Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2022, 04:53

General

  • Target

    6829aa1070f348f06d6e886448338ccaabb6b6cc147400e0a682ddfd9e3d8579.exe

  • Size

    148KB

  • MD5

    199b8de05c4710457a31dd15815747d6

  • SHA1

    b1b9a732c12aca82178c7ed742a752a949b78b98

  • SHA256

    6829aa1070f348f06d6e886448338ccaabb6b6cc147400e0a682ddfd9e3d8579

  • SHA512

    73f72c8556aa85710bc7f46ac37edfc71cec1dc8df49d35b7852126bee3de613705ca36c88302d2c3aa75a5244a390e6c2130286dce0bbd875d09585c97699a3

  • SSDEEP

    3072:KX5H3oUhFBpQhvrHQc5LDUUn1Ir/sFdhq4r:KpH3oUhahvrHQc5LNIrezq4r

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Runs .reg file with regedit 8 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6829aa1070f348f06d6e886448338ccaabb6b6cc147400e0a682ddfd9e3d8579.exe
    "C:\Users\Admin\AppData\Local\Temp\6829aa1070f348f06d6e886448338ccaabb6b6cc147400e0a682ddfd9e3d8579.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\822tc5ndIk2kiJT.exe.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Users\Admin\AppData\Local\Temp\822tc5ndIk2kiJT.exe
        "C:\Users\Admin\AppData\Local\Temp\822tc5ndIk2kiJT.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3084
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Windows\20221021\25J5X8iB85J2emsC\script\script.exe.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4268
          • C:\Windows\20221021\25J5X8iB85J2emsC\script\script.exe
            "C:\Windows\20221021\25J5X8iB85J2emsC\script\script.exe"
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Drops file in Windows directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4736
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Windows\20221021\25J5X8iB85J2emsC\script\Script.vbs.bat" "
              6⤵
              • Checks computer location settings
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4636
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Windows\20221021\25J5X8iB85J2emsC\script\script.vbs"
                7⤵
                • Checks computer location settings
                • Drops file in Windows directory
                • Suspicious use of WriteProcessMemory
                PID:3392
                • C:\Windows\SysWOW64\attrib.exe
                  "C:\Windows\System32\attrib.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" +r +s
                  8⤵
                  • Views/modifies file attributes
                  PID:3032
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r Administrators
                  8⤵
                    PID:4732
                  • C:\Windows\SysWOW64\cacls.exe
                    "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c Administrators:CI
                    8⤵
                      PID:4576
                    • C:\Windows\SysWOW64\cacls.exe
                      "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r Administrator
                      8⤵
                        PID:5100
                      • C:\Windows\SysWOW64\cacls.exe
                        "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r users
                        8⤵
                          PID:4412
                        • C:\Windows\SysWOW64\cacls.exe
                          "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r system
                          8⤵
                            PID:1788
                          • C:\Windows\SysWOW64\cacls.exe
                            "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r everyone
                            8⤵
                              PID:4288
                            • C:\Windows\SysWOW64\cacls.exe
                              "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r user
                              8⤵
                                PID:1484
                              • C:\Windows\SysWOW64\cacls.exe
                                "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r "Power Users"
                                8⤵
                                  PID:2936
                                • C:\Windows\SysWOW64\cacls.exe
                                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r "Admin"
                                  8⤵
                                    PID:3832
                                  • C:\Windows\SysWOW64\attrib.exe
                                    "C:\Windows\System32\attrib.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" +r +s
                                    8⤵
                                    • Views/modifies file attributes
                                    PID:4548
                                  • C:\Windows\SysWOW64\cacls.exe
                                    "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r Administrators
                                    8⤵
                                      PID:2876
                                    • C:\Windows\SysWOW64\cacls.exe
                                      "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c Administrators:CI
                                      8⤵
                                        PID:3688
                                      • C:\Windows\SysWOW64\cacls.exe
                                        "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r Administrator
                                        8⤵
                                          PID:3052
                                        • C:\Windows\SysWOW64\cacls.exe
                                          "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r users
                                          8⤵
                                            PID:2964
                                          • C:\Windows\SysWOW64\cacls.exe
                                            "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r system
                                            8⤵
                                              PID:5060
                                            • C:\Windows\SysWOW64\cacls.exe
                                              "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r everyone
                                              8⤵
                                                PID:3120
                                              • C:\Windows\SysWOW64\cacls.exe
                                                "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r user
                                                8⤵
                                                  PID:2376
                                                • C:\Windows\SysWOW64\cacls.exe
                                                  "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r "Power Users"
                                                  8⤵
                                                    PID:5116
                                                  • C:\Windows\SysWOW64\cacls.exe
                                                    "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r "Admin"
                                                    8⤵
                                                      PID:3868
                                                    • C:\Windows\SysWOW64\attrib.exe
                                                      "C:\Windows\System32\attrib.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" +r +s
                                                      8⤵
                                                      • Views/modifies file attributes
                                                      PID:3060
                                                    • C:\Windows\SysWOW64\cacls.exe
                                                      "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r Administrators
                                                      8⤵
                                                        PID:2132
                                                      • C:\Windows\SysWOW64\cacls.exe
                                                        "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c Administrators:CI
