Analysis
-
max time kernel
190s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 06:53
Behavioral task
behavioral1
Sample
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe
Resource
win10v2004-20221111-en
General
-
Target
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe
-
Size
42KB
-
MD5
a74fe7c347e88d87ab704086bc6cba7e
-
SHA1
555cd82d2d7c2852c495cea5107fe3c363724783
-
SHA256
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655
-
SHA512
9740ec82128b0002e0a6d4439f7d41e671dd934f501bf09a12c6ed55618b815364ad17751084ec656c528743e8615af85021c859440eff35205a36092f75554c
-
SSDEEP
768:gyz0/XBwayCUOwV3TNZHdrPeqzEWvpbPwSMX6+w6pqZxLdeVgol9D8888888888q:hzOCay4wV339rPjzbpLwRJ9pSdoIT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
Processes:
CTFMON.EXESPOOLSV.EXESVCHOST.EXEda9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
Processes:
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exeCTFMON.EXESPOOLSV.EXESVCHOST.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
Processes:
SVCHOST.EXEda9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exeCTFMON.EXESPOOLSV.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CTFMON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SPOOLSV.EXE -
Processes:
resource yara_rule C:\Recycled\SVCHOST.EXE aspack_v212_v242 C:\recycled\SVCHOST.EXE aspack_v212_v242 C:\Windows\Fonts\ Explorer.exe aspack_v212_v242 C:\Recycled\SVCHOST.EXE aspack_v212_v242 C:\Recycled\SPOOLSV.EXE aspack_v212_v242 C:\recycled\SPOOLSV.EXE aspack_v212_v242 C:\Recycled\SVCHOST.EXE aspack_v212_v242 C:\Windows\Fonts\ Explorer.exe aspack_v212_v242 C:\Recycled\SPOOLSV.EXE aspack_v212_v242 C:\Recycled\CTFMON.EXE aspack_v212_v242 C:\recycled\CTFMON.EXE aspack_v212_v242 C:\Windows\Fonts\ Explorer.exe aspack_v212_v242 C:\Recycled\SVCHOST.EXE aspack_v212_v242 C:\Recycled\SPOOLSV.EXE aspack_v212_v242 C:\Recycled\CTFMON.EXE aspack_v212_v242 C:\Recycled\CTFMON.EXE aspack_v212_v242 C:\Recycled\SPOOLSV.EXE aspack_v212_v242 C:\Recycled\CTFMON.EXE aspack_v212_v242 C:\Recycled\SVCHOST.EXE aspack_v212_v242 C:\Recycled\SPOOLSV.EXE aspack_v212_v242 C:\Recycled\CTFMON.EXE aspack_v212_v242 -
Executes dropped EXE 15 IoCs
Processes:
SVCHOST.EXESVCHOST.EXESPOOLSV.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXECTFMON.EXESPOOLSV.EXECTFMON.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXEpid process 1536 SVCHOST.EXE 504 SVCHOST.EXE 3724 SPOOLSV.EXE 5056 SVCHOST.EXE 816 SPOOLSV.EXE 3852 CTFMON.EXE 680 SVCHOST.EXE 1188 SPOOLSV.EXE 4372 CTFMON.EXE 2760 CTFMON.EXE 1120 SPOOLSV.EXE 2968 CTFMON.EXE 3448 SVCHOST.EXE 1556 SPOOLSV.EXE 1656 CTFMON.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exedescription ioc process File opened for modification C:\Recycled\desktop.ini da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exeSPOOLSV.EXECTFMON.EXESVCHOST.EXEdescription ioc process File opened (read-only) \??\T: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\V: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\O: SPOOLSV.EXE File opened (read-only) \??\N: CTFMON.EXE File opened (read-only) \??\F: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\J: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\O: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\Q: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\O: CTFMON.EXE File opened (read-only) \??\P: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\S: SVCHOST.EXE File opened (read-only) \??\S: CTFMON.EXE File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\Y: SPOOLSV.EXE File opened (read-only) \??\U: SVCHOST.EXE File opened (read-only) \??\N: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\Y: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\Z: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\E: SVCHOST.EXE File opened (read-only) \??