Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
240s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe
Resource
win10v2004-20220812-en
General
-
Target
6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe
-
Size
205KB
-
MD5
22b20ae43f73b7b108458323817c6866
-
SHA1
1b406f493917fecc54a6534c059f495d43fda46d
-
SHA256
6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234
-
SHA512
b43f752a15b05052c71c6e5dc5a2be00b9e2caa49b5c2b2d9d506e3506e78eab42271f451c2e898691ea160d2f429be7b22c6abd7b94c787ee82a847b3d539d2
-
SSDEEP
3072:bqhMPssRhlARSOsdwD/98out3SDADeak7dJHB/AKG:bqhMPssRARoiSoS3SsQLH5AK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csna.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csna.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csna.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe -
Disables RegEdit via registry modification 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 53 IoCs
pid Process 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 1852 csrss.exe 1736 csrss.exe 768 csrss.exe 1296 csrss.exe 1672 csna.exe 1764 smss.exe 2028 smss.exe 1112 csrss.exe 1124 csrss.exe 1464 smss.exe 1316 smss.exe 1600 lsass.exe 2008 smss.exe 1276 smss.exe 292 lsass.exe 1588 lsass.exe 664 services.exe 1648 services.exe 908 lsass.exe 1364 lsass.exe 1256 lsass.exe 876 services.exe 844 services.exe 1916 services.exe 800 winlogon.exe 1128 winlogon.exe 1360 services.exe 1488 winlogon.exe 1112 winlogon.exe 936 winlogon.exe 1824 ~Paraysutki_VM_Community~ 1608 ~Paraysutki_VM_Community~ 620 ~Paraysutki_VM_Community~ 2012 winlogon.exe 1628 csrss.exe 1908 csrss.exe 1240 csrss.exe 1084 smss.exe 1544 csrss.exe 1192 csrss.exe 1548 csrss.exe 1604 smss.exe 1648 smss.exe 560 smss.exe 1784 lsass.exe 1548 smss.exe 288 lsass.exe 1528 smss.exe 1176 lsass.exe 1824 services.exe 664 lsass.exe 800 lsass.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "rundll32.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe\Debugger = "cmd.exe /c del" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe\Debugger = "rundll32.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe\Debugger = "cmd.exe /c del" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rundll32.exe" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe\Debugger = "cmd.exe /c del" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe\Debugger = "cmd.exe /c del" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "rundll32.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe\Debugger = "cmd.exe /c del" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETUP.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Instal.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe -
Loads dropped DLL 64 IoCs
pid Process 1972 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 1972 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1736 csrss.exe 1736 csrss.exe 1736 csrss.exe 768 csrss.exe 768 csrss.exe 1296 csrss.exe 768 csrss.exe 768 csrss.exe 1736 csrss.exe 1736 csrss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 2028 smss.exe 2028 smss.exe 2028 smss.exe 1112 csrss.exe 1112 csrss.exe 1124 csrss.exe 2028 smss.exe 2028 smss.exe 1464 smss.exe 1464 smss.exe 1316 smss.exe 2028 smss.exe 2028 smss.exe 1600 lsass.exe 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 2008 smss.exe 2008 smss.exe 1276 smss.exe 1736 csrss.exe 1736 csrss.exe 2028 smss.exe 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 1736 csrss.exe 292 lsass.exe 1736 csrss.exe 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 2028 smss.exe 1588 lsass.exe 664 services.exe 1648 services.exe 1588 lsass.exe 1600 lsass.exe 292 lsass.exe 908 lsass.exe 1256 lsass.exe 1364 lsass.exe 1648 services.exe 664 services.exe 1648 services.exe 664 services.exe 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 1736 csrss.exe 2028 smss.exe -
Adds Run key to start application 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run csna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" csna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: csna.exe File opened (read-only) \??\J: csna.exe File opened (read-only) \??\L: csna.exe File opened (read-only) \??\N: csna.exe File opened (read-only) \??\O: csna.exe File opened (read-only) \??\W: csna.exe File opened (read-only) \??\G: csna.exe File opened (read-only) \??\H: csna.exe File opened (read-only) \??\I: csna.exe File opened (read-only) \??\U: csna.exe File opened (read-only) \??\V: csna.exe File opened (read-only) \??\X: csna.exe File opened (read-only) \??\B: csna.exe File opened (read-only) \??\F: csna.exe File opened (read-only) \??\P: csna.exe File opened (read-only) \??\S: csna.exe File opened (read-only) \??\T: csna.exe File opened (read-only) \??\Z: csna.exe File opened (read-only) \??\E: csna.exe File opened (read-only) \??\K: csna.exe File opened (read-only) \??\M: csna.exe File opened (read-only) \??\Q: csna.exe File opened (read-only) \??\R: csna.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe csrss.exe File created \??\c:\windows\SysWOW64\Windows 3D.scr csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ csrss.exe -
