Analysis
-
max time kernel
147s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-09-2022 13:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
046259ce63932f27c7bf22aeec796c2f
-
SHA1
cf80d5bdaa2a0a2fa2414375353f8a180ee43b94
-
SHA256
81a9eb6e5b3b3c239a9cbcccc7d9651d5930aecd0c630e4f36ec6b1d3f4e8cd8
-
SHA512
03949b25835fbdd98cfff9217d937f0695c9bd89c5d13033f5529f015837aee17de8af20af1e1d5407c624ddc77502f19e6613d60eb65da0966d443974b25dc3
-
SSDEEP
196608:91OnECWBY37gkHNIrEDXiA7WAnkAvoc9gVYTVhXsBqmZ+kp6MH+3OBd:3OnECWB87gktIrED+G/oogGhuBqA4Md
Malware Config
Signatures
-
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\QYiUKrukFVUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\SHsJRQZsU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\MYjwJFnMfsmfKHMw = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\fxkldoUMcXUSOxVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\MYjwJFnMfsmfKHMw = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ATZmuaBwNwmU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\aJAQLsoDkiWqC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\MYjwJFnMfsmfKHMw = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ATZmuaBwNwmU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\fxkldoUMcXUSOxVB = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\aJAQLsoDkiWqC = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\MYjwJFnMfsmfKHMw = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\QYiUKrukFVUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\SHsJRQZsU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Executes dropped EXE 3 IoCs
Processes:
Install.exeInstall.exeAzLWMQp.exepid process 1984 Install.exe 1956 Install.exe 1468 AzLWMQp.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Loads dropped DLL 8 IoCs
Processes:
file.exeInstall.exeInstall.exepid process 1880 file.exe 1984 Install.exe 1984 Install.exe 1984 Install.exe 1984 Install.exe 1956 Install.exe 1956 Install.exe 1956 Install.exe -
Drops file in System32 directory 8 IoCs
Processes:
AzLWMQp.exepowershell.EXEpowershell.EXEpowershell.EXEInstall.exepowershell.EXEdescription ioc process File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini AzLWMQp.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol AzLWMQp.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol AzLWMQp.exe -
Drops file in Windows directory 1 IoCs
Processes:
schtasks.exedescription ioc process File created C:\Windows\Tasks\bNHXguvSZYiOwSiXLC.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1836 schtasks.exe 1920 schtasks.exe 1756 schtasks.exe 1076 schtasks.exe 880 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 9 IoCs
Processes:
wscript.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.EXEpowershell.EXEpowershell.EXEpowershell.EXEpid process 1148 powershell.EXE 1148 powershell.EXE 1148 powershell.EXE 1508 powershell.EXE 1508 powershell.EXE 1508 powershell.EXE 1716 powershell.EXE 1716 powershell.EXE 1716 powershell.EXE 320 powershell.EXE 320 powershell.EXE 320 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.EXEpowershell.EXEpowershell.EXEpowershell.EXEdescription pid process Token: SeDebugPrivilege 1148 powershell.EXE Token: SeDebugPrivilege 1508 powershell.EXE Token: SeDebugPrivilege 1716 powershell.EXE Token: SeDebugPrivilege 320 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeInstall.exeInstall.exeforfiles.exeforfiles.execmd.execmd.exedescription pid process target process PID 1880 wrote to memory of 1984 1880 file.exe Install.exe PID 1880 wrote to