\E: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\M: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\M: SPOOLSV.EXE File opened (read-only) \??\X: SVCHOST.EXE File opened (read-only) \??\L: SPOOLSV.EXE File opened (read-only) \??\P: SPOOLSV.EXE File opened (read-only) \??\U: SPOOLSV.EXE File opened (read-only) \??\H: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\R: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened (read-only) \??\G: SVCHOST.EXE File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\W: CTFMON.EXE File opened (read-only) \??\T: SPOOLSV.EXE File opened (read-only) \??\L: CTFMON.EXE File opened (read-only) \??\Z: SPOOLSV.EXE File opened (read-only) \??\P: CTFMON.EXE File opened (read-only) \??\F: SVCHOST.EXE File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\W: SPOOLSV.EXE File opened (read-only) \??\X: SPOOLSV.EXE File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\E: CTFMON.EXE File opened (read-only) \??\J: CTFMON.EXE File opened (read-only) \??\R: SPOOLSV.EXE File opened (read-only) \??\H: CTFMON.EXE File opened (read-only) \??\Q: CTFMON.EXE File opened (read-only) \??\U: CTFMON.EXE File opened (read-only) \??\M: SVCHOST.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\F: SPOOLSV.EXE File opened (read-only) \??\J: SPOOLSV.EXE File opened (read-only) \??\F: CTFMON.EXE File opened (read-only) \??\G: CTFMON.EXE File opened (read-only) \??\I: CTFMON.EXE File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\N: SPOOLSV.EXE File opened (read-only) \??\V: SPOOLSV.EXE File opened (read-only) \??\L: SVCHOST.EXE File opened (read-only) \??\E: SPOOLSV.EXE File opened (read-only) \??\I: SPOOLSV.EXE File opened (read-only) \??\Z: CTFMON.EXE File opened (read-only) \??\S: da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe -
Drops file in Program Files directory 1 IoCs
Processes:
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\Root\VFS\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\docicon.exe da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe -
Drops file in Windows directory 4 IoCs
Processes:
SPOOLSV.EXECTFMON.EXEda9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exeSVCHOST.EXEdescription ioc process File opened for modification C:\Windows\Fonts\ Explorer.exe SPOOLSV.EXE File opened for modification C:\Windows\Fonts\ Explorer.exe CTFMON.EXE File opened for modification C:\Windows\Fonts\ Explorer.exe da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe File opened for modification C:\Windows\Fonts\ Explorer.exe SVCHOST.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 29 IoCs
Processes:
SVCHOST.EXEda9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exeSPOOLSV.EXECTFMON.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\InfoTip = "prop:Type;Write;Size" da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\TileInfo = "prop:Type;Size" CTFMON.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL\COMMAND da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\QuickTip = "prop:Type;Size" da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG\COMMAND da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\QuickTip = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\QuickTip = "prop:Type;Size" CTFMON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\TileInfo = "prop:Type;Size" da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\TileInfo = "prop:Type;Size" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" CTFMON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\InfoTip = "prop:Type;Write;Size" CTFMON.