                                                        8⤵
                                                          PID:5112
                                                        • C:\Windows\SysWOW64\cacls.exe
                                                          "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r Administrator
                                                          8⤵
                                                            PID:4164
                                                          • C:\Windows\SysWOW64\cacls.exe
                                                            "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r users
                                                            8⤵
                                                              PID:1544
                                                            • C:\Windows\SysWOW64\cacls.exe
                                                              "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r system
                                                              8⤵
                                                                PID:3716
                                                              • C:\Windows\SysWOW64\cacls.exe
                                                                "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r everyone
                                                                8⤵
                                                                  PID:344
                                                                • C:\Windows\SysWOW64\cacls.exe
                                                                  "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r user
                                                                  8⤵
                                                                    PID:2908
                                                                  • C:\Windows\SysWOW64\cacls.exe
                                                                    "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r "Power Users"
                                                                    8⤵
                                                                      PID:832
                                                                    • C:\Windows\SysWOW64\cacls.exe
                                                                      "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r "Admin"
                                                                      8⤵
                                                                        PID:1480
                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                        "C:\Windows\System32\attrib.exe" "C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt" +r +s
                                                                        8⤵
                                                                        • Views/modifies file attributes
                                                                        PID:4212
                                                                      • C:\Windows\SysWOW64\cacls.exe
                                                                        "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt" /e /c /r Administrators
                                                                        8⤵
                                                                          PID:4000
                                                                        • C:\Windows\SysWOW64\cacls.exe
                                                                          "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt" /e /c Administrators:CI
                                                                          8⤵
                                                                            PID:3380
                                                                          • C:\Windows\SysWOW64\cacls.exe
                                                                            "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt" /e /c /r Administrator
                                                                            8⤵
                                                                              PID:4576
                                                                            • C:\Windows\SysWOW64\cacls.exe
                                                                              "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt" /e /c /r users
                                                                              8⤵
                                                                                PID:4900
                                                                              • C:\Windows\SysWOW64\cacls.exe
                                                                                "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt" /e /c /r system
                                                                                8⤵
                                                                                  PID:3176
                                                                                • C:\Windows\SysWOW64\cacls.exe
                                                                                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt" /e /c /r everyone
                                                                                  8⤵
                                                                                    PID:1092
                                                                                  • C:\Windows\SysWOW64\cacls.exe
                                                                                    "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt" /e /c /r user
                                                                                    8⤵
                                                                                      PID:3624
                                                                                    • C:\Windows\SysWOW64\cacls.exe
                                                                                      "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt" /e /c /r "Power Users"
                                                                                      8⤵
                                                                                        PID:4780
                                                                                      • C:\Windows\SysWOW64\cacls.exe
                                                                                        "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt" /e /c /r "Admin"
                                                                                        8⤵
                                                                                          PID:3832
                                                                                        • C:\Windows\SysWOW64\regedit.exe
                                                                                          "C:\Windows\System32\regedit.exe" /s C:\Windows\SetWindowsIndex.reg
                                                                                          8⤵
                                                                                          • Modifies Internet Explorer settings
                                                                                          • Modifies Internet Explorer start page
                                                                                          • Runs .reg file with regedit
                                                                                          PID:1524
                                                                                        • C:\Windows\SysWOW64\regedit.exe
                                                                                          "C:\Windows\System32\regedit.exe" /s C:\Windows\MYShowIeLinkIe6.reg