Drops file in Program Files directory 34 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe csna.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe csna.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPDMC.exe csna.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe csna.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe csna.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe csna.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe csna.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe csna.exe File opened for modification \??\c:\Program Files\Windows Mail\wab.exe csna.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe csna.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe csna.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe csna.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe csna.exe File opened for modification \??\c:\Program Files\Windows Defender\MSASCui.exe csna.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe csna.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-hang-ui.exe csna.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe csna.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe csna.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe csna.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe csna.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe csna.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe csna.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe csna.exe File opened for modification \??\c:\Program Files\Windows Journal\PDIALOG.exe csna.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe csna.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPSideShowGadget.exe csna.exe File opened for modification \??\c:\Program Files\Windows Defender\MpCmdRun.exe csna.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe csna.exe File opened for modification \??\c:\Program Files\Windows Sidebar\sidebar.exe csna.exe File opened for modification \??\c:\Program Files\7-Zip\7zG.exe csna.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe csna.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe csna.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpenc.exe csna.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe csna.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" smss.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" csrss.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe -
Modifies registry class 42 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt csna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" csna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" csna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command csna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm csna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" csna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon csna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command csna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" csna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" csna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" csna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon csna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt csna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd csna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile smss.exe -
Runs ping.exe 1 TTPs 9 IoCs
pid Process 912 ping.exe 620 ping.exe 1616 ping.exe 1464 ping.exe 1800 ping.exe 1584 ping.exe 1536 ping.exe 1680 ping.exe 1476 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1764 smss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1852 csrss.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe 1600 lsass.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 1972 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 1852 csrss.exe 1736 csrss.exe 768 csrss.exe 1296 csrss.exe 1672 csna.exe 1764 smss.exe 2028 smss.exe 1112 csrss.exe 1124 csrss.exe 1464 smss.exe 1316 smss.exe 1600 lsass.exe 2008 smss.exe 1276 smss.exe 292 lsass.exe 1648 services.exe 1588 lsass.exe 664 services.exe 1364 lsass.exe 1256 lsass.exe 908 lsass.exe 844 services.exe 876 services.exe 1916 services.exe 800 winlogon.exe 1128 winlogon.exe 1360 services.exe 1488 winlogon.exe 936 winlogon.exe 1112 winlogon.exe 620 ~Paraysutki_VM_Community~ 1824 ~Paraysutki_VM_Community~ 1608 ~Paraysutki_VM_Community~ 1628 csrss.exe 1908 csrss.exe 1240 csrss.exe 1084 smss.exe 1544 csrss.exe 2012 winlogon.exe 1192 csrss.exe 1548 csrss.exe 1604 smss.exe 1648 smss.exe 560 smss.exe 1784 lsass.exe 1548 smss.exe 288 lsass.exe 1176 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1176 1972 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 28 PID 1972 wrote to memory of 1176 1972 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 28 PID 1972 wrote to memory of 1176 1972 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 28 PID 1972 wrote to memory of 1176 1972 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 28 PID 1176 wrote to memory of 