Analysis
-
max time kernel
168s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
03-02-2022 16:00
Static task
static1
Behavioral task
behavioral1
Sample
838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe
Resource
win10v2004-en-20220112
General
-
Target
838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe
-
Size
451KB
-
MD5
6de1e49036e9654914c333f39b17aa15
-
SHA1
f9647c886e99852ba0ee47fa6ea9b1ac42ce9239
-
SHA256
838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3
-
SHA512
9791079dac388ed6225c4b6352dfe2090692359208f74a2950528bd1aba80aa3b6a88b7c882cfc787b8d29d77ca69d44d798075a4674152f350948312abfc054
Malware Config
Signatures
-
Detect Neshta Payload 7 IoCs
Processes:
resource yara_rule C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\odt\OFFICE~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 5 IoCs
Processes:
838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exesvchost.comsvchost.comsvchost.comsvchost.compid process 3508 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe 1852 svchost.com 648 svchost.com 4064 svchost.com 1292 svchost.com -
Sets service image path in registry 2 TTPs
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exe838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe -
Loads dropped DLL 7 IoCs
Processes:
regsvr32.exepid process 3772 regsvr32.exe 3772 regsvr32.exe 3772 regsvr32.exe 3772 regsvr32.exe 3772 regsvr32.exe 3772 regsvr32.exe 3772 regsvr32.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
unregmp2.exedescription ioc process File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\F: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe -
Drops file in Program Files directory 64 IoCs
Processes:
svchost.com838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exesvchost.com838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exesvchost.comsvchost.comdescription ioc process File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\Program Files (x86)\MediaPlayer\register.bat 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File created C:\Program Files (x86)\MediaPlayer\hi_h264dec.dll 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File created C:\Program Files (x86)\MediaPlayer\__tmp_rar_sfx_access_check_30362671 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File created C:\Program Files (x86)\MediaPlayer\DllDeinterlace.dll 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE svchost.com File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\armsvc.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\Program Files (x86)\MediaPlayer\StreamReader.dll 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File created C:\Program Files (x86)\MediaPlayer\H264Play.dll 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\Program Files (x86)\MediaPlayer\MediaDecFilter.ax 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\Program Files (x86)\MediaPlayer\DllDeinterlace.dll 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\Program Files (x86)\MediaPlayer\hi_h264dec.dll 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE svchost.com -
Drops file in Windows directory 10 IoCs
Processes:
svchost.comsvchost.comsvchost.exesvchost.comsvchost.com838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exedescription ioc process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
svchost.exeWaaSMedicAgent.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132885662021030355" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "90228624" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "1157726" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4048" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "8.139380" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3852" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "4" svchost.exe -