                                                                                          8⤵
                                                                                          • Modifies Internet Explorer settings
                                                                                          • Runs .reg file with regedit
                                                                                          PID:4152
                                                                                        • C:\Windows\SysWOW64\regedit.exe
                                                                                          "C:\Windows\System32\regedit.exe" /s C:\Windows\MyShowIeLinkIe7.reg
                                                                                          8⤵
                                                                                          • Modifies Internet Explorer settings
                                                                                          • Runs .reg file with regedit
                                                                                          PID:4984
                                                                                        • C:\Windows\SysWOW64\regedit.exe
                                                                                          "C:\Windows\System32\regedit.exe" /s C:\Windows\search.reg
                                                                                          8⤵
                                                                                          • Modifies Internet Explorer settings
                                                                                          • Runs .reg file with regedit
                                                                                          PID:2720
                                                                                        • C:\Windows\SysWOW64\regedit.exe
                                                                                          "C:\Windows\System32\regedit.exe" /s C:\Windows\.reg
                                                                                          8⤵
                                                                                          • Modifies registry class
                                                                                          • Runs .reg file with regedit
                                                                                          PID:644
                                                                                        • C:\Windows\SysWOW64\regedit.exe
                                                                                          "C:\Windows\System32\regedit.exe" /s C:\Windows\AddRight.reg
                                                                                          8⤵
                                                                                          • Modifies Internet Explorer settings
                                                                                          • Runs .reg file with regedit
                                                                                          PID:3120
                                                                                        • C:\Windows\SysWOW64\regedit.exe
                                                                                          "C:\Windows\System32\regedit.exe" /s C:\Windows\SetWindowsIndex.reg
                                                                                          8⤵
                                                                                          • Modifies Internet Explorer settings
                                                                                          • Modifies Internet Explorer start page
                                                                                          • Runs .reg file with regedit
                                                                                          PID:3804
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Windows\20221021\25J5X8iB85J2emsC\script\reg.bat" "
                                                                                      6⤵
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:4484
                                                                                      • C:\Windows\SysWOW64\xcopy.exe
                                                                                        xcopy /c /q /y /i XlKankan.dll C:\Windows\system32
                                                                                        7⤵
                                                                                        • Drops file in System32 directory
                                                                                        • Drops file in Windows directory
                                                                                        • Enumerates system info in registry
                                                                                        PID:1176
                                                                                      • C:\Windows\SysWOW64\regedit.exe
                                                                                        regedit /s regBHO.reg
                                                                                        7⤵
                                                                                        • Installs/modifies Browser Helper Object
                                                                                        • Runs .reg file with regedit
                                                                                        PID:3396
                                                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                                                        regsvr32 /s XlKankan.dll
                                                                                        7⤵
                                                                                        • Loads dropped DLL
                                                                                        • Modifies registry class
                                                                                        PID:4020
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Windows\20221021\cX55V8LUQ52mDAF8\smss.exe.bat" "
                                                                                  4⤵
                                                                                    PID:1936
                                                                                    • C:\Windows\20221021\cX55V8LUQ52mDAF8\smss.exe
                                                                                      "C:\Windows\20221021\cX55V8LUQ52mDAF8\smss.exe"
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in Windows directory
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2860
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "flashget" /d "c:\windows\20221021\cx55v8luq52mdaf8\smss.exe " /f
                                                                                        6⤵
                                                                                        • Adds Run key to start application
                                                                                        PID:3936
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\822tc5ndIk2kiJT.exe.bat" "
                                                                                    4⤵
                                                                                      PID:1140
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6829aa1070f348f06d6e886448338ccaabb6b6cc147400e0a682ddfd9e3d8579.exe.bat" "
                                                                                  2⤵
                                                                                    PID:1284

