Analysis
-
max time kernel
92s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
13-07-2022 06:30
Static task
static1
Behavioral task
behavioral1
Sample
CFDI_826271_53535.exe
Resource
win7-20220414-en
General
-
Target
CFDI_826271_53535.exe
-
Size
894KB
-
MD5
f89a4c9d373e3c928bc405d56a496850
-
SHA1
de58bf97363c74d83249df1ec2f1e9d62a2101d9
-
SHA256
c040a2c32938707e1579fecce89e3c4fa04d019a467f642dd2bb18bab35bf99d
-
SHA512
eb02dcd476e67db8ec0d9bfde5698967c657bbc6cb55973445c565cd10999772b8ba18ecacd85c36bb88ac81898a0d34f2509cf6e2a954c890ffc5c07421d514
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe -
Executes dropped EXE 3 IoCs
Processes:
Gozip.exemiktotik.exemiktotik.exepid process 2400 Gozip.exe 3804 miktotik.exe 4176 miktotik.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
miktotik.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agao3ew5akqy7k9.exe\DisableExceptionChainValidation miktotik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "bqbhvllvhp.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agao3ew5akqy7k9.exe miktotik.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeCFDI_826271_53535.exeWScript.execmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation CFDI_826271_53535.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.09 = "C:\\ProgramData\\Google Updater 2.09\\agao3ew5akqy7k9.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.09 = "\"C:\\ProgramData\\Google Updater 2.09\\agao3ew5akqy7k9.exe\"" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe -
Processes:
miktotik.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA miktotik.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
miktotik.exeexplorer.exepid process 4176 miktotik.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
miktotik.exedescription pid process target process PID 3804 set thread context of 4176 3804 miktotik.exe miktotik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5108 1540 WerFault.exe explorer.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
miktotik.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 miktotik.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString miktotik.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Delays execution with timeout.exe 5 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 1972 timeout.exe 1068 timeout.exe 3988 timeout.exe 4604 timeout.exe 736 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 3960 taskkill.exe 1244 taskkill.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Main explorer.exe -
Modifies registry class 2 IoCs
Processes:
CFDI_826271_53535.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings CFDI_826271_53535.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
explorer.exepid process 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
miktotik.exeexplorer.exepid process 4176 miktotik.exe 4176 miktotik.exe 1540 explorer.exe 1540 explorer.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
taskkill.exemiktotik.exetaskkill.exeexplorer.exedescription pid process Token: SeDebugPrivilege 3960 taskkill.exe Token: SeDebugPrivilege 4176 miktotik.exe Token: SeRestorePrivilege 4176 miktotik.exe Token: SeBackupPrivilege 4176 miktotik.exe Token: SeLoadDriverPrivilege 4176 miktotik.exe Token: SeCreatePagefilePrivilege 4176 miktotik.exe Token: SeShutdownPrivilege 4176 miktotik.exe Token: SeTakeOwnershipPrivilege 4176 miktotik.exe Token: SeChangeNotifyPrivilege 4176 miktotik.exe Token: SeCreateTokenPrivilege 4176 miktotik.exe Token: SeMachineAccountPrivilege 4176 miktotik.exe Token: SeSecurityPrivilege 4176 miktotik.exe Token: SeAssignPrimaryTokenPrivilege 4176 miktotik.exe Token: SeCreateGlobalPrivilege 4176 miktotik.exe Token: 33 4176 miktotik.exe Token: SeDebugPrivilege 1244 taskkill.exe Token: SeDebugPrivilege 1540 explorer.exe