Modifies registry class 22 IoCs
Processes:
regsvr32.exewmplayer.exeunregmp2.execmd.exe838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4DA6077-2239-4C9E-AE16-C78DD9F35631}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76C90120-D6E9-4CDD-8163-466B950BB133}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76C90120-D6E9-4CDD-8163-466B950BB133}\InprocServer32\ = "C:\\Program Files (x86)\\MediaPlayer\\MediaDecFilter.ax" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings wmplayer.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Media Type\Extensions\.h264\Source Filter = "{D4DA6077-2239-4C9E-AE16-C78DD9F35631}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4DA6077-2239-4C9E-AE16-C78DD9F35631}\ = "H264 File Source" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76C90120-D6E9-4CDD-8163-466B950BB133}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{D4DA6077-2239-4C9E-AE16-C78DD9F35631}\FriendlyName = "H264 File Source" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{D4DA6077-2239-4C9E-AE16-C78DD9F35631}\FilterData = 020000000000200001000000000000003070693308000000000000000100000000000000000000003074793300000000380000003800000000000000000000000000000000000000 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Media Type\Extensions\.mp4\Source Filter = "{D4DA6077-2239-4C9E-AE16-C78DD9F35631}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4DA6077-2239-4C9E-AE16-C78DD9F35631} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4DA6077-2239-4C9E-AE16-C78DD9F35631}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76C90120-D6E9-4CDD-8163-466B950BB133}\ = "H264 File Source Property Page" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{D4DA6077-2239-4C9E-AE16-C78DD9F35631}\CLSID = "{D4DA6077-2239-4C9E-AE16-C78DD9F35631}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Media Type\Extensions\.h264 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Media Type\Extensions\.mp4 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4DA6077-2239-4C9E-AE16-C78DD9F35631}\InprocServer32\ = "C:\\Program Files (x86)\\MediaPlayer\\MediaDecFilter.ax" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76C90120-D6E9-4CDD-8163-466B950BB133} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{D4DA6077-2239-4C9E-AE16-C78DD9F35631} regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
unregmp2.exedescription pid process Token: SeShutdownPrivilege 692 unregmp2.exe Token: SeCreatePagefilePrivilege 692 unregmp2.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.execmd.exesvchost.comwmplayer.exesvchost.comsvchost.comunregmp2.exesvchost.comdescription pid process target process PID 2196 wrote to memory of 3508 2196 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe PID 2196 wrote to memory of 3508 2196 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe PID 2196 wrote to memory of 3508 2196 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe PID 3508 wrote to memory of 1200 3508 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe cmd.exe PID 3508 wrote to memory of 1200 3508 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe cmd.exe PID 3508 wrote to memory of 1200 3508 838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe cmd.exe PID 1200 wrote to memory of 3772 1200 cmd.exe regsvr32.exe PID 1200 wrote to memory of 3772 1200 cmd.exe regsvr32.exe PID 1200 wrote to memory of 3772 1200 cmd.exe regsvr32.exe PID 1200 wrote to memory of 1852 1200 cmd.exe svchost.com PID 1200 wrote to memory of 1852 1200 cmd.exe svchost.com PID 1200 wrote to memory of 1852 1200 cmd.exe svchost.com PID 1852 wrote to memory of 3868 1852 svchost.com