                                                                                Network

                                                                                MITRE ATT&CK Enterprise v6

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css

                                                                                  Filesize

                                                                                  8B

                                                                                  MD5

                                                                                  e51f9cdcf7efb98e0859c9f85ce367e2

                                                                                  SHA1

                                                                                  02a5a939959597a5bbadc703fddff668aa98360d

                                                                                  SHA256

                                                                                  044775cb0f1e2b9162c192dcaea0ff0fa1be84bf7bb0e388c8190e237e861a33

                                                                                  SHA512

                                                                                  0f0028bb11ec79b02424d81891421eae8989faad76a82e8ac7a90bc2522ea97cc3ed163495827d0a4e80f0a0e97b0d7aacc877e070c7a921a948d8b9995ea026

                                                                                • C:\Users\Admin\AppData\Local\Temp\6829aa1070f348f06d6e886448338ccaabb6b6cc147400e0a682ddfd9e3d8579.exe.bat

                                                                                  Filesize

                                                                                  525B

                                                                                  MD5

                                                                                  f4af7e411be23983b2a8f165ce4a0abf

                                                                                  SHA1

                                                                                  cb941596246e98975669a21a9c49a7adb14f5f4f

                                                                                  SHA256

                                                                                  c70e687646381038c57e9d1e9b87aee46b1dbfe7f01444e35ab54e396b421e0b

                                                                                  SHA512

                                                                                  3b8d595340f61e9fce92ebb5907c502ef4743119beecfc37aeac9a2161c0da966e8d2606fe2e8fa8738203ab03c11d59a7408f150538e72d3501fc8501aacdf9

                                                                                • C:\Users\Admin\AppData\Local\Temp\822tc5ndIk2kiJT.exe

                                                                                  Filesize

                                                                                  111KB

                                                                                  MD5

                                                                                  fa1c8c4a83913e8639ac4227231f7ad1

                                                                                  SHA1

                                                                                  a415cfc290360a5c76a00759a6c055f0d7c27194

                                                                                  SHA256

                                                                                  f078e063e32f521d16a7cb253099de14ed7f52c0882058734bfb47caf9b1a07b

                                                                                  SHA512

                                                                                  dbd0278f51738033f2934d9039acbb980ecacb50bcea6710c1419206349e76a919455af00f91059c4b2694de46fb1c483d39e7bd191cf36a3ceffdf124157ee8

                                                                                • C:\Users\Admin\AppData\Local\Temp\822tc5ndIk2kiJT.exe

                                                                                  Filesize

                                                                                  111KB

                                                                                  MD5

                                                                                  fa1c8c4a83913e8639ac4227231f7ad1

                                                                                  SHA1

                                                                                  a415cfc290360a5c76a00759a6c055f0d7c27194

                                                                                  SHA256

                                                                                  f078e063e32f521d16a7cb253099de14ed7f52c0882058734bfb47caf9b1a07b

                                                                                  SHA512

                                                                                  dbd0278f51738033f2934d9039acbb980ecacb50bcea6710c1419206349e76a919455af00f91059c4b2694de46fb1c483d39e7bd191cf36a3ceffdf124157ee8

                                                                                • C:\Users\Admin\AppData\Local\Temp\822tc5ndIk2kiJT.exe.bat

                                                                                  Filesize

                                                                                  329B

                                                                                  MD5

                                                                                  9857f7d7c590080e5e748497f739d837

                                                                                  SHA1

                                                                                  5923555dd4690edf137742ae6a81f8b4054224e5

                                                                                  SHA256

                                                                                  1e7d05724a47e27629c568b47aaddeddc1baf4b2788c92480fecd23cd5bbf3d0

                                                                                  SHA512

                                                                                  f0494b396c43992bea6973ab13cc4871bd799ff43f3bf5a582ffc72b8dba1896e34b77909df633e9090974d0dce7bf083b1eb899e01e348043a1750d0bac769a

                                                                                • C:\Users\Admin\AppData\Local\Temp\822tc5ndIk2kiJT.exe.bat

                                                                                  Filesize

                                                                                  207B

                                                                                  MD5

                                                                                  612be96cf16eb5f415bc8f5b8c724389

                                                                                  SHA1

                                                                                  a20cb0212da2ee4e9c86a7133c7e66606ed80d0d

                                                                                  SHA256

                                                                                  32bea251cc64c53024689b0d90d8ee416bd3c2857222e22c4905b4055a4694ab

                                                                                  SHA512

                                                                                  6a260ba4926a7d85ea46fa8155cf36983efef88f3b17cd9aebaa9d76d355f5fec16bd2a1b9577ea47ecd6f2c2c2e0a9303ec5e411e289b8f3d9a22f7bdbd19d0