memory of 1984 1880 file.exe Install.exe PID 1880 wrote to memory of 1984 1880 file.exe Install.exe PID 1880 wrote to memory of 1984 1880 file.exe Install.exe PID 1880 wrote to memory of 1984 1880 file.exe Install.exe PID 1880 wrote to memory of 1984 1880 file.exe Install.exe PID 1880 wrote to memory of 1984 1880 file.exe Install.exe PID 1984 wrote to memory of 1956 1984 Install.exe Install.exe PID 1984 wrote to memory of 1956 1984 Install.exe Install.exe PID 1984 wrote to memory of 1956 1984 Install.exe Install.exe PID 1984 wrote to memory of 1956 1984 Install.exe Install.exe PID 1984 wrote to memory of 1956 1984 Install.exe Install.exe PID 1984 wrote to memory of 1956 1984 Install.exe Install.exe PID 1984 wrote to memory of 1956 1984 Install.exe Install.exe PID 1956 wrote to memory of 704 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 704 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 704 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 704 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 704 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 704 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 704 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 1952 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 1952 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 1952 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 1952 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 1952 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 1952 1956 Install.exe forfiles.exe PID 1956 wrote to memory of 1952 1956 Install.exe forfiles.exe PID 704 wrote to memory of 1292 704 forfiles.exe cmd.exe PID 704 wrote to memory of 1292 704 forfiles.exe cmd.exe PID 704 wrote to memory of 1292 704 forfiles.exe cmd.exe PID 704 wrote to memory of 1292 704 forfiles.exe cmd.exe PID 704 wrote to memory of 1292 704 forfiles.exe cmd.exe PID 704 wrote to memory of 1292 704 forfiles.exe cmd.exe PID 704 wrote to memory of 1292 704 forfiles.exe cmd.exe PID 1952 wrote to memory of 1756 1952 forfiles.exe cmd.exe PID 1952 wrote to memory of 1756 1952 forfiles.exe cmd.exe PID 1952 wrote to memory of 1756 1952 forfiles.exe cmd.exe PID 1952 wrote to memory of 1756 1952 forfiles.exe cmd.exe PID 1952 wrote to memory of 1756 1952 forfiles.exe cmd.exe PID 1952 wrote to memory of 1756 1952 forfiles.exe cmd.exe PID 1952 wrote to memory of 1756 1952 forfiles.exe cmd.exe PID 1292 wrote to memory of 1760 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1760 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1760 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1760 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1760 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1760 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1760 1292 cmd.exe reg.exe PID 1756 wrote to memory of 968 1756 cmd.exe reg.exe PID 1756 wrote to memory of 968 1756 cmd.exe reg.exe PID 1756 wrote to memory of 968 1756 cmd.exe reg.exe PID 1756 wrote to memory of 968 1756 cmd.exe reg.exe PID 1756 wrote to memory of 968 1756 cmd.exe reg.exe PID 1756 wrote to memory of 968 1756 cmd.exe reg.exe PID 1756 wrote to memory of 968 1756 cmd.exe reg.exe PID 1292 wrote to memory of 1916 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1916 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1916 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1916 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1916 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1916 1292 cmd.exe reg.exe PID 1292 wrote to memory of 1916 1292 cmd.exe reg.exe PID 1756 wrote to memory of 1492 1756 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS25D9.