Analysis
-
max time kernel
604s -
max time network
748s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 21:39
Static task
static1
Behavioral task
behavioral1
Sample
CompiledNTVDM.zip
Resource
win10v2004-20221111-en
General
-
Target
CompiledNTVDM.zip
-
Size
2.7MB
-
MD5
4b82b608988728d1e777f9582eb60fef
-
SHA1
584e6a3057e63697d9db487d956a59e2946ad5e0
-
SHA256
aa38afd9f6522ca8342f30b1dc8dbcaa5e3d35f0a5fbf92597a9448f11929eb1
-
SHA512
bdfab637c0f6781e640041be48e3854258da18abef480dfd41e4b7f5634c62caa08953548db41a85aac4d0c35cca8c8a1cc4d355ef8be2024368e4d3452b1e57
-
SSDEEP
49152:AbySyWzYrqhUrF55qmruwVtEOd3ltpbVTyq5I79+5EUuMzb:AbygMJ5ImruyV3tpJTD50dUfzb
Malware Config
Extracted
cobaltstrike
http://A����:3850982656�*H1�W��_P�D$#
-
user_agent
�*H1�W��_P�D$#
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 5 IoCs
Processes:
findstr.exepid process 3988 findstr.exe 4840 2592 228 1900 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 64 IoCs
Processes:
RunDll32.exefsutil.exefsutil.exefsutil.exefsutil.exefsutil.exefsutil.exefsutil.exefsutil.exefsutil.exefsutil.exefsutil.exefsutil.exefsutil.exefsutil.exerundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\SETEF89.tmp RunDll32.exe File created C:\Windows\SysWOW64\SETEFC7.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEF1A.tmp RunDll32.exe File created C:\Windows\SysWOW64\SETEF41.tmp RunDll32.exe File created C:\Windows\SysWOW64\SETEF76.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEF87.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\fastopen.exe RunDll32.exe File created C:\Windows\SysWOW64\SETEF9C.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\himem.sys RunDll32.exe File opened for modification C:\Windows\SysWOW64\loadfix.com RunDll32.exe File created C:\Windows\SysWOW64\SETEFB1.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\exe2bin.exe fsutil.exe File opened for modification C:\Windows\SysWOW64\himem.sys fsutil.exe File opened for modification C:\Windows\SysWOW64\keyboard.sys fsutil.exe File created C:\Windows\SysWOW64\SETEF87.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\kb16.com fsutil.exe File created C:\Windows\SysWOW64\SETEF1A.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEF41.tmp RunDll32.exe File created C:\Windows\SysWOW64\SETEF62.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\graphics.com RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEFB1.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\bios4.rom RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEF86.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEF8A.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\autoexec.nt fsutil.exe File opened for modification C:\Windows\SysWOW64\bios4.rom fsutil.exe File opened for modification C:\Windows\SysWOW64\SETEF65.tmp RunDll32.exe File created C:\Windows\SysWOW64\SETEF9D.tmp RunDll32.exe File created C:\Windows\SysWOW64\SETEFA0.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEFB2.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\share.exe RunDll32.exe File opened for modification C:\Windows\SysWOW64\mscdexnt.exe fsutil.exe File opened for modification C:\Windows\SysWOW64\v7vga.rom fsutil.exe File created C:\Windows\SysWOW64\SETEF63.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEF9B.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEFC7.tmp RunDll32.exe File created C:\Windows\SysWOW64\SETEFDC.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\v7vga.rom RunDll32.exe File opened for modification C:\Windows\SysWOW64\debug.exe RunDll32.exe File created C:\Windows\SysWOW64\SETEF88.tmp RunDll32.exe File created C:\Windows\SysWOW64\SETEF9E.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEFC8.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEFDB.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\debug.exe fsutil.exe File opened for modification C:\Windows\SysWOW64\remline.bas fsutil.exe File opened for modification C:\Windows\SysWOW64\command.com RunDll32.exe File opened for modification C:\Windows\SysWOW64\money.bas RunDll32.exe File created C:\Windows\SysWOW64\SETEFDB.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\remline.bas RunDll32.exe File opened for modification C:\Windows\SysWOW64\setver.exe RunDll32.exe File opened for modification C:\Windows\SysWOW64\setver.exe fsutil.exe File opened for modification C:\Windows\SysWOW64\SETEF9E.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\kb16.com RunDll32.exe File opened for modification C:\Windows\SysWOW64\bios1.rom fsutil.exe File created C:\Windows\SysWOW64\SETEF2D.