Analysis
-
max time kernel
150s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:41
Static task
static1
Behavioral task
behavioral1
Sample
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe
Resource
win10v2004-20220812-en
General
-
Target
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe
-
Size
205KB
-
MD5
a55d93a6f3655bce92c2ce0c4e22a7f6
-
SHA1
c012c7bcf19309693e8b96dda907dcf9013ea6d8
-
SHA256
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9
-
SHA512
07a969d82b4945d86a16a2a73c82b1fd9aa582a44f4a876eba0a4a3b80a6da7ba19ee8e2396a17a3294af97fe99c548c90fb44e3b08f6cca2cfd47157fe696f5
-
SSDEEP
3072:cqhMPssRhlARSOsdwD/98out3SDADeak7dJHB/AKG:cqhMPssRARoiSoS3SsQLH5AK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
Processes:
winlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe smss.exe lsass.exe services.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" services.exe -
Modifies system executable filetype association 2 TTPs 8 IoCs
Processes:
lsass.exe services.exe csrss.exescwt.exewinlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe smss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt scwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
Processes:
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe smss.exe lsass.exe services.exe csrss.exescwt.exewinlogon.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" scwt.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
Processes:
csrss.exescwt.exewinlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe smss.exe lsass.exe services.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" scwt.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe -
Processes:
winlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe smss.exe lsass.exe services.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
winlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe smss.exe lsass.exe services.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.execsrss.exe csrss.execsrss.exe scwt.exesmss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe ~Paraysutki_VM_Community~smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe ~Paraysutki_VM_Community~lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe ~Paraysutki_VM_Community~services.exeservices.exe winlogon.exewinlogon.exe ~Paraysutki_VM_Community~pid process 1392 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 844 csrss.exe 1516 csrss.exe 972 csrss.exe 364 csrss.exe 1488 scwt.exe 1916 smss.exe 1960 smss.exe 1056 csrss.exe 1808 csrss.exe 1728 smss.exe 1612 smss.exe 1860 lsass.exe 1132 lsass.exe 1592 csrss.exe 1632 csrss.exe 548 smss.exe 1792 smss.exe 1108 lsass.exe 944 lsass.exe 2036 services.exe 468 services.exe 644 csrss.exe 364 csrss.exe 288 smss.exe 1072 smss.exe 1396 lsass.exe 1532 lsass.exe 920 services.exe 1200 services.exe 296 winlogon.exe 564 winlogon.exe 1812 csrss.exe 1992 csrss.exe 1884 smss.exe 992 smss.exe 840 lsass.exe 736 lsass.exe 512 services.exe 1844 services.exe 1524 winlogon.exe 1632 winlogon.exe 1140 ~Paraysutki_VM_Community~ 2040 smss.exe 1928 smss.exe 1340 lsass.exe 1788 lsass.exe 528 services.exe 904 services.exe 1464 winlogon.exe 1344 winlogon.exe 972 ~Paraysutki_VM_Community~ 1988 lsass.exe 1964 lsass.exe 1628 services.exe 1952 services.exe 1040 winlogon.exe 1984 winlogon.exe 1612 ~Paraysutki_VM_Community~ 1652 services.exe 1980 services.exe 1120 winlogon.exe 1844 winlogon.exe 1768 ~Paraysutki_VM_Community~ -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
csrss.exe lsass.exe winlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe services.exe smss.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "rundll32.exe" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "cmd.exe /c del" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe\Debugger = "cmd.exe /c del" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETUP.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rundll32.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe\Debugger = "cmd.exe /c del" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rundll32.exe" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe\Debugger = "cmd.exe /c del" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "rundll32.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe\Debugger = "cmd.exe /c del" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe smss.exe -
Loads dropped DLL 64 IoCs
Processes:
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.execsrss.exe csrss.execsrss.exe smss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exepid process 1476 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 1476 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 1392 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 1392 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 1516 csrss.exe 1516 csrss.exe 1516 csrss.exe 972 csrss.exe 972 csrss.exe 364 csrss.exe 972 csrss.exe 972 csrss.exe 1516 csrss.exe 1516 csrss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1960 smss.exe 1960 smss.exe 1960 smss.exe 1056 csrss.exe 1056 csrss.exe 1808 csrss.exe 1960 smss.exe 1960 smss.exe 1728 smss.exe 1728 smss.exe 1612 smss.exe 1960 smss.exe 1960 smss.exe 1860 lsass.exe 1860 lsass.exe 1860 lsass.exe 1132 lsass.exe 1132 lsass.exe 1132 lsass.exe 1592 csrss.exe 1592 csrss.exe 1632 csrss.exe 1132 lsass.exe 1132 lsass.exe 548 smss.exe 548 smss.exe 1792 smss.exe 1132 lsass.exe 1132 lsass.exe 1108 lsass.exe 1108 lsass.exe 944 lsass.exe 1132 lsass.exe 1132 lsass.exe 2036 services.exe 2036 services.exe 2036 services.exe 468 services.exe 468 services.exe 468 services.exe 644 csrss.exe 644 csrss.exe 364 csrss.exe 468 services.exe -