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS2CDB.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gtWMFWxFm" /SC once /ST 00:06:16 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gtWMFWxFm"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gtWMFWxFm"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bNHXguvSZYiOwSiXLC" /SC once /ST 15:31:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt\QEJzPCsOgNeEaNF\AzLWMQp.exe\" 3x /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {3815C6C0-474F-4D71-872F-91A75B4351D9} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {2770CD15-222A-4969-9FC4-A29E54CF2294} S-1-5-18:NT AUTHORITY\System:Service:1⤵
-
C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt\QEJzPCsOgNeEaNF\AzLWMQp.exeC:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt\QEJzPCsOgNeEaNF\AzLWMQp.exe 3x /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gsDMGJUry" /SC once /ST 02:57:53 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gsDMGJUry"3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gsDMGJUry"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "guUXxzrqL" /SC once /ST 07:14:05 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "guUXxzrqL"3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "guUXxzrqL"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\MYjwJFnMfsmfKHMw\BzctWuyA\jaDKZsghgTsyjAoK.wsf"3⤵
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\MYjwJFnMfsmfKHMw\BzctWuyA\jaDKZsghgTsyjAoK.wsf"3⤵
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ATZmuaBwNwmU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ATZmuaBwNwmU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QYiUKrukFVUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QYiUKrukFVUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SHsJRQZsU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SHsJRQZsU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aJAQLsoDkiWqC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aJAQLsoDkiWqC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fxkldoUMcXUSOxVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fxkldoUMcXUSOxVB" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ATZmuaBwNwmU2" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QYiUKrukFVUn" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ATZmuaBwNwmU2" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QYiUKrukFVUn" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SHsJRQZsU" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SHsJRQZsU" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aJAQLsoDkiWqC" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aJAQLsoDkiWqC" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obbvPdCxLMZjlJoeoAR" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fxkldoUMcXUSOxVB" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fxkldoUMcXUSOxVB" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MYjwJFnMfsmfKHMw" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gNyZAoXAn" /SC once /ST 03:24:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gNyZAoXAn"3⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS25D9.tmp\Install.exeFilesize
6.4MB
MD5b829866d020ee2184ddb6915ea4190e2
SHA1bd2466f3e57f4b1a9e0661d79e0cc22d7eac81fa
SHA25623db00745f3d4be8108d75af4eb0448052ebfb1c589368d51a9ec01993be653a