                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css

                                                                                  Filesize

                                                                                  8B

                                                                                  MD5

                                                                                  e51f9cdcf7efb98e0859c9f85ce367e2

                                                                                  SHA1

                                                                                  02a5a939959597a5bbadc703fddff668aa98360d

                                                                                  SHA256

                                                                                  044775cb0f1e2b9162c192dcaea0ff0fa1be84bf7bb0e388c8190e237e861a33

                                                                                  SHA512

                                                                                  0f0028bb11ec79b02424d81891421eae8989faad76a82e8ac7a90bc2522ea97cc3ed163495827d0a4e80f0a0e97b0d7aacc877e070c7a921a948d8b9995ea026

                                                                                • C:\Users\Public\Desktop\Internet Explorer.tt

                                                                                  Filesize

                                                                                  8B

                                                                                  MD5

                                                                                  e51f9cdcf7efb98e0859c9f85ce367e2

                                                                                  SHA1

                                                                                  02a5a939959597a5bbadc703fddff668aa98360d

                                                                                  SHA256

                                                                                  044775cb0f1e2b9162c192dcaea0ff0fa1be84bf7bb0e388c8190e237e861a33

                                                                                  SHA512

                                                                                  0f0028bb11ec79b02424d81891421eae8989faad76a82e8ac7a90bc2522ea97cc3ed163495827d0a4e80f0a0e97b0d7aacc877e070c7a921a948d8b9995ea026

                                                                                • C:\Users\Public\Desktop\Ìؼ۹ºÎï.bt

                                                                                  Filesize

                                                                                  8B

                                                                                  MD5

                                                                                  e51f9cdcf7efb98e0859c9f85ce367e2

                                                                                  SHA1

                                                                                  02a5a939959597a5bbadc703fddff668aa98360d

                                                                                  SHA256

                                                                                  044775cb0f1e2b9162c192dcaea0ff0fa1be84bf7bb0e388c8190e237e861a33

                                                                                  SHA512

                                                                                  0f0028bb11ec79b02424d81891421eae8989faad76a82e8ac7a90bc2522ea97cc3ed163495827d0a4e80f0a0e97b0d7aacc877e070c7a921a948d8b9995ea026

                                                                                • C:\Windows\.reg

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  65bf25de434a6cfb78b5cd949957ab62

                                                                                  SHA1

                                                                                  738fed948972912548fddce4a763d4c4ff94ee05

                                                                                  SHA256

                                                                                  0c9ebb8044661c0824d7e4fd3b6462b6671a5bff1185e3ffd8b151322aa6b43d

                                                                                  SHA512

                                                                                  377fd8318f762b153bb2ccb5f08504cb9a9ac38cf754ed7cf03dd3ea67a244c6c342700fdc387c7cf684f177a65bd5b2f2c73dc7925bd454135609b4f67ddaeb

                                                                                • C:\Windows\20221021\25J5X8iB85J2emsC\script\Script.vbs.bat

                                                                                  Filesize

                                                                                  210B

                                                                                  MD5

                                                                                  e3209067bf227615880176af0ba950e6

                                                                                  SHA1

                                                                                  fbd77831fc94d857a24ecc5740a976c3f9de3fd0

                                                                                  SHA256

                                                                                  08d7b9616efd2629cf1ee4743459ae3637708bb6cbd6aab15651edfdf6b85689

                                                                                  SHA512

                                                                                  4201db321581f09f64bb1fd8a7c8b4f900a7f44a6bbdb59c4594e3814376c3d331b0c25667d4168b1ecab0f9566493f743a6380e94c84c5c372640bee1113292

                                                                                • C:\Windows\20221021\25J5X8iB85J2emsC\script\XlKankan.dll

                                                                                  Filesize

                                                                                  28KB

                                                                                  MD5

                                                                                  ce8f0033298014df0508a996b638b5eb

                                                                                  SHA1

                                                                                  610f52ba70f2053a9a4dba08d88a3f97243aa3d6

                                                                                  SHA256

                                                                                  9e9a8a9522ae2822ff0130a9d7736417d32a85c6c66c44048d8b2d2ec4677466

                                                                                  SHA512

                                                                                  216dcd79aa7bedd2e9c819978c2477787ce4b2a34f33c64881db21d1ebc96e0b44169d652c68bd4053bcb963a6b1c673d585e44feb6c30ef30121f0076ce3200