Token: SeRestorePrivilege 1540 explorer.exe Token: SeBackupPrivilege 1540 explorer.exe Token: SeLoadDriverPrivilege 1540 explorer.exe Token: SeCreatePagefilePrivilege 1540 explorer.exe Token: SeShutdownPrivilege 1540 explorer.exe Token: SeTakeOwnershipPrivilege 1540 explorer.exe Token: SeChangeNotifyPrivilege 1540 explorer.exe Token: SeCreateTokenPrivilege 1540 explorer.exe Token: SeMachineAccountPrivilege 1540 explorer.exe Token: SeSecurityPrivilege 1540 explorer.exe Token: SeAssignPrimaryTokenPrivilege 1540 explorer.exe Token: SeCreateGlobalPrivilege 1540 explorer.exe Token: 33 1540 explorer.exe -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
CFDI_826271_53535.exeWScript.execmd.exeWScript.execmd.exemiktotik.exemiktotik.exeexplorer.exedescription pid process target process PID 4812 wrote to memory of 672 4812 CFDI_826271_53535.exe WScript.exe PID 4812 wrote to memory of 672 4812 CFDI_826271_53535.exe WScript.exe PID 4812 wrote to memory of 672 4812 CFDI_826271_53535.exe WScript.exe PID 672 wrote to memory of 2504 672 WScript.exe cmd.exe PID 672 wrote to memory of 2504 672 WScript.exe cmd.exe PID 672 wrote to memory of 2504 672 WScript.exe cmd.exe PID 2504 wrote to memory of 736 2504 cmd.exe timeout.exe PID 2504 wrote to memory of 736 2504 cmd.exe timeout.exe PID 2504 wrote to memory of 736 2504 cmd.exe timeout.exe PID 2504 wrote to memory of 2400 2504 cmd.exe Gozip.exe PID 2504 wrote to memory of 2400 2504 cmd.exe Gozip.exe PID 2504 wrote to memory of 2400 2504 cmd.exe Gozip.exe PID 2504 wrote to memory of 1972 2504 cmd.exe timeout.exe PID 2504 wrote to memory of 1972 2504 cmd.exe timeout.exe PID 2504 wrote to memory of 1972 2504 cmd.exe timeout.exe PID 2504 wrote to memory of 2568 2504 cmd.exe WScript.exe PID 2504 wrote to memory of 2568 2504 cmd.exe WScript.exe PID 2504 wrote to memory of 2568 2504 cmd.exe WScript.exe PID 2504 wrote to memory of 1068 2504 cmd.exe timeout.exe PID 2504 wrote to memory of 1068 2504 cmd.exe timeout.exe PID 2504 wrote to memory of 1068 2504 cmd.exe timeout.exe PID 2568 wrote to memory of 4696 2568 WScript.exe cmd.exe PID 2568 wrote to memory of 4696 2568 WScript.exe cmd.exe PID 2568 wrote to memory of 4696 2568 WScript.exe cmd.exe PID 4696 wrote to memory of 1060 4696 cmd.exe attrib.exe PID 4696 wrote to memory of 1060 4696 cmd.exe attrib.exe PID 4696 wrote to memory of 1060 4696 cmd.exe attrib.exe PID 4696 wrote to memory of 3988 4696 cmd.exe timeout.exe PID 4696 wrote to memory of 3988 4696 cmd.exe timeout.exe PID 4696 wrote to memory of 3988 4696 cmd.exe timeout.exe PID 4696 wrote to memory of 3804 4696 cmd.exe miktotik.exe PID 4696 wrote to memory of 3804 4696 cmd.exe miktotik.exe PID 4696 wrote to memory of 3804 4696 cmd.exe miktotik.exe PID 3804 wrote to memory of 4176 3804 miktotik.exe miktotik.exe PID 3804 wrote to memory of 4176 3804 miktotik.exe miktotik.exe PID 3804 wrote to memory of 4176 3804 miktotik.exe miktotik.exe PID 3804 wrote to memory of 4176 3804 miktotik.exe miktotik.exe PID 3804 wrote to memory of 4176 3804 miktotik.exe miktotik.exe PID 4696 wrote to memory of 3960 4696 cmd.exe taskkill.exe PID 4696 wrote to memory of 3960 4696 cmd.exe taskkill.exe PID 4696 wrote to memory of 3960 4696 cmd.exe taskkill.exe PID 4696 wrote to memory of 1244 4696 cmd.exe taskkill.exe PID 4696 wrote to memory of 1244 4696 cmd.exe taskkill.exe PID 4696 wrote to memory of 1244 4696 cmd.exe taskkill.exe PID 4696 wrote to memory of 4180 4696 cmd.exe attrib.exe PID 4696 wrote to memory of 4180 4696 cmd.exe attrib.exe PID 4696 wrote to memory of 4180 4696 cmd.exe attrib.exe PID 4696 wrote to memory of 4604 4696 cmd.exe timeout.exe PID 4696 wrote to memory of 4604 4696 cmd.exe timeout.exe PID 4696 wrote to memory of 4604 4696 cmd.exe timeout.exe PID 4176 wrote to memory of 1540 4176 miktotik.exe explorer.exe PID 4176 wrote to memory of 1540 4176 miktotik.exe explorer.exe PID 4176 wrote to memory of 1540 4176 miktotik.exe explorer.exe PID 1540 wrote to memory of 2504 1540 explorer.exe cmd.exe PID 1540 wrote to memory of 2504 1540 explorer.exe cmd.exe PID 1540 wrote to memory of 1068 1540 explorer.exe timeout.exe PID 1540 wrote to memory of 1068 1540 explorer.exe timeout.