SHA5126335ca14f1cc88b95b017bbc1bd7a076d61194919e9699884d19056478adc1db883509ab126b515310c9d608a16bf0e85c6133ee3fddac70689c233204da384e
-
C:\Users\Admin\AppData\Local\Temp\7zS25D9.tmp\Install.exeFilesize
6.4MB
MD5b829866d020ee2184ddb6915ea4190e2
SHA1bd2466f3e57f4b1a9e0661d79e0cc22d7eac81fa
SHA25623db00745f3d4be8108d75af4eb0448052ebfb1c589368d51a9ec01993be653a
SHA5126335ca14f1cc88b95b017bbc1bd7a076d61194919e9699884d19056478adc1db883509ab126b515310c9d608a16bf0e85c6133ee3fddac70689c233204da384e
-
C:\Users\Admin\AppData\Local\Temp\7zS2CDB.tmp\Install.exeFilesize
7.0MB
MD554042a806886288ad60c64e7adaa2f53
SHA130ee71d3a30dff86dad3224ea57d844e18505cc1
SHA256facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487
SHA512a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001
-
C:\Users\Admin\AppData\Local\Temp\7zS2CDB.tmp\Install.exeFilesize
7.0MB
MD554042a806886288ad60c64e7adaa2f53
SHA130ee71d3a30dff86dad3224ea57d844e18505cc1
SHA256facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487
SHA512a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001
-
C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt\QEJzPCsOgNeEaNF\AzLWMQp.exeFilesize
7.0MB
MD554042a806886288ad60c64e7adaa2f53
SHA130ee71d3a30dff86dad3224ea57d844e18505cc1
SHA256facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487
SHA512a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001
-
C:\Users\Admin\AppData\Local\Temp\kVuqSqHMACBMgWqnt\QEJzPCsOgNeEaNF\AzLWMQp.exeFilesize
7.0MB
MD554042a806886288ad60c64e7adaa2f53
SHA130ee71d3a30dff86dad3224ea57d844e18505cc1
SHA256facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487
SHA512a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5300df578f0c7e71d169a5460637a186b
SHA157cc7b6d0ebaa8581fc3d8291349b13820ae6de2
SHA2564942b940792f21ac01043007ae4d73a5cca4e382b5afea210e273f2db1e6d2d8
SHA5125844575ceadef09b416d0f27c83ee569df31ed4b0ced0bee644c86a9c16247c5a61dc6b90e92785bad91fed181cd0951a4fa38eb9700635055f6fc3d5a2090a0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD579354f5e55952f9ebb6484e95e187b3d
SHA14534dbdc8e17778fb65f7960504a39cedaf2d799
SHA256d7ddb9de27c8dff4c59b0dae26c58d499bd5a5ad526eea73930f26e0ff4f0ef1
SHA512125c75efab29f2aa5fd7e805c13024cf60da992405cd5c7e2d1c9f3999945f9b995c6b3641f940d64d9afabe92eda481ae22cb57d0316c5fc26789f01fdeeab6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD50c1282e4043f1c50116018e4f9ace8b3
SHA1c58c0d868b4f909059aedd770464dbff1a3601aa
SHA25612468e3eb33e23b928fddf1c8bde09b4c3078b31b0dc1a7d5d3e7b43e65152eb
SHA512bd63b6690320eca557edc0b3ffa624a8bcec9065c22b32129dff793f95be82ea4c7f04a5f0f2745c74e852bb9cfd6b102f13229c8d204335a88a4299cdbcc7d6
-
C:\Windows\Temp\MYjwJFnMfsmfKHMw\BzctWuyA\jaDKZsghgTsyjAoK.wsfFilesize
8KB
MD5ab8fd925a07c97205233782c4b179e94
SHA1b22e13f3edb25650dcb323c93f86bfc2e74c9c74
SHA25694ff1e7e34b978f80fabbc94cbb813b5c4895e0b551daa01cfa61e2f6d3c93f7
SHA512a3b26619212bb2a6766ca859a09dc37b8d3dc8692281101545c206703a74d9b6ce6856a4cc744ef9ff9eae002fe51b3d10c98b5d8eb59eb1b4971209196a79bf
-
C:\Windows\system32\GroupPolicy\gpt.iniFilesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\7zS25D9.tmp\Install.exeFilesize
6.4MB
MD5b829866d020ee2184ddb6915ea4190e2
SHA1bd2466f3e57f4b1a9e0661d79e0cc22d7eac81fa
SHA25623db00745f3d4be8108d75af4eb0448052ebfb1c589368d51a9ec01993be653a
SHA5126335ca14f1cc88b95b017bbc1bd7a076d61194919e9699884d19056478adc1db883509ab126b515310c9d608a16bf0e85c6133ee3fddac70689c233204da384e
-
\Users\Admin\AppData\Local\Temp\7zS25D9.tmp\Install.exeFilesize
6.4MB
MD5b829866d020ee2184ddb6915ea4190e2