1852 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 29 PID 1176 wrote to memory of 1852 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 29 PID 1176 wrote to memory of 1852 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 29 PID 1176 wrote to memory of 1852 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 29 PID 1852 wrote to memory of 1736 1852 csrss.exe 30 PID 1852 wrote to memory of 1736 1852 csrss.exe 30 PID 1852 wrote to memory of 1736 1852 csrss.exe 30 PID 1852 wrote to memory of 1736 1852 csrss.exe 30 PID 1736 wrote to memory of 768 1736 csrss.exe 31 PID 1736 wrote to memory of 768 1736 csrss.exe 31 PID 1736 wrote to memory of 768 1736 csrss.exe 31 PID 1736 wrote to memory of 768 1736 csrss.exe 31 PID 768 wrote to memory of 1296 768 csrss.exe 32 PID 768 wrote to memory of 1296 768 csrss.exe 32 PID 768 wrote to memory of 1296 768 csrss.exe 32 PID 768 wrote to memory of 1296 768 csrss.exe 32 PID 768 wrote to memory of 1672 768 csrss.exe 33 PID 768 wrote to memory of 1672 768 csrss.exe 33 PID 768 wrote to memory of 1672 768 csrss.exe 33 PID 768 wrote to memory of 1672 768 csrss.exe 33 PID 1736 wrote to memory of 1764 1736 csrss.exe 34 PID 1736 wrote to memory of 1764 1736 csrss.exe 34 PID 1736 wrote to memory of 1764 1736 csrss.exe 34 PID 1736 wrote to memory of 1764 1736 csrss.exe 34 PID 1764 wrote to memory of 2028 1764 smss.exe 35 PID 1764 wrote to memory of 2028 1764 smss.exe 35 PID 1764 wrote to memory of 2028 1764 smss.exe 35 PID 1764 wrote to memory of 2028 1764 smss.exe 35 PID 2028 wrote to memory of 1112 2028 smss.exe 36 PID 2028 wrote to memory of 1112 2028 smss.exe 36 PID 2028 wrote to memory of 1112 2028 smss.exe 36 PID 2028 wrote to memory of 1112 2028 smss.exe 36 PID 1112 wrote to memory of 1124 1112 csrss.exe 37 PID 1112 wrote to memory of 1124 1112 csrss.exe 37 PID 1112 wrote to memory of 1124 1112 csrss.exe 37 PID 1112 wrote to memory of 1124 1112 csrss.exe 37 PID 2028 wrote to memory of 1464 2028 smss.exe 38 PID 2028 wrote to memory of 1464 2028 smss.exe 38 PID 2028 wrote to memory of 1464 2028 smss.exe 38 PID 2028 wrote to memory of 1464 2028 smss.exe 38 PID 1464 wrote to memory of 1316 1464 smss.exe 39 PID 1464 wrote to memory of 1316 1464 smss.exe 39 PID 1464 wrote to memory of 1316 1464 smss.exe 39 PID 1464 wrote to memory of 1316 1464 smss.exe 39 PID 2028 wrote to memory of 1600 2028 smss.exe 40 PID 2028 wrote to memory of 1600 2028 smss.exe 40 PID 2028 wrote to memory of 1600 2028 smss.exe 40 PID 2028 wrote to memory of 1600 2028 smss.exe 40 PID 1176 wrote to memory of 2008 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 41 PID 1176 wrote to memory of 2008 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 41 PID 1176 wrote to memory of 2008 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 41 PID 1176 wrote to memory of 2008 1176 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe 41 PID 2008 wrote to memory of 1276 2008 smss.exe 42 PID 2008 wrote to memory of 1276 2008 smss.exe 42 PID 2008 wrote to memory of 1276 2008 smss.exe 42 PID 2008 wrote to memory of 1276 2008 smss.exe 42 PID 1736 wrote to memory of 292 1736 csrss.exe 43 PID 1736 wrote to memory of 292 1736 csrss.exe 43 PID 1736 wrote to memory of 292 1736 csrss.exe 43 PID 1736 wrote to memory of 292 1736 csrss.exe 43 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe"C:\Users\Admin\AppData\Local\Temp\6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exeC:\Users\Admin\AppData\Local\Temp\6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1176 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe4⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1736 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe5⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\csna.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\csna.exe" csrss6⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe6⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2028 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1124
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1364 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1240 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1176 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe10⤵
- Executes dropped EXE
PID:800
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe9⤵PID:876
-
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:800 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1488 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe10⤵
- Executes dropped EXE
PID:1528
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe9⤵
- Executes dropped EXE
PID:664 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe10⤵PID:1828
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe9⤵PID:1712
-
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1824
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen7⤵PID:556
-
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13407⤵
- Runs ping.exe
PID:1680
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe7⤵PID:1124
-
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12107⤵