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\msherc.com RunDll32.exe File created C:\Windows\SysWOW64\SETEFDA.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEFFE.tmp RunDll32.exe File opened for modification C:\Windows\SysWOW64\edit.com fsutil.exe File opened for modification C:\Windows\SysWOW64\gorilla.bas fsutil.exe File opened for modification C:\Windows\SysWOW64\autoexec.nt RunDll32.exe File opened for modification C:\Windows\SysWOW64\cmos.ram RunDll32.exe File opened for modification C:\Windows\SysWOW64\SETEF63.tmp RunDll32.exe File opened for modification C:\Windows\system32\ldntvdm.dll rundll32.exe -
Drops file in Windows directory 27 IoCs
Processes:
rundll32.exeRunDll32.exedescription ioc process File opened for modification C:\Windows\INF\ntvdmx64.inf rundll32.exe File created C:\Windows\INF\SETF087.tmp rundll32.exe File created C:\Windows\Symbols\dbghelp\x64\SETF064.tmp rundll32.exe File created C:\Windows\INF\SETF021.tmp RunDll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x64\symsrv.dll rundll32.exe File created C:\Windows\Symbols\SETF086.tmp rundll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x86\dbghelp.dll RunDll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x86\symsrv.yes RunDll32.exe File opened for modification C:\Windows\INF\SETF021.tmp RunDll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x64\SETF064.tmp rundll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x64\dbghelp.dll rundll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x64\symsrv.yes rundll32.exe File opened for modification C:\Windows\Symbols\instntvdmx64.bat rundll32.exe File opened for modification C:\Windows\INF\SETF087.tmp rundll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x64\SETF075.tmp rundll32.exe File created C:\Windows\Symbols\dbghelp\x86\SETF00F.tmp RunDll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x86\symsrv.dll RunDll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x86\SETF011.tmp RunDll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x86\SETF00F.tmp RunDll32.exe File created C:\Windows\Symbols\dbghelp\x86\SETF011.tmp RunDll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x64\SETF065.tmp rundll32.exe File created C:\Windows\Symbols\dbghelp\x64\SETF065.tmp rundll32.exe File created C:\Windows\Symbols\dbghelp\x64\SETF075.tmp rundll32.exe File opened for modification C:\Windows\Symbols\SETF086.tmp rundll32.exe File opened for modification C:\Windows\Symbols\dbghelp\x86\SETF010.tmp RunDll32.exe File opened for modification C:\Windows\INF\ntvdmx64-32.inf RunDll32.exe File created C:\Windows\Symbols\dbghelp\x86\SETF010.tmp RunDll32.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
reg.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 reg.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz reg.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status reg.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString reg.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1920 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.execmd.exerundll32.exedescription pid process target process PID 3056 wrote to memory of 3560 3056 cmd.exe cacls.exe PID 3056 wrote to memory of 3560 3056 cmd.exe cacls.exe PID 3056 wrote to memory of 2128 3056 cmd.exe reg.exe PID 3056 wrote to memory of 2128 3056 cmd.exe reg.exe PID 3056 wrote to memory of 4264 3056 cmd.exe find.exe PID 3056 wrote to memory of 4264 3056 cmd.exe find.exe PID 3056 wrote to memory of 1588 3056 cmd.exe cmd.exe PID 3056 wrote to memory of 1588 3056 cmd.exe cmd.exe PID 1588 wrote to memory of 3208 1588 cmd.exe reg.exe PID 1588 wrote to memory of 3208 1588 cmd.exe reg.exe PID 3056 wrote to memory of 2560 3056 cmd.exe cmd.exe PID 3056 wrote to memory of 2560 3056 cmd.exe cmd.exe PID 3056 wrote to memory of 2072 3056 cmd.exe rundll32.exe PID 3056 wrote to memory of 2072 3056 cmd.exe rundll32.exe PID 2072 wrote to memory of 1644 2072 rundll32.exe RunDll32.exe PID 2072 wrote to memory of 1644 2072 rundll32.exe RunDll32.exe PID 2072 wrote to memory of 3204 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 3204 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 1584 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 1584 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 4600 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 4600 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 1468 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 1468 