SHA1bd2466f3e57f4b1a9e0661d79e0cc22d7eac81fa
SHA25623db00745f3d4be8108d75af4eb0448052ebfb1c589368d51a9ec01993be653a
SHA5126335ca14f1cc88b95b017bbc1bd7a076d61194919e9699884d19056478adc1db883509ab126b515310c9d608a16bf0e85c6133ee3fddac70689c233204da384e
-
\Users\Admin\AppData\Local\Temp\7zS25D9.tmp\Install.exeFilesize
6.4MB
MD5b829866d020ee2184ddb6915ea4190e2
SHA1bd2466f3e57f4b1a9e0661d79e0cc22d7eac81fa
SHA25623db00745f3d4be8108d75af4eb0448052ebfb1c589368d51a9ec01993be653a
SHA5126335ca14f1cc88b95b017bbc1bd7a076d61194919e9699884d19056478adc1db883509ab126b515310c9d608a16bf0e85c6133ee3fddac70689c233204da384e
-
\Users\Admin\AppData\Local\Temp\7zS25D9.tmp\Install.exeFilesize
6.4MB
MD5b829866d020ee2184ddb6915ea4190e2
SHA1bd2466f3e57f4b1a9e0661d79e0cc22d7eac81fa
SHA25623db00745f3d4be8108d75af4eb0448052ebfb1c589368d51a9ec01993be653a
SHA5126335ca14f1cc88b95b017bbc1bd7a076d61194919e9699884d19056478adc1db883509ab126b515310c9d608a16bf0e85c6133ee3fddac70689c233204da384e
-
\Users\Admin\AppData\Local\Temp\7zS2CDB.tmp\Install.exeFilesize
7.0MB
MD554042a806886288ad60c64e7adaa2f53
SHA130ee71d3a30dff86dad3224ea57d844e18505cc1
SHA256facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487
SHA512a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001
-
\Users\Admin\AppData\Local\Temp\7zS2CDB.tmp\Install.exeFilesize
7.0MB
MD554042a806886288ad60c64e7adaa2f53
SHA130ee71d3a30dff86dad3224ea57d844e18505cc1
SHA256facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487
SHA512a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001
-
\Users\Admin\AppData\Local\Temp\7zS2CDB.tmp\Install.exeFilesize
7.0MB
MD554042a806886288ad60c64e7adaa2f53
SHA130ee71d3a30dff86dad3224ea57d844e18505cc1
SHA256facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487
SHA512a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001
-
\Users\Admin\AppData\Local\Temp\7zS2CDB.tmp\Install.exeFilesize
7.0MB
MD554042a806886288ad60c64e7adaa2f53
SHA130ee71d3a30dff86dad3224ea57d844e18505cc1
SHA256facea1184fa61e0191fce707f9b9b137c5f5e96a687a7b9d944cc64b546d2487
SHA512a3a73e500662bf3398936fd3acf4bdf4755abaf80379c7ab37c614014d48bb4b977108c660fd8942e2927562978cee5c2fbe6f29391ff98c26c1dd4ab4550001
-
memory/284-145-0x0000000000000000-mapping.dmp
-
memory/320-181-0x000007FEF2D20000-0x000007FEF387D000-memory.dmpFilesize
11.4MB
-
memory/320-182-0x00000000025D4000-0x00000000025D7000-memory.dmpFilesize
12KB
-
memory/320-183-0x00000000025DB000-0x00000000025FA000-memory.dmpFilesize
124KB
-
memory/320-180-0x000007FEF3880000-0x000007FEF42A3000-memory.dmpFilesize
10.1MB
-
memory/360-163-0x0000000000000000-mapping.dmp
-
memory/544-92-0x0000000000000000-mapping.dmp
-
memory/572-129-0x0000000000000000-mapping.dmp
-
memory/636-131-0x0000000000000000-mapping.dmp
-
memory/688-164-0x0000000000000000-mapping.dmp
-
memory/704-74-0x0000000000000000-mapping.dmp
-
memory/780-156-0x0000000000000000-mapping.dmp
-
memory/876-138-0x0000000000000000-mapping.dmp
-
memory/908-155-0x0000000000000000-mapping.dmp
-
memory/960-126-0x0000000000000000-mapping.dmp
-
memory/964-146-0x0000000000000000-mapping.dmp
-
memory/968-83-0x0000000000000000-mapping.dmp
-
memory/976-170-0x0000000000000000-mapping.dmp
-
memory/1076-130-0x0000000000000000-mapping.dmp
-
memory/1080-98-0x0000000000000000-mapping.dmp
-
memory/1148-94-0x0000000000000000-mapping.dmp
-
memory/1148-97-0x000007FEF3850000-0x000007FEF43AD000-memory.dmpFilesize
11.4MB
-
memory/1148-101-0x000000000270B000-0x000000000272A000-memory.dmpFilesize
124KB
-
memory/1148-99-0x0000000002704000-0x0000000002707000-memory.dmpFilesize