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exeSPOOLSV.EXECTFMON.EXEpid process 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3852 CTFMON.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE 3724 SPOOLSV.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exeSVCHOST.EXESVCHOST.EXESPOOLSV.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXECTFMON.EXESPOOLSV.EXECTFMON.EXESVCHOST.EXESPOOLSV.EXECTFMON.EXEpid process 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe 1536 SVCHOST.EXE 504 SVCHOST.EXE 3724 SPOOLSV.EXE 5056 SVCHOST.EXE 816 SPOOLSV.EXE 3852 CTFMON.EXE 680 SVCHOST.EXE 1188 SPOOLSV.EXE 4372 CTFMON.EXE 2760 CTFMON.EXE 1120 SPOOLSV.EXE 2968 CTFMON.EXE 3448 SVCHOST.EXE 1556 SPOOLSV.EXE 1656 CTFMON.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exeSVCHOST.EXESPOOLSV.EXECTFMON.EXEdescription pid process target process PID 2064 wrote to memory of 1536 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SVCHOST.EXE PID 2064 wrote to memory of 1536 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SVCHOST.EXE PID 2064 wrote to memory of 1536 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SVCHOST.EXE PID 1536 wrote to memory of 504 1536 SVCHOST.EXE SVCHOST.EXE PID 1536 wrote to memory of 504 1536 SVCHOST.EXE SVCHOST.EXE PID 1536 wrote to memory of 504 1536 SVCHOST.EXE SVCHOST.EXE PID 1536 wrote to memory of 3724 1536 SVCHOST.EXE SPOOLSV.EXE PID 1536 wrote to memory of 3724 1536 SVCHOST.EXE SPOOLSV.EXE PID 1536 wrote to memory of 3724 1536 SVCHOST.EXE SPOOLSV.EXE PID 3724 wrote to memory of 5056 3724 SPOOLSV.EXE SVCHOST.EXE PID 3724 wrote to memory of 5056 3724 SPOOLSV.EXE SVCHOST.EXE PID 3724 wrote to memory of 5056 3724 SPOOLSV.EXE SVCHOST.EXE PID 3724 wrote to memory of 816 3724 SPOOLSV.EXE SPOOLSV.EXE PID 3724 wrote to memory of 816 3724 SPOOLSV.EXE SPOOLSV.EXE PID 3724 wrote to memory of 816 3724 SPOOLSV.EXE SPOOLSV.EXE PID 3724 wrote to memory of 3852 3724 SPOOLSV.EXE CTFMON.EXE PID 3724 wrote to memory of 3852 3724 SPOOLSV.EXE CTFMON.EXE PID 3724 wrote to memory of 3852 3724 SPOOLSV.EXE CTFMON.EXE PID 3852 wrote to memory of 680 3852 CTFMON.EXE SVCHOST.EXE PID 3852 wrote to memory of 680 3852 CTFMON.EXE SVCHOST.EXE PID 3852 wrote to memory of 680 3852 CTFMON.EXE SVCHOST.EXE PID 3852 wrote to memory of 1188 3852 CTFMON.EXE SPOOLSV.EXE PID 3852 wrote to memory of 1188 3852 CTFMON.EXE SPOOLSV.EXE PID 3852 wrote to memory of 1188 3852 CTFMON.EXE SPOOLSV.EXE PID 3852 wrote to memory of 4372 3852 CTFMON.EXE CTFMON.EXE PID 3852 wrote to memory of 4372 3852 CTFMON.EXE CTFMON.EXE PID 3852 wrote to memory of 4372 3852 CTFMON.EXE CTFMON.EXE PID 1536 wrote to memory of 2760 1536 SVCHOST.EXE CTFMON.EXE PID 1536 wrote to memory of 2760 1536 SVCHOST.EXE CTFMON.EXE PID 1536 wrote to memory of 2760 1536 SVCHOST.EXE CTFMON.EXE PID 2064 wrote to memory of 1120 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SPOOLSV.EXE PID 2064 wrote to memory of 1120 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SPOOLSV.EXE PID 2064 wrote to memory of 1120 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SPOOLSV.EXE PID 2064 wrote to memory of 2968 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe CTFMON.EXE PID 2064 wrote to memory of 2968 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe CTFMON.EXE PID 2064 wrote to memory of 2968 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe CTFMON.EXE PID 2064 wrote to memory of 3448 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SVCHOST.EXE PID 2064 wrote to memory of 3448 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SVCHOST.EXE PID 2064 wrote to memory of 3448 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SVCHOST.EXE PID 2064 wrote to memory of 1556 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SPOOLSV.EXE