                                                                                • C:\Windows\20221021\25J5X8iB85J2emsC\script\reg.bat

                                                                                  Filesize

                                                                                  130B

                                                                                  MD5

                                                                                  d426a1646ddadd0e41ff5358eeceb3c4

                                                                                  SHA1

                                                                                  69e585d10ad1f4d03a4ceec7f4e336951e10406f

                                                                                  SHA256

                                                                                  86861d7856b53976d754875343237f55e63ca5580db3e57f6ffbbc86977ef573

                                                                                  SHA512

                                                                                  401c3aa8a1a426cb7c6fdfc0e0cd5da193abb8c44c17143996e57838060f22601c51fc3a3da915d0ac3a3f7a70a217fa9576c575bc9f5a30b542c9a5a206dd97

                                                                                • C:\Windows\20221021\25J5X8iB85J2emsC\script\regBHO.reg

                                                                                  Filesize

                                                                                  356B

                                                                                  MD5

                                                                                  b93db4ec7eba064cbd7336085953cce9

                                                                                  SHA1

                                                                                  79b458e4b5c974ce2361b103905a941eae0210b9

                                                                                  SHA256

                                                                                  2b6fb4f8615a821498deb27a55261d482fcf97a1dbe8143d233ee7d1b9b63dac

                                                                                  SHA512

                                                                                  420819a9aeeed54337aaabe2f4cf5f0f6b91cda6bacc5eae496320e2d22cc4eafccef7e38d4085d868ab28177889bcbf025f496c14b5df0384bc93ad14d591a6

                                                                                • C:\Windows\20221021\25J5X8iB85J2emsC\script\script.exe

                                                                                  Filesize

                                                                                  14KB

                                                                                  MD5

                                                                                  60442812e48837950c4ae047287fe941

                                                                                  SHA1

                                                                                  948e0436a717ccc0eae4c29158d9053be32c238a

                                                                                  SHA256

                                                                                  01d53d4719a240e8de084b4eb1e5ba2721094d7a8c46d7c1850882f3fb90c54d

                                                                                  SHA512

                                                                                  626d41b2ca7b25ad247db87d9103099684e38d092302a1369ac5a5a070324642aef95dcf9b768eadd1554428fb1b7b92d1c34f6bde3f080b706d5c990c56bc63

                                                                                • C:\Windows\20221021\25J5X8iB85J2emsC\script\script.exe

                                                                                  Filesize

                                                                                  14KB

                                                                                  MD5

                                                                                  60442812e48837950c4ae047287fe941

                                                                                  SHA1

                                                                                  948e0436a717ccc0eae4c29158d9053be32c238a

                                                                                  SHA256

                                                                                  01d53d4719a240e8de084b4eb1e5ba2721094d7a8c46d7c1850882f3fb90c54d

                                                                                  SHA512

                                                                                  626d41b2ca7b25ad247db87d9103099684e38d092302a1369ac5a5a070324642aef95dcf9b768eadd1554428fb1b7b92d1c34f6bde3f080b706d5c990c56bc63

                                                                                • C:\Windows\20221021\25J5X8iB85J2emsC\script\script.exe.bat

                                                                                  Filesize

                                                                                  210B

                                                                                  MD5

                                                                                  fd7f1c35287630b438b3ebbede74bbca

                                                                                  SHA1

                                                                                  112428b70068fb1461ed0b9f9390a6fac119acde

                                                                                  SHA256

                                                                                  e073a19b2afbfc7c1b229cb4e1a3cfa9d3aca105b3771194a6ae69d0c9230bbe

                                                                                  SHA512

                                                                                  3bb135d7c6a86265331da81852f3dfc59616ec007af7e1059f4b42cf7752b75acee9b49665b9544ed6b522c2be744d4c20f7daaad25ae652a9e475fff76aa44f

                                                                                • C:\Windows\20221021\25J5X8iB85J2emsC\script\script.vbs

                                                                                  Filesize

                                                                                  74KB

                                                                                  MD5

                                                                                  9ecc1bef464dc50985e94bb61ea39481

                                                                                  SHA1

                                                                                  d322f77e54cc0e7111f4e894cb2bbe9e7afd0ff0

                                                                                  SHA256

                                                                                  b02a1d340606815f766afe59c6c7bd5e73b16954fa0c2f3489a00a49a5ab4f6a

                                                                                  SHA512

                                                                                  ae5bdd6aacb71e9b9b844d8a7fa01ac474c042d931d00cadfc6b51d1aa6346794a4fdb54aa844feed9b8024ac08de2958c7970f53d6bd816edf76c2916d5f2be

