilesize
136KB
-
memory/1488-103-0x0000000000BD0000-0x0000000000BF2000-memory.dmpFilesize
136KB
-
memory/1488-96-0x0000000000BD0000-0x0000000000BF2000-memory.dmpFilesize
136KB
-
memory/1488-92-0x0000000000000000-mapping.dmp
-
memory/1488-94-0x00000000003B0000-0x0000000000515000-memory.dmpFilesize
1.4MB
-
memory/1488-95-0x0000000000BD0000-0x0000000000BF2000-memory.dmpFilesize
136KB
-
memory/1488-97-0x0000000000BD0000-0x0000000000BF2000-memory.dmpFilesize
136KB
-
memory/1488-99-0x0000000000BD0000-0x0000000000BF2000-memory.dmpFilesize
136KB
-
memory/1488-93-0x0000000075FB1000-0x0000000075FB3000-memory.dmpFilesize
8KB
-
memory/1488-98-0x00000000006B0000-0x00000000006DD000-memory.dmpFilesize
180KB
-
memory/1500-119-0x0000000000000000-mapping.dmp
-
memory/1500-123-0x00000000000C0000-0x00000000000E2000-memory.dmpFilesize
136KB
-
memory/1500-126-0x00000000000C0000-0x00000000000E2000-memory.dmpFilesize
136KB
-
memory/1660-54-0x000007FEFBCE1000-0x000007FEFBCE3000-memory.dmpFilesize
8KB
-
memory/1868-88-0x0000000000000000-mapping.dmp
-
memory/1936-125-0x0000000000000000-mapping.dmp