PID 2064 wrote to memory of 1556 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SPOOLSV.EXE PID 2064 wrote to memory of 1556 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe SPOOLSV.EXE PID 2064 wrote to memory of 1656 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe CTFMON.EXE PID 2064 wrote to memory of 1656 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe CTFMON.EXE PID 2064 wrote to memory of 1656 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe CTFMON.EXE PID 2064 wrote to memory of 1684 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe WINWORD.EXE PID 2064 wrote to memory of 1684 2064 da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe"C:\Users\Admin\AppData\Local\Temp\da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\recycled\CTFMON.EXEC:\recycled\CTFMON.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\da9891077bbcb9a1ceb6f0454196cceb1176e2b02375fd2f08290f5ba1df4655.doc" /o ""2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Recycled\CTFMON.EXEFilesize
42KB
MD55e355df1492bd6a06e094dec4aad6203
SHA16ad6375597561b8ee880452e28f26c10e1f04935
SHA2567756603dae66457b7bcae66e8e50561377cd8b94f190fe8b58dd8bf9c7cea949
SHA5129cd399200af38dbb7e3d1b7d0b9e9ed8486c4c48109649360776e46112e901f751e6c4d30422fff853a75648ec7a264b3eb37600fd7d6b44d2a86c4174a232a3
-
C:\Recycled\CTFMON.EXEFilesize
42KB
MD55e355df1492bd6a06e094dec4aad6203
SHA16ad6375597561b8ee880452e28f26c10e1f04935
SHA2567756603dae66457b7bcae66e8e50561377cd8b94f190fe8b58dd8bf9c7cea949
SHA5129cd399200af38dbb7e3d1b7d0b9e9ed8486c4c48109649360776e46112e901f751e6c4d30422fff853a75648ec7a264b3eb37600fd7d6b44d2a86c4174a232a3
-
C:\Recycled\CTFMON.EXEFilesize
42KB
MD55e355df1492bd6a06e094dec4aad6203
SHA16ad6375597561b8ee880452e28f26c10e1f04935
SHA2567756603dae66457b7bcae66e8e50561377cd8b94f190fe8b58dd8bf9c7cea949
SHA5129cd399200af38dbb7e3d1b7d0b9e9ed8486c4c48109649360776e46112e901f751e6c4d30422fff853a75648ec7a264b3eb37600fd7d6b44d2a86c4174a232a3
-
C:\Recycled\CTFMON.EXEFilesize
42KB
MD55e355df1492bd6a06e094dec4aad6203
SHA16ad6375597561b8ee880452e28f26c10e1f04935
SHA2567756603dae66457b7bcae66e8e50561377cd8b94f190fe8b58dd8bf9c7cea949
SHA5129cd399200af38dbb7e3d1b7d0b9e9ed8486c4c48109649360776e46112e901f751e6c4d30422fff853a75648ec7a264b3eb37600fd7d6b44d2a86c4174a232a3
-
C:\Recycled\CTFMON.EXEFilesize
42KB
MD55e355df1492bd6a06e094dec4aad6203
SHA16ad6375597561b8ee880452e28f26c10e1f04935
SHA2567756603dae66457b7bcae66e8e50561377cd8b94f190fe8b58dd8bf9c7cea949
SHA5129cd399200af38dbb7e3d1b7d0b9e9ed8486c4c48109649360776e46112e901f751e6c4d30422fff853a75648ec7a264b3eb37600fd7d6b44d2a86c4174a232a3
-
C:\Recycled\SPOOLSV.EXEFilesize
42KB
MD5b957f36c572f220e27195f073605c83b
SHA1492fcc642aa26010dd25f14f665a44be945af319
SHA2562f1a14073b2a2087c4eaa75101c8f50a01c7778858ff9b87120fad57a1c1722d
SHA512d3c16ab084d29d46400036954e76af89ca67f643673d7fc5620fde0776256ec3b9564c3a1438248fe66066f6cb3678c72b6646ec3797406fbf2cd6e478d2a5d9
-
C:\Recycled\SPOOLSV.EXEFilesize
42KB
MD5b957f36c572f220e27195f073605c83b
SHA1492fcc642aa26010dd25f14f665a44be945af319
SHA2562f1a14073b2a2087c4eaa75101c8f50a01c7778858ff9b87120fad57a1c1722d
SHA512d3c16ab084d29d46400036954e76af89ca67f643673d7fc5620fde0776256ec3b9564c3a1438248fe66066f6cb3678c72b6646ec3797406fbf2cd6e478d2a5d9
-
C:\Recycled\SPOOLSV.EXEFilesize
42KB
MD5b957f36c572f220e27195f073605c83b
SHA1492fcc642aa26010dd25f14f665a44be945af319
SHA2562f1a14073b2a2087c4eaa75101c8f50a01c7778858ff9b87120fad57a1c1722d
SHA512d3c16ab084d29d46400036954e76af89ca67f643673d7fc5620fde0776256ec3b9564c3a1438248fe66066f6cb3678c72b6646ec3797406fbf2cd6e478d2a5d9
-
C:\Recycled\SPOOLSV.EXEFilesize
42KB
MD5b957f36c572f220e27195f073605c83b