wmplayer.exe PID 1852 wrote to memory of 3868 1852 svchost.com wmplayer.exe PID 1852 wrote to memory of 3868 1852 svchost.com wmplayer.exe PID 3868 wrote to memory of 648 3868 wmplayer.exe svchost.com PID 3868 wrote to memory of 648 3868 wmplayer.exe svchost.com PID 3868 wrote to memory of 648 3868 wmplayer.exe svchost.com PID 648 wrote to memory of 3344 648 svchost.com setup_wm.exe PID 648 wrote to memory of 3344 648 svchost.com setup_wm.exe PID 648 wrote to memory of 3344 648 svchost.com setup_wm.exe PID 3868 wrote to memory of 4064 3868 wmplayer.exe svchost.com PID 3868 wrote to memory of 4064 3868 wmplayer.exe svchost.com PID 3868 wrote to memory of 4064 3868 wmplayer.exe svchost.com PID 4064 wrote to memory of 1860 4064 svchost.com unregmp2.exe PID 4064 wrote to memory of 1860 4064 svchost.com unregmp2.exe PID 4064 wrote to memory of 1860 4064 svchost.com unregmp2.exe PID 1860 wrote to memory of 1292 1860 unregmp2.exe svchost.com PID 1860 wrote to memory of 1292 1860 unregmp2.exe svchost.com PID 1860 wrote to memory of 1292 1860 unregmp2.exe svchost.com PID 1292 wrote to memory of 692 1292 svchost.com unregmp2.exe PID 1292 wrote to memory of 692 1292 svchost.com unregmp2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe"C:\Users\Admin\AppData\Local\Temp\838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe"1⤵
- Modifies system executable filetype association
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MediaPlayer\register.bat" "3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -s MediaDecFilter.ax4⤵
- Loads dropped DLL
- Modifies registry class
PID:3772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\PROGRA~2\WINDOW~4\wmplayer.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\PROGRA~2\WINDOW~4\wmplayer.exeC:\PROGRA~2\WINDOW~4\wmplayer.exe5⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\PROGRA~2\WINDOW~4\setup_wm.exe" /RunOnce:C:\PROGRA~2\WINDOW~4\wmplayer.exe6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:648 -
C:\PROGRA~2\WINDOW~4\setup_wm.exeC:\PROGRA~2\WINDOW~4\setup_wm.exe /RunOnce:C:\PROGRA~2\WINDOW~4\wmplayer.exe7⤵PID:3344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\unregmp2.exeC:\Windows\System32\unregmp2.exe /AsyncFirstLogon7⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\system32\unregmp2.exeC:\Windows\SysNative\unregmp2.exe /AsyncFirstLogon /REENTRANT9⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:692
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:2904
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe b42213a4b716d5ae5f23d945e7d43029 f0H8zsxoHEqpClXQUH6/bg.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:3824
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXEMD5
22913149a9d766c415c21e613e4e1d1b
SHA136b33b1ab48615ebe7bd25472d50ba3de56a21c6
SHA256495ac0a638059cb60b2eebf3ac5e8fd17d5fbc7424195308f19e2ffeac3e0ced
SHA512d9e5396bb24e3ad7ba31b45e8e1bfeb74c32895ab3af6544715c5db04da0442fafd82b06c49a920d964cf0a8fac7a58ccef4a173f1a5879c6733748edc180b14
-
C:\Program Files (x86)\MediaPlayer\DllDeinterlace.dllMD5
734654f3c6b732fad89fcc17f3816df1
SHA19c01926ebb01b5532d695791d0a93fddb0d19d36
SHA2561616778babe6da0c0ceef10cbc7814a584299aaa01106b18c26f4e1f4da1dd74
SHA512bb903eadfd37adfb4c9c0c19c26382d9b6e37a8cca469695c5b7e859b91c8f211be5f40a2df3d24a8fe9644541e6afbb891bfc08e634242415d5d563f4c97d7a
-
C:\Program Files (x86)\MediaPlayer\DllDeinterlace.dllMD5
734654f3c6b732fad89fcc17f3816df1
SHA19c01926ebb01b5532d695791d0a93fddb0d19d36
SHA2561616778babe6da0c0ceef10cbc7814a584299aaa01106b18c26f4e1f4da1dd74
SHA512bb903eadfd37adfb4c9c0c19c26382d9b6e37a8cca469695c5b7e859b91c8f211be5f40a2df3d24a8fe9644541e6afbb891bfc08e634242415d5d563f4c97d7a
-
C:\Program Files (x86)\MediaPlayer\DllDeinterlace.dllMD5