                                                                                • C:\Windows\20221021\cX55V8LUQ52mDAF8\smss.exe

                                                                                  Filesize

                                                                                  16.1MB

                                                                                  MD5

                                                                                  9d23c9d50738658d0fe13a6cd1b9fdb6

                                                                                  SHA1

                                                                                  20073eca652bdf4f26c0bf1c6cd395e3a55234d8

                                                                                  SHA256

                                                                                  8763c04d627c8b294a487a9398b14df8d5bfb46a1e819c613ac59b491e6e471c

                                                                                  SHA512

                                                                                  198303c5126ec285872127f6a97367e97bdbade092187731d6ec5acb4577d46d556cb9c057e8ec3f25442cd16a2bd381d5ee5b426e95a50c2be356063da47d1a

                                                                                • C:\Windows\20221021\cX55V8LUQ52mDAF8\smss.exe

                                                                                  Filesize

                                                                                  16.1MB

                                                                                  MD5

                                                                                  9d23c9d50738658d0fe13a6cd1b9fdb6

                                                                                  SHA1

                                                                                  20073eca652bdf4f26c0bf1c6cd395e3a55234d8

                                                                                  SHA256

                                                                                  8763c04d627c8b294a487a9398b14df8d5bfb46a1e819c613ac59b491e6e471c

                                                                                  SHA512

                                                                                  198303c5126ec285872127f6a97367e97bdbade092187731d6ec5acb4577d46d556cb9c057e8ec3f25442cd16a2bd381d5ee5b426e95a50c2be356063da47d1a

                                                                                • C:\Windows\20221021\cX55V8LUQ52mDAF8\smss.exe.bat

                                                                                  Filesize

                                                                                  183B

                                                                                  MD5

                                                                                  87ee326f1edfb61e77348c7336707ce5

                                                                                  SHA1

                                                                                  6c37e65ec3d8da19621e32e4ae9921ad6cf3608f

                                                                                  SHA256

                                                                                  a67935e6318772bee7fd3a7c1d7fd3b666f897ab7d8d1a18944172efc24d8ab0

                                                                                  SHA512

                                                                                  b6b67b70f5fcf227c3b255f0afb7d6a3efff88abac4eceeda45bcb790969e0791b71d8b738ddc076930ab8174d9007f5b093bcd7849c26fb450e3612149ab90d

                                                                                • C:\Windows\AddRight.reg

                                                                                  Filesize

                                                                                  592B

                                                                                  MD5

                                                                                  53d75aea40be26a09d46f220accfb528

                                                                                  SHA1

                                                                                  82e1a094df1d4137697dfeb9f6b77b877d77ef8a

                                                                                  SHA256

                                                                                  a86cc1150a07bef8f91c426568651eae78be6af0ba06fc067014d6a9fb2c52c2

                                                                                  SHA512

                                                                                  1151e563503ef2841c8a052f0166565238fb86359ac4ded9939e77438e1efccc8d43d767e4dd59502dad4e0b38bf1bda7616254acbeb2b1ac07b2d30b0df3736

                                                                                • C:\Windows\MYShowIeLinkIe6.reg

                                                                                  Filesize

                                                                                  7KB

                                                                                  MD5

                                                                                  4f69fa82c34c91514da21a5933644af8

                                                                                  SHA1

                                                                                  e131f57f41ce95b46195d460852718b83517579a

                                                                                  SHA256

                                                                                  7cd8b741bfaee5cd14779b69d71b362aac4c928097c6b4af8ce0ce16bde52a46

                                                                                  SHA512

                                                                                  276588f960d28023febd87873c7852f401ab6ebfb3d90bf8b21b1998949d8ab00badb42d1a05934587aa6b4ad0ab06a3d649dcdb70f384ca70339049243463c4

                                                                                • C:\Windows\MyShowIeLinkIe7.reg

                                                                                  Filesize

                                                                                  9KB

                                                                                  MD5

                                                                                  dbd46bf2e72f6dfbb21295f4e3066d47

                                                                                  SHA1

                                                                                  cdd6ca2f6455c1e528c40a520bcdb8669df8f548

                                                                                  SHA256

                                                                                  71927f4f034db038385346e34209ad069139f54d73bae34bfaf4f29b7010fc6b

                                                                                  SHA512

                                                                                  ad013387a0c7608375b7a3c5fdb27f0d9e79b051d84b1ee9221346499f386d30473b5e2727f6a4e8a8122cf8ac2d473a5ce5e368e62da09441ed48e5c088bd11