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 4372 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 4372 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2256 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2256 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 116 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 116 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 428 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 428 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2432 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2432 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 4560 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 4560 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 3692 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 3692 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 1552 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 1552 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2180 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2180 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 3952 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 3952 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 5068 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 5068 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 5024 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 5024 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 1832 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 1832 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 3080 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 3080 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 3900 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 3900 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2196 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2196 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 4684 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 4684 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2728 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2728 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2192 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2192 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2300 2072 rundll32.exe fsutil.exe PID 2072 wrote to memory of 2300 2072 rundll32.exe fsutil.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\CompiledNTVDM.zip1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\CompiledNTVDM\readme.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Documents\CompiledNTVDM\install.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵
-
C:\Windows\system32\reg.exereg query HKLM\Hardware\Description\System\CentralProcessor\02⤵
- Checks processor information in registry
- Modifies registry key
-
C:\Windows\system32\find.exeFind /i "x86"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Control\SecureBoot\State /v UEFISecureBootEnabled2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Control\SecureBoot\State /v UEFISecureBootEnabled3⤵
- Modifies registry key
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵
-
C:\Windows\system32\rundll32.exerundll32.exe advpack.dll,LaunchINFSection C:\Users\Admin\Documents\CompiledNTVDM\ntvdmx64.inf2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\RunDll32.exeRunDll32 advpack.dll,LaunchINFSection C:\Users\Admin\Documents\CompiledNTVDM\ntvdmx64-32.Inf3⤵
- Drops file in System32 directory
- Drops file in Windows directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\ansi.sys C:\Windows\SysWOW64\ansi.sys3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\append.exe C:\Windows\SysWOW64\append.exe3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\autoexec.nt C:\Windows\SysWOW64\autoexec.nt3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\backup.exe C:\Windows\SysWOW64\backup.exe3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\bios1.rom C:\Windows\SysWOW64\bios1.rom3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\bios4.rom C:\Windows\SysWOW64\bios4.rom3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\cmos.ram C:\Windows\SysWOW64\cmos.ram3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\command.com C:\Windows\SysWOW64\command.com3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\config.nt C:\Windows\SysWOW64\config.nt3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\country.sys C:\Windows\SysWOW64\country.sys3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\debug.exe