734654f3c6b732fad89fcc17f3816df1
SHA19c01926ebb01b5532d695791d0a93fddb0d19d36
SHA2561616778babe6da0c0ceef10cbc7814a584299aaa01106b18c26f4e1f4da1dd74
SHA512bb903eadfd37adfb4c9c0c19c26382d9b6e37a8cca469695c5b7e859b91c8f211be5f40a2df3d24a8fe9644541e6afbb891bfc08e634242415d5d563f4c97d7a
-
C:\Program Files (x86)\MediaPlayer\H264Play.dllMD5
23843bfeb8843b8d858e47b77b2b3c93
SHA1039d91bd47c2b46c6fb92735ee2c2cacf935b455
SHA2560b1ec662062b3fae588706e82d07932239d04be218fbcb4d2995a1ee83858f00
SHA512448ec6df8a7157a8bb2e7ddcad5ef2cb74f0a713b5889fd1ca7e31bd67380176228da79d43ae2b15c49e5419ca6c0e469d133035d853b51d426d241632a2fa8e
-
C:\Program Files (x86)\MediaPlayer\H264Play.dllMD5
23843bfeb8843b8d858e47b77b2b3c93
SHA1039d91bd47c2b46c6fb92735ee2c2cacf935b455
SHA2560b1ec662062b3fae588706e82d07932239d04be218fbcb4d2995a1ee83858f00
SHA512448ec6df8a7157a8bb2e7ddcad5ef2cb74f0a713b5889fd1ca7e31bd67380176228da79d43ae2b15c49e5419ca6c0e469d133035d853b51d426d241632a2fa8e
-
C:\Program Files (x86)\MediaPlayer\H264Play.dllMD5
23843bfeb8843b8d858e47b77b2b3c93
SHA1039d91bd47c2b46c6fb92735ee2c2cacf935b455
SHA2560b1ec662062b3fae588706e82d07932239d04be218fbcb4d2995a1ee83858f00
SHA512448ec6df8a7157a8bb2e7ddcad5ef2cb74f0a713b5889fd1ca7e31bd67380176228da79d43ae2b15c49e5419ca6c0e469d133035d853b51d426d241632a2fa8e
-
C:\Program Files (x86)\MediaPlayer\MediaDecFilter.axMD5
d94efc29c0f1af3e92ea638a97aacbfb
SHA1e55082085fe91184a96c97de82918aaed7d4ec50
SHA256576a2f1cd68fe2451f1e72569adcc30763c2f17f2ae36c733fface95947119ac
SHA5125aa5763d80c321f6b75d85d748c96f600fe827a2a9e7b7c2bbc648eeb7981229a5add47b0f16e75ab2952b9ea73ef0c1bf601854b3b671e11f19ee83f373e790
-
C:\Program Files (x86)\MediaPlayer\MediaDecFilter.axMD5
d94efc29c0f1af3e92ea638a97aacbfb
SHA1e55082085fe91184a96c97de82918aaed7d4ec50
SHA256576a2f1cd68fe2451f1e72569adcc30763c2f17f2ae36c733fface95947119ac
SHA5125aa5763d80c321f6b75d85d748c96f600fe827a2a9e7b7c2bbc648eeb7981229a5add47b0f16e75ab2952b9ea73ef0c1bf601854b3b671e11f19ee83f373e790
-
C:\Program Files (x86)\MediaPlayer\StreamReader.dllMD5
309f2be26196ba2b728d11ae02aec796
SHA1e6d2383405c1c5786d32d343834c47fe9e5a73d8
SHA2566460159348372c318b51f8568cff04c92df38c8bb2fcfc447061e6fcfd74b523
SHA5128b88f74ddbae95b1cf3462d440be2d7293d54c40164f85f224219d92bea580fec2e2cad50c993e25ff2a09f2cb41fc28ac2324a6613b1a34d1f45194c2cb3331
-
C:\Program Files (x86)\MediaPlayer\StreamReader.dllMD5
309f2be26196ba2b728d11ae02aec796
SHA1e6d2383405c1c5786d32d343834c47fe9e5a73d8
SHA2566460159348372c318b51f8568cff04c92df38c8bb2fcfc447061e6fcfd74b523
SHA5128b88f74ddbae95b1cf3462d440be2d7293d54c40164f85f224219d92bea580fec2e2cad50c993e25ff2a09f2cb41fc28ac2324a6613b1a34d1f45194c2cb3331
-
C:\Program Files (x86)\MediaPlayer\StreamReader.dllMD5
309f2be26196ba2b728d11ae02aec796
SHA1e6d2383405c1c5786d32d343834c47fe9e5a73d8
SHA2566460159348372c318b51f8568cff04c92df38c8bb2fcfc447061e6fcfd74b523
SHA5128b88f74ddbae95b1cf3462d440be2d7293d54c40164f85f224219d92bea580fec2e2cad50c993e25ff2a09f2cb41fc28ac2324a6613b1a34d1f45194c2cb3331
-
C:\Program Files (x86)\MediaPlayer\register.batMD5
fe50f67e4428d0cde389bba153956fdd
SHA10c9d717f4836897d90338e8a2b11b4abda291577
SHA256c062062b37395f135bfcc3881f3d70454bd8b8cecabf5ad678aa6daea482daa7
SHA5129fbe7f3afd8cf775596146513c8c226e23fee5603527f853e47e8eb5ff2d34e6626bec85a94f698c474b2762caad8c0f15d6c7df861b0f1ede5b0e47617d3641
-
C:\Users\Admin\AppData\Local\Temp\3582-490\838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exeMD5
09dc7150ded0b6d8ad0568cfb74e9af7
SHA1134e51cd5261c43bdbc5e2a9ed778d10ca3bf844
SHA25662b58074a8939666e2ffa5739ffb1ccd8a195628e56e28d8680a27a2b47109d1
SHA512bd7976417ad2257d117064b89565a5b7e0be64814dc4a9edf680a8f56cd754b14e6200f253619beee1b503bdeccc108c4e5c582dbc448cdc92ec7d7850e38c6c