                                                                                • C:\Windows\SetWindowsIndex.reg

                                                                                  Filesize

                                                                                  150B

                                                                                  MD5

                                                                                  47164d66e9e797f434e044c04c25c426

                                                                                  SHA1

                                                                                  6f02c30481d3be2818beded681648dad820c5301

                                                                                  SHA256

                                                                                  f4d2c4b1fae364577058aa39fde412f70cc05e4ce232d565224f95f5a5f06926

                                                                                  SHA512

                                                                                  9acdc9fa4ace438873745d88bd758c7c20e8a260fee81171ee193375954608f9b8c5cea9d6ddf41147b5a2bc8f5477db58c1f16d290bd31eca41736344837c37

                                                                                • C:\Windows\SetWindowsIndex.reg

                                                                                  Filesize

                                                                                  150B

                                                                                  MD5

                                                                                  47164d66e9e797f434e044c04c25c426

                                                                                  SHA1

                                                                                  6f02c30481d3be2818beded681648dad820c5301

                                                                                  SHA256

                                                                                  f4d2c4b1fae364577058aa39fde412f70cc05e4ce232d565224f95f5a5f06926

                                                                                  SHA512

                                                                                  9acdc9fa4ace438873745d88bd758c7c20e8a260fee81171ee193375954608f9b8c5cea9d6ddf41147b5a2bc8f5477db58c1f16d290bd31eca41736344837c37

                                                                                • C:\Windows\SysWOW64\XlKankan.dll

                                                                                  Filesize

                                                                                  28KB

                                                                                  MD5

                                                                                  ce8f0033298014df0508a996b638b5eb

                                                                                  SHA1

                                                                                  610f52ba70f2053a9a4dba08d88a3f97243aa3d6

                                                                                  SHA256

                                                                                  9e9a8a9522ae2822ff0130a9d7736417d32a85c6c66c44048d8b2d2ec4677466

                                                                                  SHA512

                                                                                  216dcd79aa7bedd2e9c819978c2477787ce4b2a34f33c64881db21d1ebc96e0b44169d652c68bd4053bcb963a6b1c673d585e44feb6c30ef30121f0076ce3200

                                                                                • C:\Windows\SysWOW64\XlKankan.dll

                                                                                  Filesize

                                                                                  28KB

                                                                                  MD5

                                                                                  ce8f0033298014df0508a996b638b5eb

                                                                                  SHA1

                                                                                  610f52ba70f2053a9a4dba08d88a3f97243aa3d6

                                                                                  SHA256

                                                                                  9e9a8a9522ae2822ff0130a9d7736417d32a85c6c66c44048d8b2d2ec4677466

                                                                                  SHA512

                                                                                  216dcd79aa7bedd2e9c819978c2477787ce4b2a34f33c64881db21d1ebc96e0b44169d652c68bd4053bcb963a6b1c673d585e44feb6c30ef30121f0076ce3200

                                                                                • C:\Windows\search.reg

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  8e2ec860bfbd9aa37ea44e51d559ea9b

                                                                                  SHA1

                                                                                  f64e2891ec34d4909f28b2ae14c0a9f712a0e29c

                                                                                  SHA256

                                                                                  ff8d92c2bbe81ccfa1a6ac46ac66e7b42dc4fd18a27924c2e6511d2579f092df

                                                                                  SHA512

                                                                                  ad551272a90d79aef258d22680c07a5d81b0b31e1712dc2a60ac2c67f8af13f18c3a5f99f8408231bc5bb4f68882a5d75ed5c0e203059575eea5940d8b841dc1

                                                                                • C:\Windows\userid.txt

                                                                                  Filesize

                                                                                  4B

                                                                                  MD5

                                                                                  e702e51da2c0f5be4dd354bb3e295d37

                                                                                  SHA1

                                                                                  bf5ce6bca1837184b86a1fb332edb735665ca1ed

                                                                                  SHA256

                                                                                  f8726da5732fa9095e0129c6c25619a35d435aa39e17a15998fa87ee96d34aeb

                                                                                  SHA512

                                                                                  6609b272fbd5c1710ac6311e49232ac188ade52707868acd29f51302c92939b8bd47901966ee0076aad312257d75a47c06ba419eb3201fee93c6e55c08f814c3