C:\Windows\SysWOW64\debug.exe3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\edit.com C:\Windows\SysWOW64\edit.com3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\edit.hlp C:\Windows\SysWOW64\edit.hlp3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\edlin.exe C:\Windows\SysWOW64\edlin.exe3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\exe2bin.exe C:\Windows\SysWOW64\exe2bin.exe3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\fastopen.exe C:\Windows\SysWOW64\fastopen.exe3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\gorilla.bas C:\Windows\SysWOW64\gorilla.bas3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\graphics.com C:\Windows\SysWOW64\graphics.com3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\graphics.pro C:\Windows\SysWOW64\graphics.pro3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\himem.sys C:\Windows\SysWOW64\himem.sys3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\kb16.com C:\Windows\SysWOW64\kb16.com3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\keyboard.sys C:\Windows\SysWOW64\keyboard.sys3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\krnl386.exe C:\Windows\SysWOW64\krnl386.exe3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\loadfix.com C:\Windows\SysWOW64\loadfix.com3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\mem.exe C:\Windows\SysWOW64\mem.exe3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\money.bas C:\Windows\SysWOW64\money.bas3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\mscdexnt.exe C:\Windows\SysWOW64\mscdexnt.exe3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\msherc.com C:\Windows\SysWOW64\msherc.com3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\nibbles.bas C:\Windows\SysWOW64\nibbles.bas3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\ntdos.sys C:\Windows\SysWOW64\ntdos.sys3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\ntio.sys C:\Windows\SysWOW64\ntio.sys3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\ntvdm.exe C:\Windows\SysWOW64\ntvdm.exe3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\qbasic.exe C:\Windows\SysWOW64\qbasic.exe3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\qbasic.hlp C:\Windows\SysWOW64\qbasic.hlp3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\redir.exe C:\Windows\SysWOW64\redir.exe3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\remline.bas C:\Windows\SysWOW64\remline.bas3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\setver.exe C:\Windows\SysWOW64\setver.exe3⤵
- Drops file in System32 directory
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\share.exe C:\Windows\SysWOW64\share.exe3⤵
-
C:\Windows\system32\fsutil.exefsutil hardlink create C:\Windows\system32\v7vga.rom C:\Windows\SysWOW64\v7vga.rom3⤵
- Drops file in System32 directory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Symbols\instntvdmx64.bat install3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /v AppInit_DLLs4⤵
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /v AppInit_DLLs5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "4⤵
-
C:\Windows\system32\findstr.exefindstr /I /C:ldntvdm.dll4⤵
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /v AppInit_DLLs /f /d " ldntvdm.dll"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Windows" /v AppInit_DLLs4⤵
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Windows" /v AppInit_DLLs5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "4⤵
-
C:\Windows\system32\findstr.exefindstr /I /C:ldntvdm.dll4⤵
- Loads dropped DLL
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Windows" /v AppInit_DLLs /f /d " ldntvdm.dll"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\DOCUME~1\COMPIL~1\ldntvdm\system32\ldntvdm.dllFilesize
17KB
MD52c20f10ce649bbd6de48a71d3a78282d
SHA1a04d63ea88cb7108ec61c046a86892612b642fb9
SHA256d7c0bf0aa896016ec9a4335b624cf2244df10a8320a5166a015a1eb063d0f717
SHA512fb7582501f27b1b411ddfe95ce391dfcca7715750679845ed34480270a9fad703b18c21d2f8a4c167196d98f10394c6b0de70ff28abfcfa93dabd5fa9a197b93
-
C:\Users\Admin\DOCUME~1\COMPIL~1\ldntvdm\syswow64\ldntvdm.dllFilesize
20KB
MD55bf47fdf3a25591c46589ccd9edde27b
SHA146095f917acf4bcf47e7659d640128f5a409fdce
SHA256e5dd2378c42249643c2b30278aace8ce672dd1b9ee0ac8ba31cf423e54940c85
SHA512f6355305812bc70b17bf252b8c0d9257816d73bcc75978bb6669a763c14426127927148e014b456945ad61a925af5288dde0d8b564f05287866a83b689783c27
-
C:\Windows\Symbols\instntvdmx64.batFilesize
4KB
MD561a7bb35173033c595776b59a218568c
SHA1d634ac9bd8a2b41a57d60fcccbc7201a9a63877b
SHA25685b588f98b4ecfb68e60aa80612327ad3172006ff4b602e60d76e7311bf749af
SHA5127c8aeb859b68979028586a786cc59654dd3ffd6165ce9a95c48f6bc897bf8a5d50fd56981e10eae6ea93cb79702eee98db1ea068a042f32d963701e3d203fd71
-
C:\Windows\SysWOW64\ansi.sysFilesize
8KB
MD58aad333c876590293f72b315e162bcc7
SHA1e37168fbd229c4b903d42a778af28f78f4d741d8
SHA256c929c0893bba4c6454632d3408ee4f7661b51cf5c2ce20035dcd4283cd623c85
SHA5129c5ea80020caada1b6d0a6f0307ffedb506dd0287ea41110a3bf67825bdef23752c063883add1eff0a692c85ee940e371c34fd622f50d389d43614894ed10bc4
-
C:\Windows\SysWOW64\append.exeFilesize
10KB
MD538dd3b731c8bb272ba91709d3eaebb9f
SHA1fd7ee7bd77f95a740c82fe8610d7bf78a796da76
SHA25673d6928246f369aac5de742e149196bf4dc3b5801a6effeed6d014e52841d0ac
SHA5120bf9947df9c0292fe385bd91a9434090b2e76a19a1d1353a831350962432c196cc41c829cd4f207050a6ba791a76a4f439243321b6c5fb87549dbc5e1b1bdb3f
-
C:\Windows\SysWOW64\autoexec.ntFilesize
438B
MD5c464578006b6208d36e2613318cd83df
SHA176655db223c59d0be2102f3a8bf4b0acaf676f54
SHA256c2a23a5fb96682c33d99c13a57e6f3c1e10dfd3d263d972775a8c42bfb6a9a9b
SHA5126fa1e8983ad9c999468512bceb9254136be74798b42cc7f24017a8a6f4471881c69f9c352bb3cfd57c267bea67fe5885a68d077a22d4a031d495b9c32a11c8cf
-
C:\Windows\SysWOW64\backup.exeFilesize
22KB
MD5ddcde525258e411bbe6e9cd994fa72a8
SHA110560343dca143db213ec52b560397a8b55ed475
SHA256b692773717380e80558c5cf20bb5c6f9830dfd2ee908058daa51095955a6f239
SHA5125a5b4517298380dcca5f15f37b44b1a649c6b3e0b4837ef6e6a3fcff0ca4dda75a7d14c5f0172046a2d295bdae522f5c76e7a050c038597e7609337ed8ef6094
-
C:\Windows\SysWOW64\bios1.romFilesize
27KB
MD584bdb1e378591d930482b896a1648c53
SHA1c6741ab5b8e28851290b27e47ed77e12bc84cd96
SHA2561ce33544249fef59865b91308faf60f354563cf854f80eb196d47c968899a574
SHA51200c178c5fcf89eb7e7cc985122f37857b4684425587daec402007a79bab3cd656939e06d9157c1085136a6ab9d526a021fd0623bf1d6b5bb28a98090954cd703
-
C:\Windows\SysWOW64\bios4.romFilesize
7KB
MD5b44c4c9ca9d4bcc8430f3276576f562b
SHA12cdc23f9cb099221d6fe58fd86dd71da948db9e2
SHA256b09fdff1a500971d54233378ce9c36f1b6a58bf577e4a544da03a0d78d7e0d6f
SHA51247b923568f8cb7310f9973cf007d371ebe30db993134392f780660c2e3c280841eb285e44e7a8da21149f8e744ab0ff3de5ed627e25a972a2eaf49783cc0f0fc
-
C:\Windows\SysWOW64\cmos.ramFilesize
64B
MD55d24fb0922e71de67e20e9f22946a54d
SHA1e94de2504d357c1bd41ddd94ef1b619b22cb534c
SHA25697fca7adb543bdac4e571185a3f37c17a30a6ad937e0817048d965a850edddd9
SHA512d5772885d8b43b2da889ed22a0c0dade1dcebbac7e91df5b93d087d1d3c3efe5f0d18bb47d5261c3e157332db6fb8cbc15bf4fe1a501bbf3bef7de66c03741e1
-
C:\Windows\SysWOW64\command.comFilesize
49KB
MD52e259d9af02d2891a9971eec9dabffa0
SHA11a7454b7e76f1559cdeccc87f135d49aa16183d9
SHA256908a77ac617c2d741f0aa1b73f73973dcf29adc91f092e5bcb02173c8c732c43
SHA5126cc5524399950b0af23c50c6b34c73174dfdb4db5a112f95275e035cc7d39c4fda7c82fbddfb4f7295ac11572427d1cad3c8aa7c412d73d1fcd0d3461f49abdb
-
C:\Windows\SysWOW64\config.ntFilesize
2KB
MD5802cba52a616db4d5a2215d618110b3d
SHA18b4f354257468cd201eb666e818a99796c58a40b
SHA2566ae1e74e78de00c0fa03124e6f947d977c71f253855ad2af979554074aea189a
SHA5124d754df863b1abd1c8709b057b3f35a88c0ecd7a042add625a4b14e76cb28d0981e1afb2fccfc6a35abbcbb1bc68c977976292b744e1b2eddd66ea8bb3278455
-
C:\Windows\SysWOW64\country.sysFilesize
26KB
MD52bac6dd45043bb2b38e60d6ec5c8787c
SHA11854487158d7cc32b5782af20b91fa821dda19cf
SHA2569ddf2b738307b5950699513e6b8221e2044bb686487a8c216af7c6fd3f853b54
SHA512896e881bef191a6b70b71ae15a91a5959c3c6f2b300ac5747866b1f979996cbb1b4ea9b07efcd884c4dba6b9bfecbceeca39df0a372502bb4ff540e8e9a77510
-
C:\Windows\SysWOW64\debug.exeFilesize
20KB
MD5c17afa0aad78c621f818dd6729572c48
SHA15915a889c84e6e6e3878297ed6467ee0b8fd982f
SHA2569c230aa1caff2ff9d845514017b3e4bbe7b308ad26ad88740967651f7955cd60
SHA512eee89abcf2bca60f3917af9170c7b70690f604ae1523315d0e180f8719bf12956cd785ea7f59b3a783271b9bf47df57e806e0d0960008c05daae782c530da3ff
-
C:\Windows\SysWOW64\edit.comFilesize
413B
MD5064bd7d30c100e423a6f806afa7f3f5e
SHA154acfff92f4793a6e820723e09613e86bf54097c
SHA256e0a0b24fee4037cb050670661c30ad7ecc0ea9483938152fca3d807c443e8a46
SHA512505c272275b32e3c09cd3fbcea17e525bc9c5a5aed90aa9d9abcff7be193bad6d00b183028c84107f3e6f779c6ab379cb197214799b414ff9238f245ee517bf1
-
C:\Windows\SysWOW64\edit.hlpFilesize
17KB
MD5021635fb623ea9627d39be6401adac05
SHA1ed9f31c6f4b136c532a31c870455520ac9c15d8f
SHA256deb09a378b88f46a5ba3c755afe03b9b2b0e18c929d9cdb24003b6bf0caee631
SHA5120238b9707b9f1730030a77cfab0c00059fc5a397dcc79fccf6abc14a167d05af6ebfef7ca1d77a29f934b9f003a1382465b96f7e6b399fba73a8efbf2e3aa72f
-
C:\Windows\SysWOW64\edlin.exeFilesize
12KB
MD5b7a0aa49cbb604b2c3a42a49c36d8a4f
SHA12966e6bd2e4a42450766115734128e0a255807bc
SHA2569d835a8a46406fcb01f4509550cc86ea2755c3084c95c744cbec79d8d94c0477
SHA51239827204bb4d4f46cc5a21afab88f064ea6d38104392aca0eb30ae00c81e099cd53cea58d7145afc2ab180a83cc50b234e0670bdcc38105490219d21212b662e
-
C:\Windows\SysWOW64\exe2bin.exeFilesize
8KB
MD5683626544e81387771ed55e1a0f2047b
SHA15b95678df5a5f68a37007e526153463704e6a809
SHA256edf4009a2ab45a30ae3291b0f8c9585de9a15b6a1262288ae6694d4693cb737e
SHA512bc6b314f33575c576e5ccd893152b74c181c76ebb1b2669565becc888a02c0715aa93be3512b241834069135de6976bcd6cf8519cd3d01eaed3bf99efc4132dd
-
C:\Windows\SysWOW64\fastopen.exeFilesize
882B
MD568062c0ece86ab7801b5b47fdc855a06
SHA1f574d8ca521fd9f038d94140d0606f7d622c1d82
SHA25669dabbdb754b358ac4fe4b22de04c0e4c93076816f14bb0730caa9fd223996fc
SHA5123fb78c538a425eecaf51d6175fb81a82d2d745267999aa3a1c2f4ce11bd32d45a22ba89c2825b0b3343def8f316cbb023cf10e4676f76bf656a58c7c2ec58711
-
C:\Windows\SysWOW64\gorilla.basFilesize
28KB
MD53651562e0a058e661e38a1e9e82afadb
SHA197fd0e987df1372abdb5f7105e8a91357e51bea4
SHA2569926fc1f50c4b489ec4c1b0da5bd2c497ebf4282b3259c28a835a743e24699f7
SHA512abcc884a333f89fd2b798736bef2339c6a9c7302a40a2bae08e3cacc3a45c3ea8f1c13a9e0b66d74754bbbe0386ae6f60c32fe230442e74e0dc0634ac8f4a1b3
-
C:\Windows\SysWOW64\graphics.comFilesize
19KB
MD56e4e7884e6489ac4f5e6dab176a73e52
SHA135248484a4007156a24c62618205cc1657eea2b2
SHA256989b38806ec1e1bdd30da3dc6b41cc85bdc81dda74f870fcc7df399876eb2756
SHA512688d24aaf2d06a4e64e25ed26540ea07cf0516d7e9b85a44d231b4874c330d3809bbffb218fc046feac5ad71d5ffdb6650f37cdb69b79d3de37d5ed91adfc1f7
-
C:\Windows\SysWOW64\graphics.proFilesize
20KB
MD5bc33aa625d6b807f718627386df78426
SHA123b563e377737c97f11401c49ce33c5e01d644bd
SHA256b734f750a473f83d33aa773fe3d6c7bcdd209d97339f37b03b8c5f3f8eed890b
SHA512656dbea85b4035373b7e9aaf9871f092a219f4301dc957cb76662f91a36a71007a824ff70db87a71994bfadc4c74ac249b9b36c8fd2971725326b3b136a6c2ac
-
C:\Windows\SysWOW64\himem.sysFilesize
4KB
MD5e6bc0f98fecef245a0010d350c1a0b9b
SHA1182c9b4d26d11eda25deaa2ec6051ac2d324cb08
SHA25608aa2c47d835460ed3067fa7d6f8a3b37edeca524ad102b0588fdd1bf389ce08
SHA512b84197b66de8de88cd21ab257de7d8491ffb1ad00f5929333ff099a2e5493a7f6780b41d24b5749ec689a4c7da4ce1697f207e35e43dc7eda435f0dc1ed02326
-
C:\Windows\SysWOW64\kb16.comFilesize
14KB
MD5e57695537ba7534f3e2ddeca76917cd7
SHA165220df1d01cf0f322206e5596336b506312a150
SHA2569c432ea71e0e11bfb2edf9166c862826115ec4cdf8439f986a5ed71d9a3af3b9
SHA51231d04f9ea22aff628a1a2c3257dc38cc1a87b7a34ff429487919cf0b1582f78c73a4db49525300a7b54b8efdda9e67499af1dbb500287b3b7ccdce94403c48b5
-
C:\Windows\SysWOW64\keyboard.sysFilesize
39KB
MD5a2cf1c78e6f5f9bae9775316d49a8264
SHA17b6e90a8d9cd7fbe4241e0250ff4c6dd0656db95
SHA25696fcac606683cf262dbc030713a9263731ee83f19a10207e5dd632e5ee06c2ad
SHA512e67b08786dffba1bcd69431a627f063f26ce9b6a4382b4c0068c07d4705b6fbe6316f92367072f44b688c0e1280f7e417511920bf7b9f4e9a4858cb25cc8d07a
-
C:\Windows\SysWOW64\krnl386.exeFilesize
83KB
MD5df341464b80a2d82c468b948eb161eb2
SHA168da4869224404929437dcffc7e2f705fc9224a7
SHA256d404576899cc11d23f368f2b30554e6108657cd37809837b341fd37e6b1a7af4
SHA512ca315559280bac4bbe9a9cf3445ab3d779839a2d95df5c2f8bc6c3c108daef85cfc98a8898a7cd0973170ff8740e8267393a7b4621fdc873c95980f51b267ccc
-
C:\Windows\SysWOW64\loadfix.comFilesize
1KB
MD5536460507b20ae0f03d7bee8111028cf
SHA1a970f3ba84900974523fa3e920a35fca7a812d64
SHA2568e62654a49bd88c784c53f25e9fba13c641624d6a02214385115f66ccf1ecfdb
SHA51244dbfbbd934499e1d23f7ac993bfdc0a9b25cb46ee2fb58523bfdbe0ce80d4475f4b4a9ca8c52dea811c9edae255eb494595b0affbfa8028f53f3fa4efc1eb36
-
C:\Windows\SysWOW64\mem.exeFilesize
39KB
MD5b4841a9693c572f6e764af4e168efe5c
SHA1e6196d88ae461dc4d8128feabbd290e1a2a81ebd
SHA256c4582b1e0738f3aaf89e17de0f940caa7e4b3d77a21fccd6ff91b7e075bdf6eb
SHA5126029f9778b9dc2676fbd84c9a5faee14c4029bbf3ef0725b7aa057c44ff50d6d62acf88be2e56114a1844b9f9629d09bcbda5a1c1d1da7826eb468bbbebdf44b
-
C:\Windows\SysWOW64\money.basFilesize
45KB
MD51388197c59612cbb3df3adde3edf56ee
SHA19ccfe9c5fd18016d50c4ee3a425d42858274f4f1
SHA2569f5153fddae4351fe845f2eeedd74e293d30f8898505a0d9b4d4488888f9d065
SHA512ae6a4bde42746b167410d5b2535a88b331afba25338bae0cc3fceda005d8b51b95a8b211b9b61fc59b6a7be0976d5cf874650ffee611a22734f9770089c66316
-
C:\Windows\SysWOW64\mscdexnt.exeFilesize
917B
MD56a5b002d6235c3e468a29fb87ab35e3f
SHA10785344bba0aeb223b1b16f928bfd0ce263baf30
SHA256b3151a2dfe4a67a6c2e6113071d1f1c713bb78a04adea986fe01540eb96762d0
SHA5126c6c255a921200fcf8f957ab0a391111576306eb8dc8c3c27e696d40e37dbddecd26f4d712f0e43096b55de9ba4c38cdf96801746ba97a637b86a85ae3f42e81
-
C:\Windows\SysWOW64\msherc.comFilesize
6KB
MD53dc72e3d753d1761778468f2e17d5471
SHA17a6dc1647118425ebdcd6859d16e47c9a2986464
SHA256eb96ee0e8be6d4a4332c3e1947d95f9c448a0a8a96b5cd74a38d33a1e0b9405e
SHA5122c72a63c2b528c56eb5e526244baebb54d049cbf92672b55c780d8853f9216c6411f90898d9cca2dfd3edfa58c54ea3e158dbaa846a259d4da6ca3fb3b01b4f0
-
C:\Windows\SysWOW64\nibbles.basFilesize
23KB
MD58d133a769390956edb65182ef144e5a1
SHA1bb9646390d18b70f112a12dded7a9d715a537351
SHA25624017f3b84e5e072090ab55b76700feaec197c5b12ebb26432bce3b2e88e8528
SHA51290e8076a6d0ed388f05372cb4faf3a1e58357ca33a21ed7aeec1b0b1375ce1a99f961befdf4e9e776c32a6eba99c21673d47fbeeb77438c0f6e7572cc188d128
-
C:\Windows\SysWOW64\ntdos.sysFilesize
27KB
MD501d95f844255c4217b4da43dd5ffd5a0
SHA1b01b460fce8422c220730609d09e203f986353c2
SHA256957662320654ad5251c3a8b228a5dadec28aa65dddbcba38c3658a6e7f93bc84
SHA5127977933e864b3d448c6773485f6c220111dcd9a3e74711b9c2d4715edf886677533808b8fcd014dffcdaf68bf7c7c40defbe2d8bd1dd1e1e790c4b7c2a7eb302
-
C:\Windows\SysWOW64\ntio.sysFilesize
33KB
MD5cebf9f829ed19c8b98b3ca365ae44908
SHA11912ef18142efd36ef6e3656de239fb41c4cb176
SHA256cfc8be16576bb6acd16bb8fc9b2d9a080f544bbfdd2d2d2df07ed908b3ab4937
SHA512d5905ecef4a49054d48e9fbb444b8a1c946b4d1d49bda5796f22907459730c6327052e775833ed78e0b57ab7ead09ae2f879487cdb4b1aed863f5721132e58dc
-
C:\Windows\SysWOW64\ntvdm.exeFilesize
3.0MB
MD528060ca1c7c2630dfb41c751da135628
SHA1ea976ad1163c23905c6bef4b39a3ac5bc4ee1ea1
SHA25657f747f54840645f19135366dc38d9f29596beb536ec5b23cc77e1c798846a85
SHA5125aada567b8d89c3f285e4b7f9ab5e36ebbff6b35cac49fb1cc2d98454d6360a3621f91a0d7d86ee5db5e7d2fd0abc0c1b7f661738ecff48dffc9076237767194
-
C:\Windows\SysWOW64\qbasic.exeFilesize
251KB
MD51f4352f6189dc26c33e7ef81c862d0c9
SHA18e2f0dbb3280e9be872c784b5dfe54ddc29803b3
SHA256e8341b546cc12cfd4d59a7eb24e116f2cfbcae71779d9a7f712902f65e5deb6e
SHA5126a379d58c642b8a9360eda3d3a533d25ac3b8180e7423d6cfbab42cdfe8cb8149f13192d7f9ea86db6121315f667bb6c819e713572af9cbf9fdb2c8351024166
-
C:\Windows\SysWOW64\qbasic.hlpFilesize
127KB
MD5681c7c17ec72718b44e7b75fc97677ba
SHA109c7b3db55698e750b05875a033fd16533dade03
SHA2566740dba6966378c317a6273299157db1388d6b5820ecb7a05ab68cf2af96a8db
SHA5124ce76848eee457d94a7e6258d2bacc2eb8720175dc38b5420375b8df8c7c8fc5146fe15e14fb4406934ee37ec9aafeecc97573771b8fd190bfdb761244cc0846
-
C:\Windows\SysWOW64\redir.exeFilesize
17KB
MD5e5cc704fcbbab7ae25a97c083ac68a12
SHA1c1017d7aeb4967e9b927f9c705512e948c575d8f
SHA2564efe625d7391cbec07c984282e4431d9f53f3452fe1bda4b8e9a97bf1a578d53
SHA5129640b6f418abfc8f645351d9cfade5cd58cf440384af85d3d6055140ac0e6b31c1c14f97e945374f176e3358aa3a4a70e98be7ca1ee1fcaf56e64e381958e06f
-
C:\Windows\SysWOW64\remline.basFilesize
12KB
MD58b5f2d01f0117e25dc158276e3382ea4
SHA14bfe286a70ce830d3ad36c1320722e89f5d702b3
SHA256b1b9b3b3c70026ed01a47c88319c9bd1bb392e55575a9dec7e87230a36799ac5
SHA51291520d7b7974702a78f186e5c6ae4108307ae31216cf9b66edf3f4fb126e9dfe5634c041e48396565b3ae16e096137a0e8a52bff2d4a30882fc36034176d2e4e
-
C:\Windows\SysWOW64\setver.exeFilesize
11KB
MD5485a2f3c5a40d53645ce65ad04c68687
SHA18ab0828bdf867a5d97e0e8efbc025a3ee0600fcd
SHA2568ab7e855fb4bd066ac0230dfb7d194180bb73fdd99c040c340a903353dcd822b
SHA51299af62a2ca1ee20687868266d7102c0a965792df33911d1adf683891d83b5661ad434faef70edc650ebef92a04c164167f98d709bb53dfee1091ddac1a448f01
-
C:\Windows\SysWOW64\share.exeFilesize
882B
MD568062c0ece86ab7801b5b47fdc855a06
SHA1f574d8ca521fd9f038d94140d0606f7d622c1d82
SHA25669dabbdb754b358ac4fe4b22de04c0e4c93076816f14bb0730caa9fd223996fc
SHA5123fb78c538a425eecaf51d6175fb81a82d2d745267999aa3a1c2f4ce11bd32d45a22ba89c2825b0b3343def8f316cbb023cf10e4676f76bf656a58c7c2ec58711
-
C:\Windows\SysWOW64\v7vga.romFilesize
18KB
MD586491ad7bc0964089cd4e703e65d45db
SHA14997a752bb2e57bd5317e5bde3a24962954bcb9c
SHA256970f105cd9e42ee56f07aae695bac89786d3455ab9d4c1ea9a1d1643b1e8f6f0
SHA512a9abc9f36e3654fa36fe6fe86c48e5c6050344d625cacd7282059945e332b037999278fa9b8f67e04e4ed36a7032501f80e0d1feb81374d460dbb09cbd17f1d2
-
C:\Windows\System32\ldntvdm.dllFilesize
17KB
MD52c20f10ce649bbd6de48a71d3a78282d
SHA1a04d63ea88cb7108ec61c046a86892612b642fb9
SHA256d7c0bf0aa896016ec9a4335b624cf2244df10a8320a5166a015a1eb063d0f717
SHA512fb7582501f27b1b411ddfe95ce391dfcca7715750679845ed34480270a9fad703b18c21d2f8a4c167196d98f10394c6b0de70ff28abfcfa93dabd5fa9a197b93
-
C:\Windows\System32\ldntvdm.dllFilesize
17KB
MD52c20f10ce649bbd6de48a71d3a78282d
SHA1a04d63ea88cb7108ec61c046a86892612b642fb9
SHA256d7c0bf0aa896016ec9a4335b624cf2244df10a8320a5166a015a1eb063d0f717
SHA512fb7582501f27b1b411ddfe95ce391dfcca7715750679845ed34480270a9fad703b18c21d2f8a4c167196d98f10394c6b0de70ff28abfcfa93dabd5fa9a197b93
-
C:\Windows\System32\ldntvdm.dllFilesize
17KB
MD52c20f10ce649bbd6de48a71d3a78282d
SHA1a04d63ea88cb7108ec61c046a86892612b642fb9
SHA256d7c0bf0aa896016ec9a4335b624cf2244df10a8320a5166a015a1eb063d0f717
SHA512fb7582501f27b1b411ddfe95ce391dfcca7715750679845ed34480270a9fad703b18c21d2f8a4c167196d98f10394c6b0de70ff28abfcfa93dabd5fa9a197b93
-
C:\Windows\System32\ldntvdm.dllFilesize
17KB
MD52c20f10ce649bbd6de48a71d3a78282d
SHA1a04d63ea88cb7108ec61c046a86892612b642fb9
SHA256d7c0bf0aa896016ec9a4335b624cf2244df10a8320a5166a015a1eb063d0f717
SHA512fb7582501f27b1b411ddfe95ce391dfcca7715750679845ed34480270a9fad703b18c21d2f8a4c167196d98f10394c6b0de70ff28abfcfa93dabd5fa9a197b93
-
C:\Windows\System32\ldntvdm.dllFilesize
17KB
MD52c20f10ce649bbd6de48a71d3a78282d
SHA1a04d63ea88cb7108ec61c046a86892612b642fb9
SHA256d7c0bf0aa896016ec9a4335b624cf2244df10a8320a5166a015a1eb063d0f717
SHA512fb7582501f27b1b411ddfe95ce391dfcca7715750679845ed34480270a9fad703b18c21d2f8a4c167196d98f10394c6b0de70ff28abfcfa93dabd5fa9a197b93
-
C:\Windows\system32\ldntvdm.dllFilesize
17KB
MD52c20f10ce649bbd6de48a71d3a78282d
SHA1a04d63ea88cb7108ec61c046a86892612b642fb9
SHA256d7c0bf0aa896016ec9a4335b624cf2244df10a8320a5166a015a1eb063d0f717
SHA512fb7582501f27b1b411ddfe95ce391dfcca7715750679845ed34480270a9fad703b18c21d2f8a4c167196d98f10394c6b0de70ff28abfcfa93dabd5fa9a197b93
-
memory/116-154-0x0000000000000000-mapping.dmp
-
memory/224-226-0x0000000000000000-mapping.dmp
-
memory/428-156-0x0000000000000000-mapping.dmp
-
memory/1128-212-0x0000000000000000-mapping.dmp
-
memory/1468-148-0x0000000000000000-mapping.dmp
-
memory/1476-204-0x0000000000000000-mapping.dmp
-
memory/1552-164-0x0000000000000000-mapping.dmp
-
memory/1584-144-0x0000000000000000-mapping.dmp
-
memory/1584-224-0x0000000000000000-mapping.dmp
-
memory/1588-216-0x0000000000000000-mapping.dmp
-
memory/1588-135-0x0000000000000000-mapping.dmp
-
memory/1644-139-0x0000000000000000-mapping.dmp
-
memory/1792-227-0x0000000000000000-mapping.dmp
-
memory/1832-174-0x0000000000000000-mapping.dmp
-
memory/1980-222-0x0000000000000000-mapping.dmp
-
memory/2072-138-0x0000000000000000-mapping.dmp
-
memory/2128-133-0x0000000000000000-mapping.dmp
-
memory/2180-166-0x0000000000000000-mapping.dmp
-
memory/2192-186-0x0000000000000000-mapping.dmp
-
memory/2196-180-0x0000000000000000-mapping.dmp
-
memory/2256-152-0x0000000000000000-mapping.dmp
-
memory/2300-188-0x0000000000000000-mapping.dmp
-
memory/2432-158-0x0000000000000000-mapping.dmp
-
memory/2560-137-0x0000000000000000-mapping.dmp
-
memory/2716-190-0x0000000000000000-mapping.dmp
-
memory/2728-184-0x0000000000000000-mapping.dmp
-
memory/2800-214-0x0000000000000000-mapping.dmp
-
memory/2848-196-0x0000000000000000-mapping.dmp
-
memory/2900-194-0x0000000000000000-mapping.dmp
-
memory/2952-192-0x0000000000000000-mapping.dmp
-
memory/3024-218-0x0000000000000000-mapping.dmp
-
memory/3060-210-0x0000000000000000-mapping.dmp
-
memory/3080-176-0x0000000000000000-mapping.dmp
-
memory/3204-142-0x0000000000000000-mapping.dmp
-
memory/3208-136-0x0000000000000000-mapping.dmp
-
memory/3276-220-0x0000000000000000-mapping.dmp
-
memory/3468-202-0x0000000000000000-mapping.dmp
-
memory/3560-132-0x0000000000000000-mapping.dmp
-
memory/3568-223-0x0000000000000000-mapping.dmp
-
memory/3660-200-0x0000000000000000-mapping.dmp
-
memory/3692-162-0x0000000000000000-mapping.dmp
-
memory/3808-228-0x0000000000000000-mapping.dmp
-
memory/3900-178-0x0000000000000000-mapping.dmp
-
memory/3952-168-0x0000000000000000-mapping.dmp
-
memory/3988-230-0x0000000000000000-mapping.dmp
-
memory/4056-206-0x0000000000000000-mapping.dmp
-
memory/4224-233-0x0000000000000000-mapping.dmp
-
memory/4248-229-0x0000000000000000-mapping.dmp
-
memory/4264-134-0x0000000000000000-mapping.dmp
-
memory/4372-150-0x0000000000000000-mapping.dmp
-
memory/4560-160-0x0000000000000000-mapping.dmp
-
memory/4600-146-0x0000000000000000-mapping.dmp
-
memory/4684-182-0x0000000000000000-mapping.dmp
-
memory/4828-198-0x0000000000000000-mapping.dmp
-
memory/4844-225-0x0000000000000000-mapping.dmp
-
memory/5024-172-0x0000000000000000-mapping.dmp
-
memory/5052-208-0x0000000000000000-mapping.dmp
-
memory/5068-170-0x0000000000000000-mapping.dmp