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1060 attrib.exe 4180 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CFDI_826271_53535.exe"C:\Users\Admin\AppData\Local\Temp\CFDI_826271_53535.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\terminalweu.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\fit3274.bat" "3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 74⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\Gozip.exe"Gozip.exe" e -p398FsVBddjkd8cwr nmh3745.rar4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exetimeout 64⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\7els.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\def.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\controllevel"6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\miktotik.exemiktotik.exe /start6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\miktotik.exemiktotik.exe /start7⤵
- Executes dropped EXE
- Sets file execution options in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe8⤵
- Modifies firewall policy service
- Sets file execution options in registry
- Checks BIOS information in registry
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 10609⤵
- Program crash
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Gozip.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Gozip.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Users\Admin\AppData\Roaming\controllevel\foldersDef"6⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\timeout.exetimeout 46⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\timeout.exetimeout 84⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1540 -ip 15401⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\7els.vbsFilesize
114B
MD58f5293bc4ace65a9f51ba97bddcd7eee
SHA1e11a5055530092c3a805d757110c4f8761976eef
SHA256a48489f790e76faeaaed41f123031e708881226c224030213861cba419ca34f4
SHA512c319cf12985d57b3d00737107a20e0c06a236d654064255dcc7023aa312871b52d399a9e9a55743fb3a446d2624a1049013f0ca8132ed6b6432658c396fa981d
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\Gozip.exeFilesize
551KB
MD5061f64173293969577916832be29b90d
SHA1b05b80385de20463a80b6c9c39bd1d53123aab9b
SHA25634dfe4869b0a524c63cc4696fafe30c83a22dc5fe4b994b9fe777f2c986733ce
SHA51266e284f7c7e40af988ab09ff48cc786d287ac906368042d98d313be764058f01ecb5c3a7ab8d4336ee6494ea4a1347e73f0f2b4f3baec25ca6bcec1d888bd3da
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\Gozip.exeFilesize
551KB
MD5061f64173293969577916832be29b90d
SHA1b05b80385de20463a80b6c9c39bd1d53123aab9b
SHA25634dfe4869b0a524c63cc4696fafe30c83a22dc5fe4b994b9fe777f2c986733ce
SHA51266e284f7c7e40af988ab09ff48cc786d287ac906368042d98d313be764058f01ecb5c3a7ab8d4336ee6494ea4a1347e73f0f2b4f3baec25ca6bcec1d888bd3da
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\Preferences.datFilesize
373KB
MD5b1aa11c4722efbcaaf5ebf5f17880d17
SHA1b4b8578e13eb1a860524e827ac8bdd5d8ece604b
SHA2562e7ba0fb3f5edd6091e13e0d3a127210813433e46cea81a61a211d6a95457e27
SHA512a7668dfca645f63b571aff7ac11709b5578a4cd5947bf468fba11e4f5d455ef1b0917acc12c558e7b27d2eff1a8debb19b2c7783b7742c97c81b54fedcedd7b5
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\def.batFilesize
1KB
MD5bf223a7df3a7feecfcb49a5d01d781d9
SHA1d8b2b0f48887e63928576773efe1ab5776d7dfb0
SHA256494cc4d4211c1ed3f88255a46d501040b885c9b5cca26dcae5e37185d883957e
SHA512e15ca76450e99b21982efeeba4c148c9f28dddd85ae0fdb43e496813a4556b83022e2bb1d553de1c851065e09c7866bc6a9829da84dc0fcf3b269a03b0857fc2
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\fit3274.batFilesize
668B
MD5814380ebb377d7ebca662c6ac563eec0
SHA13487cf2382cd0bc87a677e637de1ae40ccfbc13b
SHA256b58d9796ee64ea6731a6e54fdeb997ebc4ac148e3982e9c48fdc1f79d1531136
SHA51241737175039c4f62159be44fcd683aff05be9f7ea97b7061222d34528995768cf1656c617991a5d7a5595bd958687a5adbeb208fe961aa2afb4fd2bf2a8d7d66
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\miktotik.exeFilesize
947KB
MD56ed0cca96fe69be3b775499509f0b029
SHA1e1c57829dd8947cc09b8b4ffcaaad07939efbb2d
SHA256bcb590cab5558665d9728ce52a8ea71c3f6fd348725071cec88dfb8bfd8989ab
SHA512a64e382cd0ecdc3eba26709c6b94c737349b51a4ffb4a50b5805104c87661a5cb3c6b6902af8a926de9f248e0712343d1533d8129ba401fbe7712ddbabbf37b5
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\miktotik.exeFilesize
947KB
MD56ed0cca96fe69be3b775499509f0b029
SHA1e1c57829dd8947cc09b8b4ffcaaad07939efbb2d
SHA256bcb590cab5558665d9728ce52a8ea71c3f6fd348725071cec88dfb8bfd8989ab
SHA512a64e382cd0ecdc3eba26709c6b94c737349b51a4ffb4a50b5805104c87661a5cb3c6b6902af8a926de9f248e0712343d1533d8129ba401fbe7712ddbabbf37b5
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\miktotik.exeFilesize
947KB
MD56ed0cca96fe69be3b775499509f0b029
SHA1e1c57829dd8947cc09b8b4ffcaaad07939efbb2d
SHA256bcb590cab5558665d9728ce52a8ea71c3f6fd348725071cec88dfb8bfd8989ab
SHA512a64e382cd0ecdc3eba26709c6b94c737349b51a4ffb4a50b5805104c87661a5cb3c6b6902af8a926de9f248e0712343d1533d8129ba401fbe7712ddbabbf37b5
-
C:\Users\Admin\AppData\Roaming\controllevel\foldersDef\terminalweu.vbsFilesize
85B
MD5bf045999e4ca77b57de18d5ff25e1272
SHA1e8dab3a106e479a53c4ea61443c2ff7873d17c67
SHA25689f2f0f40f06ed45b155adf713b127931ebb41c162e08e0cda75ecb9e10fdf17
SHA512e191b410d97f021d3dd55ad3565559cf0f3dd6dcc7157f7d6ff60dd610128dfe875cc00f67106653df758e07b6d845fc4e7a7ee290f8d7d8a58d58a90a018f6a
-
memory/672-130-0x0000000000000000-mapping.dmp
-
memory/736-134-0x0000000000000000-mapping.dmp
-
memory/1060-144-0x0000000000000000-mapping.dmp
-
memory/1068-141-0x0000000000000000-mapping.dmp
-
memory/1244-161-0x0000000000000000-mapping.dmp
-
memory/1540-169-0x0000000000700000-0x0000000000856000-memory.dmpFilesize
1.3MB
-
memory/1540-172-0x0000000000700000-0x0000000000856000-memory.dmpFilesize
1.3MB
-
memory/1540-168-0x0000000000D00000-0x0000000001133000-memory.dmpFilesize
4.2MB
-
memory/1540-164-0x0000000000000000-mapping.dmp
-
memory/1972-138-0x0000000000000000-mapping.dmp
-
memory/2400-136-0x0000000000000000-mapping.dmp
-
memory/2504-171-0x0000000002C20000-0x0000000002D76000-memory.dmpFilesize
1.3MB
-
memory/2504-133-0x0000000000000000-mapping.dmp
-
memory/2568-140-0x0000000000000000-mapping.dmp
-
memory/3804-153-0x0000000000400000-0x000000000049B000-memory.dmpFilesize
620KB
-
memory/3804-146-0x0000000000000000-mapping.dmp
-
memory/3960-155-0x0000000000000000-mapping.dmp
-
memory/3988-145-0x0000000000000000-mapping.dmp
-
memory/4176-165-0x00000000005A0000-0x00000000005AD000-memory.dmpFilesize
52KB
-
memory/4176-159-0x0000000002180000-0x00000000021E6000-memory.dmpFilesize
408KB
-
memory/4176-149-0x0000000000000000-mapping.dmp
-
memory/4176-156-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/4176-166-0x0000000002690000-0x000000000269C000-memory.dmpFilesize
48KB
-
memory/4176-167-0x0000000002180000-0x00000000021E6000-memory.dmpFilesize
408KB
-
memory/4176-154-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/4176-150-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/4176-158-0x0000000002180000-0x00000000021E6000-memory.dmpFilesize
408KB
-
memory/4176-157-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/4180-162-0x0000000000000000-mapping.dmp
-
memory/4604-163-0x0000000000000000-mapping.dmp
-
memory/4696-143-0x0000000000000000-mapping.dmp