Adds Run key to start application 2 TTPs 38 IoCs
Processes:
smss.exe services.exe winlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe lsass.exe scwt.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run scwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" scwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" smss.exe -
Processes:
services.exe winlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe smss.exe lsass.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
scwt.exedescription ioc process File opened (read-only) \??\S: scwt.exe File opened (read-only) \??\U: scwt.exe File opened (read-only) \??\W: scwt.exe File opened (read-only) \??\L: scwt.exe File opened (read-only) \??\N: scwt.exe File opened (read-only) \??\O: scwt.exe File opened (read-only) \??\P: scwt.exe File opened (read-only) \??\X: scwt.exe File opened (read-only) \??\Z: scwt.exe File opened (read-only) \??\B: scwt.exe File opened (read-only) \??\H: scwt.exe File opened (read-only) \??\M: scwt.exe File opened (read-only) \??\R: scwt.exe File opened (read-only) \??\V: scwt.exe File opened (read-only) \??\Y: scwt.exe File opened (read-only) \??\G: scwt.exe File opened (read-only) \??\I: scwt.exe File opened (read-only) \??\J: scwt.exe File opened (read-only) \??\K: scwt.exe File opened (read-only) \??\E: scwt.exe File opened (read-only) \??\F: scwt.exe File opened (read-only) \??\Q: scwt.exe File opened (read-only) \??\T: scwt.exe -
Drops file in System32 directory 64 IoCs
Processes:
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe smss.exe lsass.exe services.exe winlogon.exe csrss.exewinlogon.execsrss.exe scwt.exelsass.exewinlogon.exeservices.exe~Paraysutki_VM_Community~services.exe~Paraysutki_VM_Community~csrss.exesmss.exelsass.execsrss.exeservices.exewinlogon.execsrss.exesmss.exeservices.exe~Paraysutki_VM_Community~services.exewinlogon.exe~Paraysutki_VM_Community~description ioc process File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe csrss.exe File created \??\c:\windows\SysWOW64\Desktop.sysm scwt.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt ~Paraysutki_VM_Community~ File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt ~Paraysutki_VM_Community~ File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt ~Paraysutki_VM_Community~ File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt ~Paraysutki_VM_Community~ File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe lsass.exe -
Drops file in Program Files directory 34 IoCs
Processes:
scwt.exedescription ioc process File opened for modification \??\c:\Program Files\Windows Mail\wab.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe scwt.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe scwt.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Sidebar\sidebar.exe scwt.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe scwt.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe scwt.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-hang-ui.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Journal\PDIALOG.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe scwt.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe scwt.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe scwt.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe scwt.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe scwt.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpenc.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPSideShowGadget.exe scwt.exe File opened for modification \??\c:\Program Files\7-Zip\7zG.exe scwt.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Defender\MpCmdRun.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPDMC.exe scwt.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe scwt.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Defender\MSASCui.exe scwt.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe scwt.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe scwt.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe scwt.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe scwt.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe scwt.exe -
Processes:
csrss.exe lsass.exe winlogon.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe smss.exe services.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" smss.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main lsass.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main services.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" services.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe -
Modifies registry class 48 IoCs
Processes:
scwt.execsrss.exe csrss.exe14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe services.exe lsass.exe smss.exe winlogon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt scwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd scwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" scwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" scwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm scwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" scwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" scwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile scwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon scwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon scwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command scwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command scwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" scwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt scwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" scwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt scwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt csrss.exe -
Runs ping.exe 1 TTPs 18 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 1484 ping.exe 1396 ping.exe 1964 ping.exe 1808 ping.exe 1660 ping.exe 2440 ping.exe 2432 ping.exe 2004 ping.exe 852 ping.exe 1176 ping.exe 816 ping.exe 1336 ping.exe 1836 ping.exe 660 ping.exe 1812 ping.exe 1192 ping.exe 1916 ping.exe 2424 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
csrss.exesmss.exepid process 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 844 csrss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe 1916 smss.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.execsrss.exe csrss.execsrss.exe scwt.exesmss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe ~Paraysutki_VM_Community~smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe ~Paraysutki_VM_Community~lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe ~Paraysutki_VM_Community~services.exeservices.exe winlogon.exewinlogon.exepid process 1476 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 1392 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 844 csrss.exe 1516 csrss.exe 972 csrss.exe 364 csrss.exe 1488 scwt.exe 1916 smss.exe 1960 smss.exe 1056 csrss.exe 1808 csrss.exe 1728 smss.exe 1612 smss.exe 1860 lsass.exe 1132 lsass.exe 1592 csrss.exe 1632 csrss.exe 548 smss.exe 1792 smss.exe 1108 lsass.exe 944 lsass.exe 2036 services.exe 468 services.exe 644 csrss.exe 364 csrss.exe 288 smss.exe 1072 smss.exe 1396 lsass.exe 1532 lsass.exe 920 services.exe 1200 services.exe 296 winlogon.exe 564 winlogon.exe 1812 csrss.exe 1992 csrss.exe 1884 smss.exe 992 smss.exe 840 lsass.exe 736 lsass.exe 512 services.exe 1844 services.exe 1524 winlogon.exe 1632 winlogon.exe 1140 ~Paraysutki_VM_Community~ 2040 smss.exe 1928 smss.exe 1340 lsass.exe 1788 lsass.exe 528 services.exe 904 services.exe 1464 winlogon.exe 1344 winlogon.exe 972 ~Paraysutki_VM_Community~ 1988 lsass.exe 1964 lsass.exe 1628 services.exe 1952 services.exe 1040 winlogon.exe 1984 winlogon.exe 1612 ~Paraysutki_VM_Community~ 1652 services.exe 1980 services.exe 1120 winlogon.exe 1844 winlogon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.execsrss.exe csrss.exesmss.exesmss.exe csrss.exesmss.exelsass.exelsass.exe csrss.exedescription pid process target process PID 1476 wrote to memory of 1392 1476 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe PID 1476 wrote to memory of 1392 1476 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe PID 1476 wrote to memory of 1392 1476 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe PID 1476 wrote to memory of 1392 1476 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe PID 1392 wrote to memory of 844 1392 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe PID 1392 wrote to memory of 844 1392 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe PID 1392 wrote to memory of 844 1392 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe PID 1392 wrote to memory of 844 1392 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe csrss.exe PID 844 wrote to memory of 1516 844 csrss.exe csrss.exe PID 844 wrote to memory of 1516 844 csrss.exe csrss.exe PID 844 wrote to memory of 1516 844 csrss.exe csrss.exe PID 844 wrote to memory of 1516 844 csrss.exe csrss.exe PID 1516 wrote to memory of 972 1516 csrss.exe csrss.exe PID 1516 wrote to memory of 972 1516 csrss.exe csrss.exe PID 1516 wrote to memory of 972 1516 csrss.exe csrss.exe PID 1516 wrote to memory of 972 1516 csrss.exe csrss.exe PID 972 wrote to memory of 364 972 csrss.exe csrss.exe PID 972 wrote to memory of 364 972 csrss.exe csrss.exe PID 972 wrote to memory of 364 972 csrss.exe csrss.exe PID 972 wrote to memory of 364 972 csrss.exe csrss.exe PID 972 wrote to memory of 1488 972 csrss.exe scwt.exe PID 972 wrote to memory of 1488 972 csrss.exe scwt.exe PID 972 wrote to memory of 1488 972 csrss.exe scwt.exe PID 972 wrote to memory of 1488 972 csrss.exe scwt.exe PID 1516 wrote to memory of 1916 1516 csrss.exe smss.exe PID 1516 wrote to memory of 1916 1516 csrss.exe smss.exe PID 1516 wrote to memory of 1916 1516 csrss.exe smss.exe PID 1516 wrote to memory of 1916 1516 csrss.exe smss.exe PID 1916 wrote to memory of 1960 1916 smss.exe smss.exe PID 1916 wrote to memory of 1960 1916 smss.exe smss.exe PID 1916 wrote to memory of 1960 1916 smss.exe smss.exe PID 1916 wrote to memory of 1960 1916 smss.exe smss.exe PID 1960 wrote to memory of 1056 1960 smss.exe csrss.exe PID 1960 wrote to memory of 1056 1960 smss.exe csrss.exe PID 1960 wrote to memory of 1056 1960 smss.exe csrss.exe PID 1960 wrote to memory of 1056 1960 smss.exe csrss.exe PID 1056 wrote to memory of 1808 1056 csrss.exe csrss.exe PID 1056 wrote to memory of 1808 1056 csrss.exe csrss.exe PID 1056 wrote to memory of 1808 1056 csrss.exe csrss.exe PID 1056 wrote to memory of 1808 1056 csrss.exe csrss.exe PID 1960 wrote to memory of 1728 1960 smss.exe smss.exe PID 1960 wrote to memory of 1728 1960 smss.exe smss.exe PID 1960 wrote to memory of 1728 1960 smss.exe smss.exe PID 1960 wrote to memory of 1728 1960 smss.exe smss.exe PID 1728 wrote to memory of 1612 1728 smss.exe smss.exe PID 1728 wrote to memory of 1612 1728 smss.exe smss.exe PID 1728 wrote to memory of 1612 1728 smss.exe smss.exe PID 1728 wrote to memory of 1612 1728 smss.exe smss.exe PID 1960 wrote to memory of 1860 1960 smss.exe lsass.exe PID 1960 wrote to memory of 1860 1960 smss.exe lsass.exe PID 1960 wrote to memory of 1860 1960 smss.exe lsass.exe PID 1960 wrote to memory of 1860 1960 smss.exe lsass.exe PID 1860 wrote to memory of 1132 1860 lsass.exe lsass.exe PID 1860 wrote to memory of 1132 1860 lsass.exe lsass.exe PID 1860 wrote to memory of 1132 1860 lsass.exe lsass.exe PID 1860 wrote to memory of 1132 1860 lsass.exe lsass.exe PID 1132 wrote to memory of 1592 1132 lsass.exe csrss.exe PID 1132 wrote to memory of 1592 1132 lsass.exe csrss.exe PID 1132 wrote to memory of 1592 1132 lsass.exe csrss.exe PID 1132 wrote to memory of 1592 1132 lsass.exe csrss.exe PID 1592 wrote to memory of 1632 1592 csrss.exe csrss.exe PID 1592 wrote to memory of 1632 1592 csrss.exe csrss.exe PID 1592 wrote to memory of 1632 1592 csrss.exe csrss.exe PID 1592 wrote to memory of 1632 1592 csrss.exe csrss.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe services.exe smss.exe lsass.exe winlogon.exe csrss.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe"C:\Users\Admin\AppData\Local\Temp\14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exeC:\Users\Admin\AppData\Local\Temp\14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1392 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe4⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1516 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe5⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:364 -
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\scwt.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\scwt.exe" csrss6⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1488 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe6⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1960 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe8⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1132 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1108 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe10⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:468 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:644 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:364 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:288 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1072 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1396 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:920 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:296 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe12⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:564 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:992 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:736 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:512 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen13⤵PID:1496
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134013⤵
- Runs ping.exe
PID:2004 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 121013⤵
- Runs ping.exe
PID:1176 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134013⤵
- Runs ping.exe
PID:1192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe13⤵PID:1700
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe13⤵PID:2140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe13⤵PID:2152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe13⤵PID:2304
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe13⤵PID:2388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe13⤵PID:2400
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~11⤵
- Drops file in System32 directory
PID:760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen11⤵PID:2192
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe11⤵PID:2448
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 121011⤵
- Runs ping.exe
PID:2440 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134011⤵
- Runs ping.exe
PID:2432 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134011⤵
- Runs ping.exe
PID:2424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe11⤵PID:2508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe11⤵PID:2536
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe11⤵PID:2568
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe11⤵PID:2580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe11⤵PID:2620
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe9⤵PID:1472
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe10⤵PID:1928
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~9⤵
- Drops file in System32 directory
PID:1816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen9⤵PID:1084
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13409⤵
- Runs ping.exe
PID:852 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12109⤵
- Runs ping.exe
PID:1964 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13409⤵
- Runs ping.exe
PID:660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe9⤵PID:732
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe9⤵PID:2200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe9⤵PID:2244
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe9⤵PID:2232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe9⤵PID:2340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe9⤵PID:2468
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1120 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen7⤵PID:1596
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13407⤵
- Runs ping.exe
PID:1484 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13407⤵
- Runs ping.exe
PID:1660 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12107⤵
- Runs ping.exe
PID:1812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe7⤵PID:840
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe7⤵PID:580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe7⤵PID:1472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe7⤵PID:1532
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe7⤵PID:1120
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe7⤵PID:1564
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1040 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen5⤵PID:1728
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13405⤵
- Runs ping.exe
PID:1396 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13405⤵
- Runs ping.exe
PID:1836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe5⤵PID:1548
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12105⤵
- Runs ping.exe
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe5⤵PID:844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe5⤵PID:1056
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe5⤵PID:1480
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe5⤵PID:2120
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe5⤵PID:2280
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:528 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1464 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1344 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen3⤵PID:896
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13403⤵
- Runs ping.exe
PID:1336 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13403⤵
- Runs ping.exe
PID:1808 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12103⤵
- Runs ping.exe
PID:816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe3⤵PID:736
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe3⤵PID:2164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe3⤵PID:2224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe3⤵PID:2332
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe3⤵PID:2412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe3⤵PID:2476
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
1Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe
Filesize129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
76KB
MD59bb971deda6f4852d4f41b73cabf86d7
SHA1b1fbf99f8284fe4ce90d43ebb1d81fa034cfb2cf
SHA2568f4291a69140be5129f6382d7344033187606c9a2af20e5eeebe54ea38252a88
SHA5127a0b0c8e4c1342d9ebe365433a96ee5413eac74902c7d4ca3e576c98518196438444a77fdd59ab7ad380206b24a8609362d61c4325efe259305adbf40485a8e6
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
76KB
MD59bb971deda6f4852d4f41b73cabf86d7
SHA1b1fbf99f8284fe4ce90d43ebb1d81fa034cfb2cf
SHA2568f4291a69140be5129f6382d7344033187606c9a2af20e5eeebe54ea38252a88
SHA5127a0b0c8e4c1342d9ebe365433a96ee5413eac74902c7d4ca3e576c98518196438444a77fdd59ab7ad380206b24a8609362d61c4325efe259305adbf40485a8e6
-
Filesize
76KB
MD56619c3dd0bef13199bde2381c79c2235
SHA18d9c34b1c059ad3460a07deab3e7be7df7aa5f88
SHA2562f085d65571cdd337edad5d78628be80dd616f48fc27f532181015e9f91f7578
SHA51297f1be09fa81fdbb5c9ee5b4fd2ac8710815fd559cafd029e589632d7d8008601f1e413052741944ac59c8d74d97cf03a6af931bcc3cb2decaed52ebfee692dc
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\Users\Admin\AppData\Local\Temp\14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe
Filesize129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
\Users\Admin\AppData\Local\Temp\14d8559b94251c72bb4309432b43d8b8b5fdf2a78c58731ba008daccfc9a9cf9.exe
Filesize129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
76KB
MD59bb971deda6f4852d4f41b73cabf86d7
SHA1b1fbf99f8284fe4ce90d43ebb1d81fa034cfb2cf
SHA2568f4291a69140be5129f6382d7344033187606c9a2af20e5eeebe54ea38252a88
SHA5127a0b0c8e4c1342d9ebe365433a96ee5413eac74902c7d4ca3e576c98518196438444a77fdd59ab7ad380206b24a8609362d61c4325efe259305adbf40485a8e6
-
Filesize
76KB
MD59bb971deda6f4852d4f41b73cabf86d7
SHA1b1fbf99f8284fe4ce90d43ebb1d81fa034cfb2cf
SHA2568f4291a69140be5129f6382d7344033187606c9a2af20e5eeebe54ea38252a88
SHA5127a0b0c8e4c1342d9ebe365433a96ee5413eac74902c7d4ca3e576c98518196438444a77fdd59ab7ad380206b24a8609362d61c4325efe259305adbf40485a8e6
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
205KB
MD5f9eb67760b1142c35021575e6d2ccb6b
SHA16685035ebb767c1b7cc9093d193deb0ee04743af
SHA25687eb03c2821097a0ff4570a5774a9dd44b76fb8ebccdda9527188ca45c14f9d7
SHA512343e7b3b17b08c17df75e76bed5b102dd8d1b4c760b34f1936a0bc19091b99cb7dc0d0f06cb5c8a29fe5baae1b9741e193100347aa2666fb1e4a61a1f1c73a9b
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8