-
C:\Users\Admin\AppData\Local\Temp\3582-490\838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3.exeMD5
09dc7150ded0b6d8ad0568cfb74e9af7
SHA1134e51cd5261c43bdbc5e2a9ed778d10ca3bf844
SHA25662b58074a8939666e2ffa5739ffb1ccd8a195628e56e28d8680a27a2b47109d1
SHA512bd7976417ad2257d117064b89565a5b7e0be64814dc4a9edf680a8f56cd754b14e6200f253619beee1b503bdeccc108c4e5c582dbc448cdc92ec7d7850e38c6c
-
C:\Users\Admin\AppData\Local\Temp\wmsetup.logMD5
10b3c555a03ac080d55aa504cddd01ce
SHA1dc3a7ea601d83853cc210b108b76cfddd9ae0a20
SHA2565e4749598be7dfaad7721315648724bdf49188d4c3a43fea54affe6a6f85d380
SHA51246947cec421ef7a02b3db3deb6acc0c7255df5c71d76d057e16d88dfcd5e2c978d4619807660ba2e56ff89c795d8c55f8b4bbc46a67ae5cc5f4c6f6f3b8c7c89
-
C:\Windows\directx.sysMD5
e89556a2d7afdcdceb085a26de700ea2
SHA1fbd96dd80eb1be5a417bfbbbb37f63103d705ee4
SHA256b9bb6c239684372215930bf1af37f30b32d7ca73080123442854343a5fe5064f
SHA512a5fabe951ca8d6612017ba5936c5b43af1c81d91c01a3df9900bdd571df843d0be41e7452d727d43c205f48f7c20fdf5faf675fffe3f3611132094cace3c93a0
-
C:\Windows\directx.sysMD5
7ea5ba0cb61e865c68a86d815d626ad1
SHA19780234a8d15de4ef01f4545d024077bbbc1d4f0
SHA25644960d7a1554687c2457e6320f47edfc1aeeb3077497b0061fbd1eee6d5612f1
SHA5121fa06e6eaab68b89db2e46450b428b7827dbaa157af8f8aa0b3e1321fc5ebb6a1582027aa4b873a3a67a9690f4928e6a5ca51acfbf5fec07c07819b2c2f8f8cb
-
C:\Windows\directx.sysMD5
9e5d0d03e9709a2db7d88bb3686e378f
SHA17a5ff52eb19432d719e617a1d220ea75251a93be
SHA256b78d74237516b31db061e8c459812e477fe33c25f9814e9bd02ef0b98f94a1bb
SHA51214ec511ade72bcc18e97f9a1c98f5e27ac541be9c9b612e9ed5799c0e6e01eb317264e5517dd4c971ac6615f79dafee87b4ee110772073f2ea2b8e496127771d
-
C:\Windows\svchost.comMD5
bc93f4f527b58419ef42f19db49f64a8
SHA12650a73b61577cfc0c0d80a7f38103d65388d808
SHA256d146be51818e0e408577879f76b6f4a13cb3cfc135b9cc2a4145cf50f7592830
SHA5124958c8477424c144412b93f7b1242121abd19e1777b276cac1bc3dfe78067cb3d2af24da6c325b2dd5604aa2505d815d0d2811ca788cedb8bccbfbd622ed0e83
-
C:\Windows\svchost.comMD5
bc93f4f527b58419ef42f19db49f64a8
SHA12650a73b61577cfc0c0d80a7f38103d65388d808
SHA256d146be51818e0e408577879f76b6f4a13cb3cfc135b9cc2a4145cf50f7592830
SHA5124958c8477424c144412b93f7b1242121abd19e1777b276cac1bc3dfe78067cb3d2af24da6c325b2dd5604aa2505d815d0d2811ca788cedb8bccbfbd622ed0e83
-
C:\Windows\svchost.comMD5
bc93f4f527b58419ef42f19db49f64a8
SHA12650a73b61577cfc0c0d80a7f38103d65388d808
SHA256d146be51818e0e408577879f76b6f4a13cb3cfc135b9cc2a4145cf50f7592830
SHA5124958c8477424c144412b93f7b1242121abd19e1777b276cac1bc3dfe78067cb3d2af24da6c325b2dd5604aa2505d815d0d2811ca788cedb8bccbfbd622ed0e83
-
C:\Windows\svchost.comMD5
bc93f4f527b58419ef42f19db49f64a8
SHA12650a73b61577cfc0c0d80a7f38103d65388d808
SHA256d146be51818e0e408577879f76b6f4a13cb3cfc135b9cc2a4145cf50f7592830
SHA5124958c8477424c144412b93f7b1242121abd19e1777b276cac1bc3dfe78067cb3d2af24da6c325b2dd5604aa2505d815d0d2811ca788cedb8bccbfbd622ed0e83
-
C:\Windows\svchost.comMD5
bc93f4f527b58419ef42f19db49f64a8
SHA12650a73b61577cfc0c0d80a7f38103d65388d808
SHA256d146be51818e0e408577879f76b6f4a13cb3cfc135b9cc2a4145cf50f7592830
SHA5124958c8477424c144412b93f7b1242121abd19e1777b276cac1bc3dfe78067cb3d2af24da6c325b2dd5604aa2505d815d0d2811ca788cedb8bccbfbd622ed0e83
-
C:\odt\OFFICE~1.EXEMD5
02c3d242fe142b0eabec69211b34bc55
SHA1ea0a4a6d6078b362f7b3a4ad1505ce49957dc16e
SHA2562a1ed24be7e3859b46ec3ebc316789ead5f12055853f86a9656e04b4bb771842
SHA5120efb08492eaaa2e923beddc21566e98fbbef3a102f9415ff310ec616f5c84fd2ba3a7025b05e01c0bdf37e5e2f64dfd845f9254a376144cc7d827e7577dbb099
-
memory/3772-456-0x0000000004220000-0x00000000042C7000-memory.dmpFilesize
668KB
-
memory/3772-463-0x0000000000B11000-0x0000000000B1F000-memory.dmpFilesize
56KB