SHA1492fcc642aa26010dd25f14f665a44be945af319
SHA2562f1a14073b2a2087c4eaa75101c8f50a01c7778858ff9b87120fad57a1c1722d
SHA512d3c16ab084d29d46400036954e76af89ca67f643673d7fc5620fde0776256ec3b9564c3a1438248fe66066f6cb3678c72b6646ec3797406fbf2cd6e478d2a5d9
-
C:\Recycled\SPOOLSV.EXEFilesize
42KB
MD5b957f36c572f220e27195f073605c83b
SHA1492fcc642aa26010dd25f14f665a44be945af319
SHA2562f1a14073b2a2087c4eaa75101c8f50a01c7778858ff9b87120fad57a1c1722d
SHA512d3c16ab084d29d46400036954e76af89ca67f643673d7fc5620fde0776256ec3b9564c3a1438248fe66066f6cb3678c72b6646ec3797406fbf2cd6e478d2a5d9
-
C:\Recycled\SVCHOST.EXEFilesize
42KB
MD5827df1991a839a38b6abf440241a8ee9
SHA1c3c533e0d77c41be39e532c98c837408b9625113
SHA25624dbdc44ba53e5e0a520700e94c83bfbcbedf399bf674ebd455c6b68df2f8d1c
SHA5121acfa9c2ea96de9141dd4ab30dec1ff10b3b3bf0c4a96987f99668264263409153fbcb559a8728af35d6c854c4230ff31922681d528b6b0cfa98b6e818109052
-
C:\Recycled\SVCHOST.EXEFilesize
42KB
MD5827df1991a839a38b6abf440241a8ee9
SHA1c3c533e0d77c41be39e532c98c837408b9625113
SHA25624dbdc44ba53e5e0a520700e94c83bfbcbedf399bf674ebd455c6b68df2f8d1c
SHA5121acfa9c2ea96de9141dd4ab30dec1ff10b3b3bf0c4a96987f99668264263409153fbcb559a8728af35d6c854c4230ff31922681d528b6b0cfa98b6e818109052
-
C:\Recycled\SVCHOST.EXEFilesize
42KB
MD5827df1991a839a38b6abf440241a8ee9
SHA1c3c533e0d77c41be39e532c98c837408b9625113
SHA25624dbdc44ba53e5e0a520700e94c83bfbcbedf399bf674ebd455c6b68df2f8d1c
SHA5121acfa9c2ea96de9141dd4ab30dec1ff10b3b3bf0c4a96987f99668264263409153fbcb559a8728af35d6c854c4230ff31922681d528b6b0cfa98b6e818109052
-
C:\Recycled\SVCHOST.EXEFilesize
42KB
MD5827df1991a839a38b6abf440241a8ee9
SHA1c3c533e0d77c41be39e532c98c837408b9625113
SHA25624dbdc44ba53e5e0a520700e94c83bfbcbedf399bf674ebd455c6b68df2f8d1c
SHA5121acfa9c2ea96de9141dd4ab30dec1ff10b3b3bf0c4a96987f99668264263409153fbcb559a8728af35d6c854c4230ff31922681d528b6b0cfa98b6e818109052
-
C:\Recycled\SVCHOST.EXEFilesize
42KB
MD5827df1991a839a38b6abf440241a8ee9
SHA1c3c533e0d77c41be39e532c98c837408b9625113
SHA25624dbdc44ba53e5e0a520700e94c83bfbcbedf399bf674ebd455c6b68df2f8d1c
SHA5121acfa9c2ea96de9141dd4ab30dec1ff10b3b3bf0c4a96987f99668264263409153fbcb559a8728af35d6c854c4230ff31922681d528b6b0cfa98b6e818109052
-
C:\Users\Admin\AppData\Local\Temp\Flu Burung.txtFilesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
C:\Users\Admin\AppData\Local\Temp\Flu Burung.txtFilesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
C:\Users\Admin\AppData\Local\Temp\Flu Burung.txtFilesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
C:\Windows\Fonts\ Explorer.exeFilesize
42KB
MD5c64732d4446f5a379a7e9519d83933d5
SHA1f4845731be25936d25a14bcf3623929477340073
SHA256d54b6c6ff1eaae7aa93c46a241811cfbbd564b43ab7cdd4da49656e19aef3e14
SHA5127e99f98027214662ed8fc5521846a5e2c070fddc33db29fbd1e3030e63ee06f1d1896cb922c5506129a5f12d5377d409188ee6f6e0717352778383f8e89ad59c
-
C:\Windows\Fonts\ Explorer.exeFilesize
42KB
MD58b15dfe51d27fc6a14794bcf21919851
SHA1345c2722deb52c0b945f5f0a885cae34100d3d2c
SHA256e02e20ec3b2d5f7d9c5831a70aaac5d54974903c16cfdd47544f111351eea74f
SHA5120651a63fd53c0ebadeb27d89d9c520e3bdb062db7ef11b683ab329e59599f3eebb869a56e6cc56f838276b0df1f540569f5e2be94ab19e08eb08c1f00a34c703
-
C:\Windows\Fonts\ Explorer.exeFilesize
42KB
MD58b15dfe51d27fc6a14794bcf21919851
SHA1345c2722deb52c0b945f5f0a885cae34100d3d2c
SHA256e02e20ec3b2d5f7d9c5831a70aaac5d54974903c16cfdd47544f111351eea74f
SHA5120651a63fd53c0ebadeb27d89d9c520e3bdb062db7ef11b683ab329e59599f3eebb869a56e6cc56f838276b0df1f540569f5e2be94ab19e08eb08c1f00a34c703
-
C:\begolu.txtFilesize
2B
MD52b9d4fa85c8e82132bde46b143040142
SHA1a02431cf7c501a5b368c91e41283419d8fa9fb03
SHA2564658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142