- Runs ping.exe
PID:1616
-
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13407⤵
- Runs ping.exe
PID:1476
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe7⤵PID:1852
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe7⤵PID:1132
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe7⤵PID:936
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe7⤵PID:1152
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe7⤵PID:1868
-
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:292 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1256
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:664 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:288
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe7⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe8⤵PID:1396
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe7⤵PID:1612
-
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1128 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1112
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen5⤵PID:1888
-
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13405⤵
- Runs ping.exe
PID:1464
-
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13405⤵
- Runs ping.exe
PID:912
-
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12105⤵
- Runs ping.exe
PID:1800
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe5⤵PID:1636
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe5⤵PID:1976
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe5⤵PID:800
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe5⤵PID:652
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe5⤵PID:1332
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe5⤵PID:1712
-
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1276
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:908
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:620
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen3⤵PID:964
-
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13403⤵
- Runs ping.exe
PID:1584
-
-
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13403⤵
- Runs ping.exe
PID:1536
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe3⤵PID:1868
-
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12103⤵
- Runs ping.exe
PID:620
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe3⤵PID:876
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe3⤵PID:1916
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe3⤵PID:828
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe3⤵PID:1396
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe3⤵PID:1820
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
1Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe
Filesize129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
76KB
MD57c8b8098d704fd7db426505773d11ec5
SHA11d7f868fbbf997548fb661e47a89607c09c01c20
SHA256859ab616daec6fcede5f50178c46e525d6a1cdf6b3f316d1bc5daa16f00094ac
SHA51298fe09066ae4227852ec6979de4999c211dfdae40bd6eb0f74eefa0c52e0a2bc06c8c14bfafe2ecea9cfa142d6e84c5d38eb2acc0a56b519d243fd1234dc98d1
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
76KB
MD57c8b8098d704fd7db426505773d11ec5
SHA11d7f868fbbf997548fb661e47a89607c09c01c20
SHA256859ab616daec6fcede5f50178c46e525d6a1cdf6b3f316d1bc5daa16f00094ac
SHA51298fe09066ae4227852ec6979de4999c211dfdae40bd6eb0f74eefa0c52e0a2bc06c8c14bfafe2ecea9cfa142d6e84c5d38eb2acc0a56b519d243fd1234dc98d1
-
Filesize
76KB
MD5a3a04743085c51bd659c87a7b6b296e0
SHA194b6821c1a9022a6fd6d32cddf27fa3bfa84dd60
SHA256a790744eb05a3b400969e37ee4a8396f7aa6daae1553e47941e56275d8c58996
SHA512c2e5c384bc426cab44d4de6680a5a2fcb6b0f30dc84d269328e2937557f5743a3b9be32911d0d25e63134ba1e0cf289d116d6423fac556e85e327f6971572369
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\Users\Admin\AppData\Local\Temp\6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe
Filesize129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
\Users\Admin\AppData\Local\Temp\6cb93200c651327443e766c98a6dff8a7a3c6af3bd2acc266d451fb41be10234.exe
Filesize129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
76KB
MD57c8b8098d704fd7db426505773d11ec5
SHA11d7f868fbbf997548fb661e47a89607c09c01c20
SHA256859ab616daec6fcede5f50178c46e525d6a1cdf6b3f316d1bc5daa16f00094ac
SHA51298fe09066ae4227852ec6979de4999c211dfdae40bd6eb0f74eefa0c52e0a2bc06c8c14bfafe2ecea9cfa142d6e84c5d38eb2acc0a56b519d243fd1234dc98d1
-
Filesize
76KB
MD57c8b8098d704fd7db426505773d11ec5
SHA11d7f868fbbf997548fb661e47a89607c09c01c20
SHA256859ab616daec6fcede5f50178c46e525d6a1cdf6b3f316d1bc5daa16f00094ac
SHA51298fe09066ae4227852ec6979de4999c211dfdae40bd6eb0f74eefa0c52e0a2bc06c8c14bfafe2ecea9cfa142d6e84c5d38eb2acc0a56b519d243fd1234dc98d1
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
205KB
MD5ac1d74547bdedcbc7cf3d0468a0f0274
SHA1aed1a6b2ad72bacd569555a8c3fc8a6b424f8d32
SHA2568664b32ca05f284740f6d22dffb4e5efb51db2141c645cf4d23d29bd84b3a61e
SHA5126d08ae1df05efe877252f5f4bc3608d825c16b9e737d39effbf99b577ed1f95340ede8c2ad593d8c252e6a78e0cc939cd74cd066a70c1a92e58cf421c6dd646d
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8