12KB
-
memory/1148-100-0x000000000270B000-0x000000000272A000-memory.dmpFilesize
124KB
-
memory/1148-96-0x000007FEF43B0000-0x000007FEF4DD3000-memory.dmpFilesize
10.1MB
-
memory/1148-148-0x0000000000000000-mapping.dmp
-
memory/1148-95-0x000007FEFB5C1000-0x000007FEFB5C3000-memory.dmpFilesize
8KB
-
memory/1256-143-0x0000000000000000-mapping.dmp
-
memory/1264-176-0x0000000000000000-mapping.dmp
-
memory/1292-77-0x0000000000000000-mapping.dmp
-
memory/1348-172-0x0000000000000000-mapping.dmp
-
memory/1352-166-0x0000000000000000-mapping.dmp
-
memory/1424-154-0x0000000000000000-mapping.dmp
-
memory/1460-147-0x0000000000000000-mapping.dmp
-
memory/1468-107-0x0000000000000000-mapping.dmp
-
memory/1492-87-0x0000000000000000-mapping.dmp
-
memory/1508-165-0x0000000000000000-mapping.dmp
-
memory/1508-144-0x0000000000000000-mapping.dmp
-
memory/1508-116-0x0000000000000000-mapping.dmp
-
memory/1508-119-0x000007FEF3880000-0x000007FEF42A3000-memory.dmpFilesize
10.1MB
-
memory/1508-123-0x0000000002394000-0x0000000002397000-memory.dmpFilesize
12KB
-
memory/1508-124-0x000000000239B000-0x00000000023BA000-memory.dmpFilesize
124KB
-
memory/1508-120-0x000007FEF2D20000-0x000007FEF387D000-memory.dmpFilesize
11.4MB
-
memory/1508-121-0x0000000002394000-0x0000000002397000-memory.dmpFilesize
12KB
-
memory/1544-149-0x0000000000000000-mapping.dmp
-
memory/1544-167-0x0000000000000000-mapping.dmp
-
memory/1564-169-0x0000000000000000-mapping.dmp
-
memory/1620-162-0x0000000000000000-mapping.dmp
-
memory/1656-150-0x0000000000000000-mapping.dmp
-
memory/1660-174-0x0000000000000000-mapping.dmp
-
memory/1664-157-0x0000000000000000-mapping.dmp
-
memory/1696-127-0x0000000000000000-mapping.dmp
-
memory/1696-168-0x0000000000000000-mapping.dmp
-
memory/1716-159-0x0000000000000000-mapping.dmp
-
memory/1716-137-0x000007FEF2380000-0x000007FEF2EDD000-memory.dmpFilesize
11.4MB
-
memory/1716-135-0x000007FEF2EE0000-0x000007FEF3903000-memory.dmpFilesize
10.1MB
-
memory/1716-136-0x00000000024A4000-0x00000000024A7000-memory.dmpFilesize
12KB
-
memory/1716-139-0x00000000024A4000-0x00000000024A7000-memory.dmpFilesize
12KB
-
memory/1716-140-0x00000000024AB000-0x00000000024CA000-memory.dmpFilesize
124KB
-
memory/1716-132-0x0000000000000000-mapping.dmp
-
memory/1756-161-0x0000000000000000-mapping.dmp
-
memory/1756-79-0x0000000000000000-mapping.dmp
-
memory/1756-114-0x0000000000000000-mapping.dmp
-
memory/1760-82-0x0000000000000000-mapping.dmp
-
memory/1768-171-0x0000000000000000-mapping.dmp
-
memory/1828-122-0x0000000000000000-mapping.dmp
-
memory/1836-90-0x0000000000000000-mapping.dmp
-
memory/1844-141-0x0000000000000000-mapping.dmp
-
memory/1880-54-0x0000000075571000-0x0000000075573000-memory.dmpFilesize
8KB
-
memory/1892-142-0x0000000000000000-mapping.dmp
-
memory/1916-86-0x0000000000000000-mapping.dmp
-
memory/1920-104-0x0000000000000000-mapping.dmp
-
memory/1948-173-0x0000000000000000-mapping.dmp
-
memory/1952-115-0x0000000000000000-mapping.dmp
-
memory/1952-175-0x0000000000000000-mapping.dmp
-
memory/1952-160-0x0000000000000000-mapping.dmp
-
memory/1952-75-0x0000000000000000-mapping.dmp
-
memory/1956-71-0x0000000010000000-0x0000000011000000-memory.dmpFilesize
16.0MB
-
memory/1956-64-0x0000000000000000-mapping.dmp
-
memory/1964-151-0x0000000000000000-mapping.dmp
-
memory/1984-56-0x0000000000000000-mapping.dmp
-
memory/2004-158-0x0000000000000000-mapping.dmp
-
memory/2008-125-0x0000000000000000-mapping.dmp
-
memory/2020-102-0x0000000000000000-mapping.dmp
-
memory/2020-128-0x0000000000000000-mapping.dmp