SHA512c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be
-
C:\recycled\CTFMON.EXEFilesize
42KB
MD55e355df1492bd6a06e094dec4aad6203
SHA16ad6375597561b8ee880452e28f26c10e1f04935
SHA2567756603dae66457b7bcae66e8e50561377cd8b94f190fe8b58dd8bf9c7cea949
SHA5129cd399200af38dbb7e3d1b7d0b9e9ed8486c4c48109649360776e46112e901f751e6c4d30422fff853a75648ec7a264b3eb37600fd7d6b44d2a86c4174a232a3
-
C:\recycled\SPOOLSV.EXEFilesize
42KB
MD5b957f36c572f220e27195f073605c83b
SHA1492fcc642aa26010dd25f14f665a44be945af319
SHA2562f1a14073b2a2087c4eaa75101c8f50a01c7778858ff9b87120fad57a1c1722d
SHA512d3c16ab084d29d46400036954e76af89ca67f643673d7fc5620fde0776256ec3b9564c3a1438248fe66066f6cb3678c72b6646ec3797406fbf2cd6e478d2a5d9
-
C:\recycled\SVCHOST.EXEFilesize
42KB
MD5827df1991a839a38b6abf440241a8ee9
SHA1c3c533e0d77c41be39e532c98c837408b9625113
SHA25624dbdc44ba53e5e0a520700e94c83bfbcbedf399bf674ebd455c6b68df2f8d1c
SHA5121acfa9c2ea96de9141dd4ab30dec1ff10b3b3bf0c4a96987f99668264263409153fbcb559a8728af35d6c854c4230ff31922681d528b6b0cfa98b6e818109052
-
memory/504-145-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/504-141-0x0000000000000000-mapping.dmp
-
memory/680-170-0x0000000000000000-mapping.dmp
-
memory/680-175-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/816-157-0x0000000000000000-mapping.dmp
-
memory/816-162-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1120-200-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1120-196-0x0000000000000000-mapping.dmp
-
memory/1188-174-0x0000000000000000-mapping.dmp
-
memory/1188-180-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1536-183-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1536-225-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1536-135-0x0000000000000000-mapping.dmp
-
memory/1556-212-0x0000000000000000-mapping.dmp
-
memory/1556-217-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1656-218-0x0000000000000000-mapping.dmp
-
memory/1656-222-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1684-228-0x00007FFBF2B50000-0x00007FFBF2B60000-memory.dmpFilesize
64KB
-
memory/1684-230-0x00007FFBF2B50000-0x00007FFBF2B60000-memory.dmpFilesize
64KB
-
memory/1684-231-0x00007FFBF2B50000-0x00007FFBF2B60000-memory.dmpFilesize
64KB
-
memory/1684-233-0x00007FFBF0290000-0x00007FFBF02A0000-memory.dmpFilesize
64KB
-
memory/1684-232-0x00007FFBF2B50000-0x00007FFBF2B60000-memory.dmpFilesize
64KB
-
memory/1684-223-0x0000000000000000-mapping.dmp
-
memory/1684-229-0x00007FFBF2B50000-0x00007FFBF2B60000-memory.dmpFilesize
64KB
-
memory/2064-132-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2064-224-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2760-195-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2760-193-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2760-189-0x0000000000000000-mapping.dmp
-
memory/2968-206-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2968-204-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2968-201-0x0000000000000000-mapping.dmp
-
memory/3448-208-0x0000000000000000-mapping.dmp
-
memory/3448-213-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/3724-226-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/3724-146-0x0000000000000000-mapping.dmp
-
memory/3724-185-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/3852-163-0x0000000000000000-mapping.dmp
-
memory/3852-227-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/3852-186-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/4372-179-0x0000000000000000-mapping.dmp
-
memory/4372-188-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/4372-187-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/5056-153-0x0000000000000000-mapping.dmp
-
memory/5056-158-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB