Overview
overview
8Static
static
1mmc-develop-win32.zip
windows10-1703-x64
1MultiMC/MultiMC.exe
windows10-1703-x64
8MultiMC/Qt5Core.dll
windows10-1703-x64
3MultiMC/Qt5Gui.dll
windows10-1703-x64
3MultiMC/Qt...rk.dll
windows10-1703-x64
3MultiMC/Qt5Svg.dll
windows10-1703-x64
3MultiMC/Qt...ts.dll
windows10-1703-x64
3MultiMC/Qt5Xml.dll
windows10-1703-x64
3MultiMC/ic...on.dll
windows10-1703-x64
1MultiMC/im...if.dll
windows10-1703-x64
1MultiMC/im...ns.dll
windows10-1703-x64
1MultiMC/im...co.dll
windows10-1703-x64
1MultiMC/im...eg.dll
windows10-1703-x64
1MultiMC/im...vg.dll
windows10-1703-x64
1MultiMC/im...mp.dll
windows10-1703-x64
1MultiMC/ja...ck.jar
windows10-1703-x64
1MultiMC/ja...ch.jar
windows10-1703-x64
1MultiMC/li...ix.dll
windows10-1703-x64
3MultiMC/li...++.dll
windows10-1703-x64
3MultiMC/li....dll.a
windows10-1703-x64
3MultiMC/li...ip.dll
windows10-1703-x64
3MultiMC/li...ow.dll
windows10-1703-x64
3MultiMC/libeay32.dll
windows10-1703-x64
1MultiMC/li...-1.dll
windows10-1703-x64
3MultiMC/libssp-0.dll
windows10-1703-x64
3MultiMC/li...-6.dll
windows10-1703-x64
3MultiMC/li...-1.dll
windows10-1703-x64
1MultiMC/pl...ws.dll
windows10-1703-x64
1MultiMC/qt.conf
windows10-1703-x64
3MultiMC/ssleay32.dll
windows10-1703-x64
1MultiMC/zlib1.dll
windows10-1703-x64
3Analysis
-
max time kernel
846s -
max time network
850s -
platform
windows10-1703_x64 -
resource
win10-20230220-es -
resource tags
arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
28-02-2023 22:16
Static task
static1
Behavioral task
behavioral1
Sample
mmc-develop-win32.zip
Resource
win10-20230220-es
Behavioral task
behavioral2
Sample
MultiMC/MultiMC.exe
Resource
win10-20230220-es
Behavioral task
behavioral3
Sample
MultiMC/Qt5Core.dll
Resource
win10-20230220-es
Behavioral task
behavioral4
Sample
MultiMC/Qt5Gui.dll
Resource
win10-20230220-es
Behavioral task
behavioral5
Sample
MultiMC/Qt5Network.dll
Resource
win10-20230220-es
Behavioral task
behavioral6
Sample
MultiMC/Qt5Svg.dll
Resource
win10-20230220-es
Behavioral task
behavioral7
Sample
MultiMC/Qt5Widgets.dll
Resource
win10-20230220-es
Behavioral task
behavioral8
Sample
MultiMC/Qt5Xml.dll
Resource
win10-20230220-es
Behavioral task
behavioral9
Sample
MultiMC/iconengines/qsvgicon.dll
Resource
win10-20230220-es
Behavioral task
behavioral10
Sample
MultiMC/imageformats/qgif.dll
Resource
win10-20230220-es
Behavioral task
behavioral11
Sample
MultiMC/imageformats/qicns.dll
Resource
win10-20230220-es
Behavioral task
behavioral12
Sample
MultiMC/imageformats/qico.dll
Resource
win10-20230220-es
Behavioral task
behavioral13
Sample
MultiMC/imageformats/qjpeg.dll
Resource
win10-20230220-es
Behavioral task
behavioral14
Sample
MultiMC/imageformats/qsvg.dll
Resource
win10-20230220-es
Behavioral task
behavioral15
Sample
MultiMC/imageformats/qwbmp.dll
Resource
win10-20230220-es
Behavioral task
behavioral16
Sample
MultiMC/jars/JavaCheck.jar
Resource
win10-20230220-es
Behavioral task
behavioral17
Sample
MultiMC/jars/NewLaunch.jar
Resource
win10-20230220-es
Behavioral task
behavioral18
Sample
MultiMC/libLauncher_iconfix.dll
Resource
win10-20230220-es
Behavioral task
behavioral19
Sample
MultiMC/libLauncher_nbt++.dll
Resource
win10-20230220-es
Behavioral task
behavioral20
Sample
MultiMC/libLauncher_nbt++.dll.a
Resource
win10-20230220-es
Behavioral task
behavioral21
Sample
MultiMC/libLauncher_quazip.dll
Resource
win10-20230220-es
Behavioral task
behavioral22
Sample
MultiMC/libLauncher_rainbow.dll
Resource
win10-20230220-es
Behavioral task
behavioral23
Sample
MultiMC/libeay32.dll
Resource
win10-20230220-es
Behavioral task
behavioral24
Sample
MultiMC/libgcc_s_dw2-1.dll
Resource
win10-20230220-es
Behavioral task
behavioral25
Sample
MultiMC/libssp-0.dll
Resource
win10-20230220-es
Behavioral task
behavioral26
Sample
MultiMC/libstdc++-6.dll
Resource
win10-20230220-es
Behavioral task
behavioral27
Sample
MultiMC/libwinpthread-1.dll
Resource
win10-20230220-es
Behavioral task
behavioral28
Sample
MultiMC/platforms/qwindows.dll
Resource
win10-20230220-es
Behavioral task
behavioral29
Sample
MultiMC/qt.conf
Resource
win10-20230220-es
Behavioral task
behavioral30
Sample
MultiMC/ssleay32.dll
Resource
win10-20230220-es
Behavioral task
behavioral31
Sample
MultiMC/zlib1.dll
Resource
win10-20230220-es
General
-
Target
MultiMC/MultiMC.exe
-
Size
8.8MB
-
MD5
b140f2eddebb8f56f15148d64c762c2e
-
SHA1
966df1c26fc4f42657549cc35ce5012b9feb09ab
-
SHA256
798898fa1695d4144930e58d06529c76235248fd4912531224f57709e2b9466a
-
SHA512
e81588e459c9557e5b8b37d57b0b1b9b48b969b390891d7b709271c4161b1dcb3ed03b6210ec8a82a19047e27bab791804b243709369cbebefd5e045b4b7717c
-
SSDEEP
196608:F/cYoNpdLZMSv80t/HC+ReI3MhcdyyVfzxXz+5EoAT+SZpVJV0V8eJiVPVVOSBVs:+3XoM/H9FXz+6gkVJV0V8eJiVPVVOSBe
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exeflow pid process 147 2056 msiexec.exe 149 2056 msiexec.exe -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
Processes:
jre-8u361-windows-x64.exejre-8u361-windows-x64.exeinstaller.exejavaw.exessvagent.exejavaws.exejp2launcher.exejavaws.exejp2launcher.exeMSI1998.tmpjavaw.exejavaw.exejavaw.exejavaw.exejavaw.exepid process 4568 jre-8u361-windows-x64.exe 4408 jre-8u361-windows-x64.exe 4796 installer.exe 240 javaw.exe 5028 ssvagent.exe 3816 javaws.exe 2040 jp2launcher.exe 1972 javaws.exe 3000 jp2launcher.exe 4556 MSI1998.tmp 4900 javaw.exe 3996 javaw.exe 2316 javaw.exe 3984 javaw.exe 1180 javaw.exe -
Loads dropped DLL 64 IoCs
Processes:
MsiExec.exejavaw.exeinstaller.exepid process 2032 MsiExec.exe 2032 MsiExec.exe 2032 MsiExec.exe 240 javaw.exe 240 javaw.exe 240 javaw.exe 240 javaw.exe 240 javaw.exe 240 javaw.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe 4796 installer.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
MSI1998.tmpinstaller.exessvagent.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0013-0001-0053-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0050-ABCDEFFEDCBA}\INPROCSERVER32 installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0351-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0008-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0151-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0015-0000-0067-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0196-ABCDEFFEDCBC}\INPROCSERVER32 MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0221-ABCDEFFEDCBB}\InprocServer32 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0155-ABCDEFFEDCBB}\InprocServer32 installer.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0328-ABCDEFFEDCBC}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0066-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0135-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA}\INPROCSERVER32 MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0118-ABCDEFFEDCBC}\InprocServer32 MSI1998.tmp Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0272-ABCDEFFEDCBB}\INPROCSERVER32 MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0264-ABCDEFFEDCBC}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0095-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0123-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0237-ABCDEFFEDCBB}\InprocServer32 MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0302-ABCDEFFEDCBA}\InprocServer32 MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0133-ABCDEFFEDCBA}\InprocServer32 MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0233-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0187-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0304-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0180-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0075-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0231-ABCDEFFEDCBA}\INPROCSERVER32 MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0018-0000-0126-ABCDEFFEDCBC}\INPROCSERVER32 MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0014-0002-0082-ABCDEFFEDCBA}\InprocServer32 MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0056-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0199-ABCDEFFEDCBA}\InprocServer32 MSI1998.tmp Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0184-ABCDEFFEDCBB}\INPROCSERVER32 MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0013-0001-0098-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0015-0000-0082-ABCDEFFEDCBC}\INPROCSERVER32 ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0124-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0211-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0003-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0002-0035-ABCDEFFEDCBB}\INPROCSERVER32 installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0022-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0285-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0143-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0013-0001-0001-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0172-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0050-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0163-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0014-0002-0033-ABCDEFFEDCBB}\INPROCSERVER32 MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0100-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0240-ABCDEFFEDCBC}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0156-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0201-ABCDEFFEDCBB}\InprocServer32 MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0013-0001-0006-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0082-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0016-0000-0080-ABCDEFFEDCBC}\INPROCSERVER32 MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0159-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0013-0001-0006-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0200-ABCDEFFEDCBB}\InprocServer32 MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0071-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0105-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0313-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0279-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0015-0000-0016-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0015-0000-0015-ABCDEFFEDCBA}\InprocServer32 MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0164-ABCDEFFEDCBA}\INPROCSERVER32 MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0036-ABCDEFFEDCBA}\InprocServer32 MSI1998.tmp -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
msiexec.exechrome.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SunJavaUpdateSched = "\"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\jusched.exe\"" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run msiexec.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: msiexec.exe -
Installs/modifies Browser Helper Object 2 TTPs 12 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
MSI1998.tmpinstaller.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9} MSI1998.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}\NoExplorer = "1" MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} MSI1998.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\NoExplorer = "1" MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\NoExplorer = "1" installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9} installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}\NoExplorer = "1" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} MSI1998.tmp -
Drops file in System32 directory 7 IoCs
Processes:
MSI1998.tmpinstaller.exedescription ioc process File created C:\Windows\system32\WindowsAccessBridge-64241049859.dll MSI1998.tmp File opened for modification C:\Windows\system32\WindowsAccessBridge-64241049859.dll MSI1998.tmp File created C:\Windows\system32\WindowsAccessBridge-64241066687.dll MSI1998.tmp File opened for modification C:\Windows\system32\WindowsAccessBridge-64241066687.dll MSI1998.tmp File created C:\Windows\system32\WindowsAccessBridge-64.dll installer.exe File opened for modification C:\Windows\system32\WindowsAccessBridge-64.dll installer.exe File created C:\Windows\system32\WindowsAccessBridge-64.dll MSI1998.tmp -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exeinstaller.exedescription ioc process File created C:\Program Files\Java\jre1.8.0_361\lib\ext\sunjce_provider.jar msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\fonts\LucidaSansRegular.ttf msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jdwp.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\lcms.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\plugin2\msvcr100.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\security\cacerts msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\meta-index msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\legal\jdk\libpng.md msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java-rmi.exe msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jli.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_sv.properties msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\api-ms-win-core-processthreads-l1-1-1.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\deploy\messages_pt_BR.properties msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\management\snmp.acl.template msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\jfr\default.jfc msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ssvagent.exe msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\jaccess.jar msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\legal\javafx\public_suffix.md msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\api-ms-win-core-localization-l1-2-0.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\jp2iexp.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\decora_sse.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\sunec.jar msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\api-ms-win-core-errorhandling-l1-1-0.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\legal\jdk\lcms.md msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\LICENSE msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\verify.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\currency.data msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\javafx_iio.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\images\cursors\win32_LinkNoDrop32x32.gif msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\eula.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\api-ms-win-core-libraryloader-l1-1-0.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\LICENSE msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\legal\jdk\bcel.md msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\deploy\messages_sv.properties msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\legal\javafx\glib.md msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\THIRDPARTYLICENSEREADME-JAVAFX.txt msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\images\cursors\win32_CopyDrop32x32.gif msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\policytool.exe msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java_crw_demo.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jsoundds.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\images\cursors\win32_MoveDrop32x32.gif msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\api-ms-win-core-sysinfo-l1-1-0.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\content-types.properties msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\security\java.policy msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\fontconfig.properties.src msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\api-ms-win-core-interlocked-l1-1-0.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\unpack200.exe msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\lib\security\public_suffix_list.dat msiexec.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_241004546\javaw.exe installer.exe File created C:\Program Files\Java\jre1.8.0_361\lib\jce.jar msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\JavaAccessBridge-64.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\jabswitch.exe msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\cmm\PYCC.pf msiexec.exe File created C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe msiexec.exe File created C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\server\jvm.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\hprof.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\cmm\LINEAR_RGB.pf msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy.jar msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\security\blacklisted.certs msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\npt.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\api-ms-win-core-profile-l1-1-0.dll msiexec.exe File created C:\Program Files\Java\jre1.8.0_361\bin\api-ms-win-crt-filesystem-l1-1-0.dll msiexec.exe -
Drops file in Windows directory 30 IoCs
Processes:
msiexec.exetaskmgr.exeMicrosoftEdge.exeMicrosoftEdgeCP.exedescription ioc process File opened for modification C:\Windows\Installer\MSI6344.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI34F8.tmp msiexec.exe File created C:\Windows\Installer\e5d33a5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI4CED.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFFF3.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5d3472.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI4460.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2DFB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3245.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI33BD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI473F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2C25.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3011.tmp msiexec.exe File created C:\Windows\Installer\e5d3472.msi msiexec.exe File created C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10} msiexec.exe File opened for modification C:\Windows\Installer\e5d33a5.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F64180361F0} msiexec.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\Installer\e5d33a8.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI1998.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2F45.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File opened for modification C:\Windows\Installer\MSI41FD.tmp msiexec.exe File created C:\Windows\Installer\e5d3475.msi msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
msiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msiexec.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Processes:
installer.exeMSI1998.tmpbrowser_broker.exeMicrosoftEdge.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7}\Policy = "3" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA}\AlternateCLSID = "{CAFEEFAC-DEC7-0000-0001-ABCDEFFEDCBA}" MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{5852F5ED-8BF4-11D4-A245-0080C6F74284} installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\Policy = "0" MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7} MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7}\AppPath = "C:\\Program Files\\Java\\jre1.8.0_361\\bin" MSI1998.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7}\Policy = "3" MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\Policy = "0" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A}\AppPath = "C:\\Program Files\\Java\\jre1.8.0_361\\bin" installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA}\Compatibility Flags = "1024" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284} MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{44D1B085-E495-4B5F-9EE6-34795C46E7E7} MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA} MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A} installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{44D1B085-E495-4B5F-9EE6-34795C46E7E7} installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\ACTIVEX COMPATIBILITY\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A} MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A}\AppName = "ssvagent.exe" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7}\AppName = "jp2launcher.exe" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A}\AppName = "ssvagent.exe" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284} installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{5852F5ED-8BF4-11D4-A245-0080C6F74284} MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\AppPath = "C:\\Program Files\\Java\\jre1.8.0_361\\bin" MSI1998.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A}\Policy = "3" MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7}\AppPath = "C:\\Program Files\\Java\\jre1.8.0_361\\bin" installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA}\Compatibility Flags = "1024" MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\AppPath = "C:\\Program Files\\Java\\jre1.8.0_361\\bin" installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A}\Policy = "3" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7}\AppName = "jp2launcher.exe" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA}\AlternateCLSID = "{CAFEEFAC-DEC7-0000-0001-ABCDEFFEDCBA}" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\AppName = "javaws.exe" MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A} MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A}\AppPath = "C:\\Program Files\\Java\\jre1.8.0_361\\bin" MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\AppName = "javaws.exe" installer.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
installer.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0250-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0342-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0004-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0051-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0092-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0025-ABCDEFFEDCBB}\InprocServer32 installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0181-ABCDEFFEDCBC}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0270-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0047-ABCDEFFEDCBC}\INPROCSERVER32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0286-ABCDEFFEDCBA}\ = "Java Plug-in 1.7.0_286" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0340-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0342-ABCDEFFEDCBC} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0167-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0112-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0347-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0018-0000-0055-ABCDEFFEDCBC}\INPROCSERVER32 installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0065-ABCDEFFEDCBC} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0214-ABCDEFFEDCBB}\ = "Java Plug-in 1.7.0_214" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0341-ABCDEFFEDCBC}\ = "Java Plug-in 1.7.0_341" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0020-ABCDEFFEDCBA} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0275-ABCDEFFEDCBC} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0351-ABCDEFFEDCBC}\ = "Java Plug-in 1.7.0_351" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0291-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0066-ABCDEFFEDCBB} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0062-ABCDEFFEDCBC} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0031-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0078-ABCDEFFEDCBC}\ = "Java Plug-in 1.6.0_78" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0141-ABCDEFFEDCBB}\ = "Java Plug-in 1.6.0_141" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0311-ABCDEFFEDCBA} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0010-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0119-ABCDEFFEDCBB}\ = "Java Plug-in 1.8.0_119" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0197-ABCDEFFEDCBC}\InprocServer32 installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0211-ABCDEFFEDCBA}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0016-ABCDEFFEDCBB}\ = "Java Plug-in 1.3.1_16" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0014-0002-0047-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0008-ABCDEFFEDCBB}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0164-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0255-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0212-ABCDEFFEDCBC} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0103-ABCDEFFEDCBA}\INPROCSERVER32 installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0014-0002-0026-ABCDEFFEDCBA} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0014-0002-0079-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0081-ABCDEFFEDCBA}\ = "Java Plug-in 1.7.0_81" installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0190-ABCDEFFEDCBA}\INPROCSERVER32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0096-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0014-0002-0010-ABCDEFFEDCBA}\ = "Java Plug-in 1.4.2_10" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0015-0000-0011-ABCDEFFEDCBB}\ = "Java Plug-in 1.5.0_11" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0015-0000-0048-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBB}\INPROCSERVER32 installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0177-ABCDEFFEDCBA}\INPROCSERVER32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0097-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0103-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0200-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0015-0000-0014-ABCDEFFEDCBC} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0014-0002-0017-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0002-0089-ABCDEFFEDCBB}\INPROCSERVER32 installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0010-ABCDEFFEDCBB} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0023-ABCDEFFEDCBB}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0038-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0014-0001-0005-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0107-ABCDEFFEDCBB} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0147-ABCDEFFEDCBA} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0035-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0240-ABCDEFFEDCBA} installer.exe -
Modifies registry class 64 IoCs
Processes:
installer.exessvagent.exeMSI1998.tmpMicrosoftEdge.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0098-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0063-ABCDEFFEDCBB} ssvagent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0002-0048-ABCDEFFEDCBA}\InprocServer32 MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0052-ABCDEFFEDCBB}\InprocServer32 MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0009-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0304-ABCDEFFEDCBB}\ = "Java Plug-in 1.8.0_304" installer.exe Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0015-0000-0024-ABCDEFFEDCBA} ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0037-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0023-ABCDEFFEDCBB} MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0224-ABCDEFFEDCBC}\INPROCSERVER32 MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0369-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0000-0000-ABCDEFFEDCBA}\ = "Java Plug-in 1.4.0" installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0018-0000-0061-ABCDEFFEDCBB}\INPROCSERVER32 installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0183-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0098-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0244-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0220-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0174-ABCDEFFEDCBC}\InprocServer32 MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0151-ABCDEFFEDCBC}\InprocServer32 MSI1998.tmp Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0321-ABCDEFFEDCBC}\INPROCSERVER32 MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-DEC7-0000-0001-ABCDEFFEDCBA}\ = "Deployment Toolkit" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0002-0003-ABCDEFFEDCBB}\ = "Java Plug-in 1.4.2_03" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0120-ABCDEFFEDCBC}\InprocServer32 installer.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0242-ABCDEFFEDCBA} ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0036-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0031-ABCDEFFEDCBC}\ = "Java Plug-in 1.7.0_31" MSI1998.tmp Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0241-ABCDEFFEDCBB}\INPROCSERVER32 MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0189-ABCDEFFEDCBB}\ = "Java Plug-in 1.8.0_189" installer.exe Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0013-0001-0083-ABCDEFFEDCBA} ssvagent.exe Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0014-0002-0008-ABCDEFFEDCBA} ssvagent.exe Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0014-0002-0027-ABCDEFFEDCBA}\INPROCSERVER32 MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0014-0002-0049-ABCDEFFEDCBA}\ = "Java Plug-in 1.4.2_49" MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0346-ABCDEFFEDCBB}\ = "Java Plug-in 1.7.0_346" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0363-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0219-ABCDEFFEDCBA}\InprocServer32 MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0144-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0307-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0001-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0057-ABCDEFFEDCBA}\InprocServer32 MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0074-ABCDEFFEDCBA} MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0232-ABCDEFFEDCBC}\InprocServer32 MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0152-ABCDEFFEDCBA}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0202-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0015-0000-0091-ABCDEFFEDCBA}\INPROCSERVER32 MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0050-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" MSI1998.tmp Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0016-0000-0167-ABCDEFFEDCBC}\INPROCSERVER32 MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0039-ABCDEFFEDCBB}\InprocServer32 MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0303-ABCDEFFEDCBC}\ = "Java Plug-in 1.7.0_303" MSI1998.tmp Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0032-ABCDEFFEDCBB}\INPROCSERVER32 MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0132-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0096-ABCDEFFEDCBC} MSI1998.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0157-ABCDEFFEDCBA} MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0067-ABCDEFFEDCBA} installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0015-0000-0070-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0046-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0082-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0153-ABCDEFFEDCBB}\ = "Java Plug-in 1.6.0_153" MSI1998.tmp Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0311-ABCDEFFEDCBA}\INPROCSERVER32 MSI1998.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0128-ABCDEFFEDCBC}\ = "Java Plug-in 1.8.0_128" MSI1998.tmp Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0065-ABCDEFFEDCBA}\ = "Java Plug-in 1.5.0_65" MSI1998.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0135-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" MSI1998.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0122-ABCDEFFEDCBA} MSI1998.tmp Key deleted \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0139-ABCDEFFEDCBC} MSI1998.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
MultiMC.exepid process 4152 MultiMC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MultiMC.exechrome.exechrome.exejavaws.exejp2launcher.exejavaws.exejp2launcher.exeMSI1998.tmpjp2launcher.exemsiexec.exetaskmgr.exepid process 4152 MultiMC.exe 4152 MultiMC.exe 1716 chrome.exe 1716 chrome.exe 2052 chrome.exe 2052 chrome.exe 3816 javaws.exe 3816 javaws.exe 2040 jp2launcher.exe 2040 jp2launcher.exe 1972 javaws.exe 1972 javaws.exe 3000 jp2launcher.exe 3000 jp2launcher.exe 4556 MSI1998.tmp 4556 MSI1998.tmp 3972 jp2launcher.exe 3972 jp2launcher.exe 2056 msiexec.exe 2056 msiexec.exe 2056 msiexec.exe 2056 msiexec.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
MultiMC.exejre-8u361-windows-x64.exetaskmgr.exepid process 4152 MultiMC.exe 4408 jre-8u361-windows-x64.exe 3896 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exepid process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exetaskmgr.exepid process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exetaskmgr.exepid process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
Processes:
MultiMC.exejre-8u361-windows-x64.exejp2launcher.exejp2launcher.exejp2launcher.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 4152 MultiMC.exe 4152 MultiMC.exe 4152 MultiMC.exe 4152 MultiMC.exe 4408 jre-8u361-windows-x64.exe 4408 jre-8u361-windows-x64.exe 4408 jre-8u361-windows-x64.exe 4408 jre-8u361-windows-x64.exe 2040 jp2launcher.exe 3000 jp2launcher.exe 3972 jp2launcher.exe 4152 MultiMC.exe 4152 MultiMC.exe 4152 MultiMC.exe 4152 MultiMC.exe 4388 MicrosoftEdge.exe 3396 MicrosoftEdgeCP.exe 3396 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
MultiMC.exechrome.exedescription pid process target process PID 4152 wrote to memory of 4768 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 4768 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 4684 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 4684 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 1504 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 1504 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 3980 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 3980 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 2276 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 2276 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 4556 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 4556 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 1576 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 1576 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 1468 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 1468 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 1848 4152 MultiMC.exe javaw.exe PID 4152 wrote to memory of 1848 4152 MultiMC.exe javaw.exe PID 1716 wrote to memory of 1028 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 1028 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 4824 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 864 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 864 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 2136 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 2136 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 2136 1716 chrome.exe chrome.exe PID 1716 wrote to memory of 2136 1716 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\ProgramData\Oracle\Java\javapath\javaw.exejavaw -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\ProgramData\Oracle\Java\javapath\javaw.exejavaw -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\ProgramData\Oracle\Java\javapath\javaw.exejavaw -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\Program Files\Java\jre1.8.0_361\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_361\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
- Executes dropped EXE
-
C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\ProgramData\Oracle\Java\javapath\javaw.exejavaw -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
- Executes dropped EXE
-
C:\Program Files\Java\jre1.8.0_361\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_361\bin\javaw.exe" -Xms512m -Xmx1024m -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
- Executes dropped EXE
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffaf369758,0x7fffaf369768,0x7fffaf3697782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4304 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4320 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4628 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4668 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5028 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4584 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4860 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4392 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2888 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4868 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3036 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5512 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4348 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5388 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4720 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3044 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\jre-8u361-windows-x64.exe"C:\Users\Admin\Downloads\jre-8u361-windows-x64.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jds240964500.tmp\jre-8u361-windows-x64.exe"C:\Users\Admin\AppData\Local\Temp\jds240964500.tmp\jre-8u361-windows-x64.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Java\jre1.8.0_361\bin\javaw.exe-Djdk.disableLastUsageTracking -cp "C:\Program Files\Java\jre1.8.0_361\bin\..\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -getUserWebJavaStatus4⤵
- Executes dropped EXE
-
C:\Program Files\Java\jre1.8.0_361\bin\javaw.exe-Djdk.disableLastUsageTracking -cp "C:\Program Files\Java\jre1.8.0_361\bin\..\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -getUserPreviousDecisionsExist 304⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 --field-trial-handle=1708,i,4752674726029326250,11478786660351779488,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 8E84FB35E09853B15F97400FC80735B32⤵
- Loads dropped DLL
-
C:\Program Files\Java\jre1.8.0_361\installer.exe"C:\Program Files\Java\jre1.8.0_361\installer.exe" /s INSTALLDIR="C:\Program Files\Java\jre1.8.0_361\\" INSTALL_SILENT=1 REPAIRMODE=0 ProductCode={26A24AE4-039D-4CA4-87B4-2F64180361F0}2⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Program Files\Java\jre1.8.0_361\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_361\bin\javaw.exe" -Xshare:dump -Djdk.disableLastUsageTracking3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files\Java\jre1.8.0_361\bin\ssvagent.exe"C:\Program Files\Java\jre1.8.0_361\bin\ssvagent.exe" -doHKCUSSVSetup3⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files\Java\jre1.8.0_361\bin\javaws.exe"C:\Program Files\Java\jre1.8.0_361\bin\javaws.exe" -wait -fix -permissions -silent3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Java\jre1.8.0_361\bin\jp2launcher.exe"C:\Program Files\Java\jre1.8.0_361\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_361" -vma 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 -ma LXdhaXQALWZpeAAtcGVybWlzc2lvbnMALXNpbGVudAAtbm90V2ViSmF2YQ==4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Java\jre1.8.0_361\bin\javaws.exe"C:\Program Files\Java\jre1.8.0_361\bin\javaws.exe" -wait -fix -shortcut -silent3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Java\jre1.8.0_361\bin\jp2launcher.exe"C:\Program Files\Java\jre1.8.0_361\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_361" -vma 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 -ma LXdhaXQALWZpeAAtc2hvcnRjdXQALXNpbGVudAAtbm90V2ViSmF2YQ==4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 14D0FC1DB1F21C1D8EF83B0CE8BAF535 E Global\MSI00002⤵
-
C:\Windows\Installer\MSI1998.tmp"C:\Windows\Installer\MSI1998.tmp" ProductCode={26A24AE4-039D-4CA4-87B4-2F86418066F0} /s2⤵
- Executes dropped EXE
- Registers COM server for autorun
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe" -wait -fix -shortcut -silent3⤵
-
C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe"C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_66" -vma 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 -ma LXdhaXQALWZpeAAtc2hvcnRjdXQALXNpbGVudAAtbm90V2ViSmF2YQ==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe"C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe" -u auto-update3⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 46586AF2BED5ED3AE3098BA589CDADDF2⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 47D2AFA275223BEADCBC8751B2D83934 E Global\MSI00002⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 807B44840F33D8F65A409D457958ADD92⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 40681667334C7427370DCA7DA46E46E2 E Global\MSI00002⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3dc1⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e5d33a7.rbsFilesize
983KB
MD5bcc9676041a43117d46820b1ca04d102
SHA1857051fbf8ba2d2102090b54b4742d7040ccc461
SHA25607235effb770102162cc8248a0a72850bc2aa1322e1c46ebd67ed379288f4f7f
SHA51293d8e761953939bea0458354db5b3a21fcf2174f51d53bc04d1e890bb544673965d760a63d2bc807384262aa66126f955f1f7422967e51c73ad056b184318efa
-
C:\Config.Msi\e5d33aa.rbsFilesize
49KB
MD51723ec4c128c785351b5e4e510ec5ad3
SHA1e1aec70cc703e4f0b9073a5f222f97796543e172
SHA2560aec10e3777937f7194a0719de4cec4e7cc2f7e4b6e359b042f34f6f73b7369a
SHA51235d96d543f93c5982cb1e0ef9b18a1ef3b7ff516180fd7de36b0a4efd49fa2d87a0b997557ea6cd1e7acb6d011fe844c8f9c178b8707e28f7ff46c5997fa14c8
-
C:\Config.Msi\e5d346e.rbsFilesize
7KB
MD55a76f4ae89efa00ab3b1a5eddf87ea6f
SHA131e9a14a25f71e2f8ec3b663f8fc759d1f748169
SHA25674ace5a97861989c72f9fd08ef33a71286d0924dfaec1133dec9a275fee2cb7a
SHA5128b90f4ef26a4e6be40bc85eccf0caec63ead9df5b1aabee858f5e1117c5742da150da8f16bdbf9b8bff538e33228a7aedf7eb34863867cec4c38087552d0af57
-
C:\Config.Msi\e5d3474.rbsFilesize
8KB
MD5eeabd52e1110a38728fb4943d76b03bb
SHA154cb7b390fb4ca86f0a425d8ca8222b5a44e839a
SHA25675c8465d5406b3c2d41679cec249d7190096954625c41571e61d36aa65b11bc5
SHA512f76029466221442b4ad4e010e2835661a2a0408e3491af00aa78c75313dfb12abea8c156fd0113ccdd64311aafe62d996ae6c5401bec06d787cb6394bb3ab617
-
C:\Program Files\Java\jre1.8.0_361\bin\java.dllFilesize
163KB
MD5db081a9968bb0c37a57725cdb66a0c7b
SHA1d5fed172d82111d1f3bcb46ab3bd8b412f3ee003
SHA2565b9b01f1ec06ad559285201cf0907e1c31473f6fb91aa09813dd8f076f94afe3
SHA5128a3717be2bdc1d2e628a069a61ac5b504467c52c7b52496c14050cd0fbc3e1023c791ca8b5c3270579e1cc725a8a0cff62c427dc1c25c2ec74725d1dacc621d5
-
C:\Program Files\Java\jre1.8.0_361\bin\javaw.exeFilesize
273KB
MD5dc1ddfa9036cd403e17fb7134aff000f
SHA10183543dd2fbb2ff7d0997c56ac624e6b2ebff40
SHA2569bb8aaa6673ec46e5e9cff88fedefad4b33941b0831f4a7047433a24399e9692
SHA512ecb7603a5f07a95ce3506ecaf38cb07ee089070cc041ce0c92722cafe8c3545b73dd5bf59f06115291b774d3c034c6e677f6fec2780208fa73e387d7c379cb9f
-
C:\Program Files\Java\jre1.8.0_361\bin\msvcp140.dllFilesize
613KB
MD5c1b066f9e3e2f3a6785161a8c7e0346a
SHA18b3b943e79c40bc81fdac1e038a276d034bbe812
SHA25699e3e25cda404283fbd96b25b7683a8d213e7954674adefa2279123a8d0701fd
SHA51236f9e6c86afbd80375295238b67e4f472eb86fcb84a590d8dba928d4e7a502d4f903971827fdc331353e5b3d06616664450759432fdc8d304a56e7dacb84b728
-
C:\Program Files\Java\jre1.8.0_361\bin\server\jvm.dllFilesize
8.2MB
MD5a5b5e313919826735b73731252a2bc2e
SHA1090054f0aeeaaac570130ef5a03c26970cdb050c
SHA25686765f3558ffbb2cf28fb683ee17c288967e636b5cb4fe0422ade39591f6abf4
SHA5122e0199624f91f9c952ea4fb81a01096febe8dde6fba85f66e7978c98ba749da3cd53cb6d986260e357c19a1d3b5411d6716548ef57e31ec75d55f4d3a3420c3f
-
C:\Program Files\Java\jre1.8.0_361\bin\vcruntime140.dllFilesize
83KB
MD51453290db80241683288f33e6dd5e80e
SHA129fb9af50458df43ef40bfc8f0f516d0c0a106fd
SHA2562b7602cc1521101d116995e3e2ddfe0943349806378a0d40add81ba64e359b6c
SHA5124ea48a11e29ea7ac3957dcab1a7912f83fd1c922c43d7b7d78523178fe236b4418729455b78ac672bb5632ecd5400746179802c6a9690adb025270b0ade84e91
-
C:\Program Files\Java\jre1.8.0_361\bin\verify.dllFilesize
54KB
MD5c15088054d639475e51b88251369c226
SHA18849a9ee53e6bc7d1618103b674a6f481b72f3aa
SHA256a7e7890ec2e238b3108fe2d9b4796898b2fff30ce07957f60689975d7460098c
SHA51281ae70caf0304c63adadc3437e592ea9540db59ac7bd7417b769b5702a2aa012bec79aab8ce01187ebbd78555b7824fc4434a113dd9be5b667ce693b293122c4
-
C:\Program Files\Java\jre1.8.0_361\bin\zip.dllFilesize
84KB
MD57c7a8adce66eeb67a96ca617c8286d72
SHA1da1f100637f0b94aaea4e3999ef96a32a63bfc2b
SHA256d15be64cc05ae14db69b5a3558cd57767eda91e708c74d3dccdc4958c42cb5d9
SHA51200d3c1145b8c8ea246f456000c2fcfe1e978d148ad69ddabdf9e5f332db4e44025211916c6452b5030f8326d523d6e72de8aebd9e41d83afccb8713e88782f31
-
C:\Program Files\Java\jre1.8.0_361\installer.exeFilesize
1.1MB
MD5dcb07febfc873261ae0c351d327027a0
SHA1b3855001990bb500212f4f8b421594e91f45d5f3
SHA256e9d0623547dd40d5ccc42e4718d4e307241fcf2d4a5df93d1ec0fdc9925aafac
SHA512374d8d4d39e344cc050ea0cde3a51db801ba77b18c85934820e6d1f37101922878b4107dc506f5be7ab3e0f2badbf0ace87bb0ab5713f5bdc27df00731f84dff
-
C:\Program Files\Java\jre1.8.0_361\installer.exeFilesize
1.1MB
MD5dcb07febfc873261ae0c351d327027a0
SHA1b3855001990bb500212f4f8b421594e91f45d5f3
SHA256e9d0623547dd40d5ccc42e4718d4e307241fcf2d4a5df93d1ec0fdc9925aafac
SHA512374d8d4d39e344cc050ea0cde3a51db801ba77b18c85934820e6d1f37101922878b4107dc506f5be7ab3e0f2badbf0ace87bb0ab5713f5bdc27df00731f84dff
-
C:\Program Files\Java\jre1.8.0_361\lib\amd64\jvm.cfgFilesize
634B
MD5499f2a4e0a25a41c1ff80df2d073e4fd
SHA1e2469cbe07e92d817637be4e889ebb74c3c46253
SHA25680847ed146dbc5a9f604b07ec887737fc266699abba266177b553149487ce9eb
SHA5127828f7b06d0f4309b9edd3aa71ae0bb7ee92d2f8df5642c13437bba2a3888e457dc9b24c16aa9e0f19231530cb44b8ccd955cbbdf5956ce8622cc208796b357d
-
C:\Program Files\Java\jre1.8.0_361\lib\jce.jarFilesize
119KB
MD51f4d4fc6b33c30c5782c66b80d92c4f9
SHA1194df32fb23b470dae4929605d18abd041c743c6
SHA25681b8de0e148ed3601cf5f1bdf2787c5b15213d842bc537af9ede9635d692b904
SHA512dfde7e03fc106b785887f2a409b3528c5862663f188c95f6a95c739bdfcc8c6205c03b739de1b259e9a8a0360aa4e10e8d4bce1a57445797a214160b8d98a085
-
C:\Program Files\Java\jre1.8.0_361\lib\jsse.jarFilesize
1.7MB
MD5f095a5ac04775e1093d54822460cc5a7
SHA12e0f0ec528c41b437126c506a91fe1ad5e699865
SHA256784b8df88387ee27383d6db4e184b169a21cb4b8bcb0d8395a7b1ac2b128108a
SHA512c0b5ca94ead3dffd33e19a2d757b2b653867b4f539a143ef17baeef1015c3845aba4f0666ef1d0c7ce02d156ce826b9c324c8159983a71d19d60415d60e25d36
-
C:\Program Files\Java\jre1.8.0_361\lib\resources.jarFilesize
3.4MB
MD50fdcdf2b521c8ffba3fcae32a684358e
SHA145a3ae43334b1a0f46d76599d3926c40fa790965
SHA2562189d10490922562be379da742eedc5e77cac61a6d2a484a3ed4693965dfe290
SHA5121a1489faa7903bc24d4cc3fbd0ee80e79602a39ea9530f10075a52460e6100c807dbafb17e4b1a7997c23cbe3906808291be7718e6525a79a295e1ddc8ed9eda
-
C:\Program Files\Java\jre1.8.0_361\lib\rt.jarFilesize
53.2MB
MD5f9067274f870f513dee2284e9089d2b9
SHA16aab77a3bf6c208adf805432f407dea41833e70f
SHA2569016dc6f643af8b411d38fb6189f6af0e6bb39210e3ca379c8313f666c94aac1
SHA512510a34d46b0187f8360373df3e023eda6b98c1187e35b24bf4bd9e5fc3774532e1e96d93ee08bb3b7e130404855a3704918038f5df4a614d4f520ea896df52c2
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java Development Kit\Documentación de Referencia.urlFilesize
195B
MD5a5422debbdc81da65f5fa2b17da9eeaa
SHA1e9c01053c6c45589462db2e31bfd7c6ffea60f31
SHA256239a4ee2824fa17a17e0b84f94a07fc4bc56edf3f9cc426daf3878d16e722e95
SHA512f49d75c09140e6b5ec1a2c64ea102396d57edb0c2312a1ab27cb3d0919726965ba3ed34a992898661f974a0405db57a1e5f8948345bebd72e52c07a796ba093f
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java Development Kit\Reference Documentation.urlFilesize
197B
MD5faded0d5bdcbad42d8f4826cc3c620fd
SHA1c49c34f2d2160297b1c0c71c327180ed52ff673e
SHA256d869d1b0c391cd9ce8f0c633cb8e5731c5073c33f875b32a2a61006a3c1bb24a
SHA512bc60186037724353460a0f7af8b207ccabe64d80aaff796d9ee082c6cb6573ff214dedc22080fdf23664ce79f7604276e1bab746dcf2407a46e40ff38b7119cb
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Get Help.urlFilesize
182B
MD5472d99cc0c3c745e9d794af2495e1073
SHA1c1fbb2d17fbcea3d8d76d4516cb099ef89c3d6ce
SHA2560a07df0e4ca2361cbd92c5c56068d8ea51cf0cfcc755d015cd1034c250cf1f9a
SHA512bed250fb803323ebef7c6af71912572767a6e36e4ed54886d773758e3470c906ca9995dd54c64b43f297c7de676fc47936ced5c81cdf3fa8ee9688d9c96a6e27
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Obtener Ayuda.urlFilesize
180B
MD5ced45757da7212b9c8419d34ddadce4a
SHA1e88a8765caeb6300a71111d71b1bf00a4f922391
SHA2562b3049bac564084a0c1dddb06fc74c52fd2cd433375fdefb326cc1587c906c67
SHA512c1cd76f468604b07fa21430bcd5214331ce440bba540426ba823de2a67e3363397fc440dc3d64264d5a2b81746ad420aa44b78090f4b9b03abf43546fa8fcdf0
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Visit Java.com.urlFilesize
178B
MD5629c2e7a4d9e24406873fe2fa7543be7
SHA1d6c48edc07e35c1b84fc2bf5f74367edcd2bd3d2
SHA256cf23fccf15c640cda1a383a09246a5a1213ebd5c9a1c077ad5cddb785f4700dd
SHA51200cd51c0377e9c058c3cafcf4ba03ffbdad37711b4bafe054eba978fb3dc4c178cfec0d292d4fee27aea42a8b39ba8187866ad4d304f8b74662bf1accfaae8e8
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Visite Java.com.urlFilesize
96B
MD557b3fd2ca9bc067c65484e915d019e1b
SHA161f183ab0926830c3252fe833ab048b6c4381fe2
SHA256bc5beb7c82f2a4ac67adc4821e52addeb95f28f6929945477eaefd2378a02912
SHA512c13a8d2784a88bd2653b96661473ada033ace1cf6f858cac798bf6f5aa9ace4bf6f0e1b1b5f9e286eadf6ff6a8784a3b9abe55641eb9798c1c91b03cbf15fa69
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361_x64\jre1.8.0_36164.msiFilesize
58.7MB
MD5407d36101348022e67342b44292d2b39
SHA11811ab3993672a9f329868622d96014043bd5f4a
SHA256213e9fa760dfa2af22a4ac94a10c7f21f4b482aa04e8cf3706264e4c17d2481e
SHA512cd78f2d3d8057467f87c846fd2252cc2632de822b2c5d37a9f2bcd0c68fafe598bdc4bc69760cd7e84037a5b28b3f11a4385684962857e3ce572ec9b302f0c0c
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\deployment.propertiesFilesize
1KB
MD5b3cf32be72e68cd5a300d5e6bfe633b9
SHA125f41c86edd1d89670af07a53faab913070ac3b4
SHA256bb80cfd698a4f96d1219ad6bebbb292b00f8c3ec6ce0833b08d881caaf923ed3
SHA512aaee52a23b9982cde13f2fa4ecb3e5e1fdfcf43ea33b86af823a2d59131513a86e57be76962b3c3d11914aca42308874ee15ee33fcc299d8e973fad8da4e2e05
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\jre1.8.0_361\Java3BillDevices.pngFilesize
11KB
MD5b3c9f084b052e95aa3014e492d16bfa6
SHA10e33962b2191e7b1a5d85102cdf3c74fcd1254e4
SHA256a68ddd67f6fcb0bbf1defa0778ee543e92c1074c442197ab623f733cc6285948
SHA51206f51ac2962a0ec5f05ad6c90a2ba85b851d1fa2f0c079dc264fe930316cead959f68f6e34ff591b131867b482c266ac42400b06385dae712637ff0a90f902d4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000014Filesize
49KB
MD58991c3ec80ec8fbc41382a55679e3911
SHA18cc8cee91d671038acd9e3ae611517d6801b0909
SHA256f55bacd4a20fef96f5c736a912d1947be85c268df18003395e511c1e860e8800
SHA5124968a21d8cb9821282d10ba2d19f549a07f996b9fa2cdbcc677ac9901627c71578b1fc65db3ca78e56a47da382e89e52ac16fee8437caa879ece2cfba48c5a6d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000016Filesize
102KB
MD5140024df3ec5b5f924a64cac58a74351
SHA13772631bfbcdd6f7dbfe6c171173d48a269de858
SHA256faae55d88c6981973b1561e275dabe1e074b2f3cc59a9ec6bd49458a13a391be
SHA512a0d7a28aa2de427f633b7e445b0d728605ce9553c4d81f6d3536ca84a6cc83b4be463af4be9ef58f31eb11701fe3b9a1b6276b56e89d4dcbbc7922c8425e65f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000017Filesize
131KB
MD5afbdf4878c534ac0f013755a75b9776a
SHA1571e83ac1897d6b5765ec3b3f3178c97f55e8b82
SHA25622331abebaaf2805c445d8ba2861c74d30078257470dc2afb413dd8d2f9558d5
SHA51259dfa99c3c10a3c7bff10824878b1395b5b94d3d3c7667046bb4943ea3cb6061cc62507f963f68a36f662674be6e3fae05adef6ee692a5752ce0d71908861154
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001aFilesize
244KB
MD54c8b3ef303d2dc2af261652e7524a5df
SHA195d639ec6dbe0d55176e5ac0e6725a7db2eda744
SHA256b77fc40105144967dd5eab6353d1e267d6adde572dba22bd79633efed608e26a
SHA512fda2302a500b71da3f75c57074d35b69c9b031e87aa96dd661a7fd70d04b15b68e30b27f2570d28640f88187c8a27042358a8a8239f668ab69bfd5a98d914432
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
144B
MD587b2d73860a8b416bd430e79b0eab2ef
SHA1f9dabcd25851085a43c3da572a50994fbc858a0e
SHA2566ef85c0b455665ae3fbb7aa88fbb260788782eb752bdee22c97bb65b262eefe1
SHA5122f49dc827283e734ccd4bdef9a1828befa634c161a7d8da8f56e1685e5f8a0af435808dac29071c0de53538f0ba2974cd4837cddc7cd86fed261ee948957cecd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
840B
MD5bd0c1d7887dbb3c3a1ca7c3fce64998a
SHA1b3f91de9f00297c3fe7c6e5ca42292db77073c47
SHA256bf4ba20ee0a9cc91a1134a8aee05156b7694f894f46a3f13142032e27bc06c49
SHA512c5fc3a6991b3529bd05d5d759456d9e9e8d1dd5e3fdad81f36cb7ef694b21f89393beeefa48a9ebd6c434c90dfc976b82a3a9ee00ffa5ae3a450c5f62b779154
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\1c0523d7-8173-4a05-ad83-cac2ef74dc4e.tmpFilesize
1KB
MD559851bc5bbe852074cc288919f370229
SHA1e4a3a3b4be0520f632b4bfa08f79d474933bafb9
SHA2560000eab484f6d864d4c8e149af935e5360f5c0200827c13348337b43e0354274
SHA5120535b6e447f79387096f2993ffac3a2e5be2036c55fa80d281eb2d650d9a514171dd5828c048a8b5f084b68345e8b02cc2eb30b168dfe3cfb9f1e1c2ac32169e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD56d16c8ecf9ceb9bff5a1772b11263ad5
SHA1653d6b878eebec8ca532a498cad007d6c9c70ff0
SHA25645c4b322679f04af1981dcf9abc210fa68647f9cc76ca607568509e18eca3254
SHA5123e581e05d2ab7b15cbafe0d420eb949afa3449d47abda5930fc5d93ddd5b1ca5bcc9cfeb29927890e5b524947d44e32c8d28cb4977d3d2eb45b03b5b812ef24a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5c186eea89314ca6cad75b59fe409eff8
SHA1d9e31f8a2aedecccdb0f3da11b7c895d20573855
SHA256fda906feff2b06e9437f204eeaa090229c67cc8cb6f4f33beff4e391b470644e
SHA512e5deb9598e55892156e46d71a45b82fde9bf6ee0e1e29f6c340f584f83b2e286d99cead99ce691acde3613dbf1676fff59c3eebe2218b1342811e72413a9ce31
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5467e5366824e2afa2c059fc9a01ffcc9
SHA1afce8aa90b2f0c83ca51636b03deb86365582913
SHA256dfbcb509e2ab53036234e99ffdb12c17401f8e29f38e9fdae04f1fd4a336bb2a
SHA51207b5513f8b68503f44d11eb51589ed4260f76b4f936ab6ae896a55e3310b27fd0594bd4835faa5f926a9b4238f2b8fe8e49dd7a105e4ff912ccd9ef066e4f5d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5aa08eb4af54404230be4d5a986e8c870
SHA115ffc086765a1b268f55fa62832e72aad395d599
SHA256757e819f044f427f4dad4120741b9832b5cf067adbc146d87751df1f93afa96c
SHA51204eefcc87a8787f09d0e273adc4c835ab56df83e6a29cec754cd8226d6749db8c6025c4689c8d59591c9dfbecc50ee53aebb9ea1fdb6b12754d59746e384aeb3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD51a88e354041197ac202f0211e9fb7b6f
SHA1723c63beda549592a875b463dc430d2e2141e6c1
SHA256e67214bb3b362387aa45c993ea292caf9c5deef9ec0757f2beb6e87f8b70ee17
SHA512d0b9f75f1671cbed99dcabb9c707d5d8a52f33a55fef24932f37aaedd91d7048f3e5c44b2af71445916270fd84e37e9dfa50a4a360faf2b24d898f41269bf095
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD53be1ba24b43aa502edc920350ffea7ef
SHA1ca046a8a0443a38e3835b4457d309ae38f86c520
SHA2562e5a7841d0ed64dc1b821d1edd86d1cb8d0be4d6437c24d7656be96f9b44da9d
SHA5126f11f6f88eff74311c76a7253bfcb17f79241fa79320bc11f658fa4f72dd524aaf2b490eed0d37a8be8f06395f1d059ebe68a938d4f8ecaeed60da3eb07e063a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD543f6ef72808c37b3b9b89dc15747eb46
SHA17f77c6deb902ec5dbaf2fd7e60d83c6d2346df2b
SHA2567ee99ebf2a6b3cb5c2ea9e0d32dae048d451714f2817448102dcc5ccca4f4000
SHA512578082809c23c6e9dec529659759f7eae0528f7cdad04ca9d8da747881b0b597a521f01b208f1576bacc5d351e378e1bc0123aa8347661795a8860c6fbd360ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5c4402593beedf21b002da0f823725023
SHA143849e544d5e665eda50e36a1da4877d0c3d8fbb
SHA2562cc768a33956ac7f23b6e706649b440104dff5bb66229f1472f94576c5cb5b86
SHA512f71ea0cda00924baa4495bd88d8670966a3506cdc885851b5ee086bbaf16946533c20777950371dcc7061e2aff70c62d907fa4413db92c31231198e9322326a7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5f65a8583e9dcd500ad18f3a66245badc
SHA18a6658848c24b817501cbfb87cdb60b31e5301bc
SHA256c75f3cce1837709fdf1be368409d8ab3251e5e605bfc9ed76527e744ff304f34
SHA5121399f52a6580352abb4156ba53ff729b1254aff0fd574c7fd3db063a85420096e3f315cc5ae028f1ca9951ba91fe6d9e81320d5ee3483a74d7ef5d8fc7ce2405
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD528e517b73df4d6643dfc7094a5ea3c5a
SHA1c548f325ab9a611a69cc71dfab995591a8ff0011
SHA256110f8113dfac375126ce1449f6db82b67a192caf3a8ac25a55a63f14d342f992
SHA51291b185fea92f6f738a2e0c19aa004dd15c91e331a843e73ffcf79326cfcc4910ffd08ba71d6c409ec3e9d710173c8f942b75f44c0e2be52ff290435b4f532c3b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD57da700587cc77cd4b538b3372e5ff2c2
SHA17695ec32eb22afcc1c7d399108986d5b09632261
SHA25625ca5b9ee7ce0b70492b4ceebcded193c228ff003c4052202e499dad2bb70fa7
SHA512c5bac9c681f643d506d59ce8975d23bcbd740766b1c99b837d5ddf64f147643bc2046c2a47a18d39a7f77ec6a1dc7e8fbddf59ae8a8df1dca50054d93ff6aa4c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD55b8c703e6536070aefa12d3b61d4f9af
SHA18637d4da09319034cb55192cbabaafbee19d3152
SHA256a00eb3db403451981c6b9f84637c56ee0770738e2442349ee49537f60a6375c1
SHA512e7e881109739c01f852f2aacecc0b5f4f9e0ac8319a0b4bbcaeec51074cd4154463247ee23af3e31da5a9ffb3fae8e2b5146e9795e0465c58e7faec56b1fef0e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD50b3cfc9cf2ac53a2c4b3a3ac831e6ebd
SHA15a97f35e9dca1238d6e312dd7221547a578b6ddd
SHA256c5f20ef75a207c623d0a228e473298c20ec2623a05420cb3a33be6ee333a507b
SHA51260b07d173e045fc31ce3ae3ac80ba96653215e9208dda51727e0a022e3582096cc2ad44cfb278884db2c75aebae69e1512c5706845be9f0b1c29ec4428c89971
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD50896735e0f6c2e6bb0899e92197e0eee
SHA1a9e22929bc5e784e2373002dcc679741b136a1f9
SHA25652a0a0486e4cc58aafea26a7e2d49dd80dd13e263b48c50cda983392c014b250
SHA5129051c34514ff2f018f291e26581be00afe1dc691f9689d904d4b9a95a36f753c9ebd9a1e0eb602e7d5c387e0896f6ecbe08aaf6d0c0985ebaea5f8c7d1490f92
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD518117cf8bdcc96767b447f116eef1d7c
SHA1144c175057ca13b6dccfa0f34d94ff6e812e7166
SHA2569be48accace2daa9d86d4378c1e8a59b9ce60796027c2f15905b1d7ee0f21058
SHA51262224b0f665aa491bedd65c2df60780e06c859c9c5de8fae8618fa7fda285c1a3a2db411d13f8a12204cd124e427cb1ed7818fe3dce6664e1049a0fb4755bcce
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD542e114540409368f3395fc880fb9fbe7
SHA121c1fd01821d59127d288f8c25479addb22e10cb
SHA256613cd950df7b827fd547a92acff43b92a76b815545c77ab313556a292bf6c7be
SHA512e30773b2c6bf5b5b2231400ca52d8b7f6b7a941458c1f1bc474887abba757bb4a876b4b4d00b6157113ff99c587a94342847bcafc32f79814bcf1c90267be391
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
12KB
MD5920ae0a0906fdcdcd3c02d76be425806
SHA106f696f8997213a61687bceaebfcece558d025c3
SHA2561726880f75e208a4724e338d8ae596f4e170725f1d063dd146edc4e518e9a9d2
SHA5124992318a143d5dacd4b3792be5bd092a6ed8eab9e8baba2a076add8b7b8c01f3661d6674395f424c344c399576e57745cff8f38aa7601ab6fc3e9bb35dc4b8bb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1Filesize
264KB
MD5a729319e35d683de5358847076287752
SHA1b5d914105ef97c61537a8f79319a29722621260e
SHA256d29add1e95c5a7c968fd5b3e2955cecb4e40b9ea58b0e9a01432ae4ab1163e81
SHA512a769252dfa68ab2722d052a3358df960fe06a1ac52fef9f083c5afc07be0947fd8fc7b3a948f10f224c1a61ae7f4d3315f1884e18594cc383d90de7875b37069
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
141KB
MD5528480ab497397c85423009acefb74ad
SHA18b3ffa9ae7d197e2a30f24b6cb6c3f0765b8b94c
SHA256b51fc3075b9d12673a98f98c3486b1a990f1bd32e864b16e2be606687246a70a
SHA5121da7fbd5cdd188c81ca1deae4bdbba6436cef47a49bc88b47227b54d5a78f95926f4c621cdbd92f3f9bc3fbacdfee3040a45053f6cf410df114677801962de6f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
141KB
MD58dd0607caf9a0f86a15ba0f1f895f1a6
SHA1314a9c06a6171153c03b1266ca2226e9e7a5ea11
SHA2561f46d3ff4b7cd907560300808261dd7c33902a603032c3ff6ae081a1f5b29f1b
SHA5123621027e618f6c3623996d18e8cabf1d9a6b3f226b5fbe5f6db5d835752d58c75198684f05d77ceff20b42bf43e99fc88ce1a94efa0656affebbb976ce7aaead
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
100KB
MD5c5caa358973af26cc91afd09d82232b5
SHA1862963f05e46eab54c2d668054848c7ecf1e24f7
SHA2566957e979dfeadb607fa21bf872aba668823eab7372e4e616cfe32066e6ec3ed4
SHA512c3c31c3070626452c66c6787c873346cacf5429366f09e4c46b63145029e02b640dffba0889df5c9d427cf6f1cdd88e46e371d62990d42d54879dde92ac38709
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
113KB
MD57ea293db9662c4ee3b897b5f40568ab7
SHA1d4e1f01a7a104ffc486c0e7f643d41cfceb76546
SHA2561e47e95c558f59b4008bb5547261edb63d03743a3cf71c43e1ca1084fd3c6605
SHA5127a8eddb82a30c0a9abd243d2b0fd3c6f274975132f9e784e1aa0710dd90bdd863bc6727e24af6bea11f90766a7015f44b0963604fd441579512c7f97e141f4d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
107KB
MD5df925fc869904c97dd7dadac20ce9be5
SHA13845c9c9399abf2b6245effdb3487242a8d72efc
SHA25638af159b1e6a0966d432e4e363ed7a48d5d0142d08a5ecfb4e6582b790b56cbd
SHA5120f968afb1a30a42e6b3e0e307ec5f4df3d9310c2fd148173d139479cdfdc977da844a8e68e3e9a3d6e58a60788035f4c2fa27f157d77cd7affb9f78bc16533bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5c13af.TMPFilesize
94KB
MD5f9be77863043c7aa8a1be363c76d39f6
SHA14591c6786a3c4202ef6efe5e575fe873358aaa6f
SHA2560ece2cf4832bbc5bcdf66aa8e090e7101acca3a09bbcf698cccc2b9dceeda412
SHA512a239ad14410dd8f3f1169d8b2f82802021b80b9f6b4a0a9fae32ed0305cf073c020df2252cabe05d39a1c8f6e3a80f353607345b69a50c0573b97ce4b330b979
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
14KB
MD5d2db80e89ff1fc843ab3753426d0f493
SHA11605bc47f17227ae276e8e873043cab6baee80ba
SHA256e9c25ae1c4b0eb9697bcab9bc4464b93bdb1cd5727e834e8b797c62966631c73
SHA5121d63d29d4fe6211d956ef70d1383566191a22f87aabbe9c31f1be117a71f12c9bd201b420e64034fae8d98ca68b3f043f8a502eae4160de211788d04fac47f08
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
14KB
MD550f970828b8061919382ea6d99ee29b0
SHA1a702250bc1808d10473968fe4241c51054e090bb
SHA256bf6ea40c9f4722eabce2f3ae78859fbfee5191aa2c9bbd9ed59537accee49a3d
SHA512aea60e74b675f4ae84d1d87151290b73dea103ddecb9317a96e420713a938d740c30996bbcf0b51a2f7122a07cae6d4a98b2e541dbf6c713257cde9e581379d2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0PBDMEPO\l10n[1]Filesize
4KB
MD51fd5111b757493a27e697d57b351bb56
SHA19ca81a74fa5c960f4e8b3ad8a0e1ec9f55237711
SHA25685bbec802e8624e7081abeae4f30bd98d9a9df6574bd01fe5251047e8fdaf59f
SHA51280f532e4671d685fa8360ef47a09efcb3342bcfcf929170275465f9800bfbfffc35728a1ba496d4c04a1fdefb2776af02262c3774f83fea289585a5296d560b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0PBDMEPO\masthead_fill[2]Filesize
1KB
MD591a7b390315635f033459904671c196d
SHA1b996e96492a01e1b26eb62c17212e19f22b865f3
SHA256155d2a08198237a22ed23dbb6babbd87a0d4f96ffdc73e0119ab14e5dd3b7e00
SHA512b3c8b6f86ecf45408ac6b6387ee2c1545115ba79771714c4dd4bbe98f41f7034eae0257ec43c880c2ee88c44e8fc48c775c5bb4fd48666a9a27a8f8ac6bcfdcb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6FGHNCOX\common[2]Filesize
1KB
MD5f5bb484d82e7842a602337e34d11a8f6
SHA109ea1dee4b7c969771e97991c8f5826de637716f
SHA256219108bfef63f97562c4532681b03675c9e698c5ae495205853dbcbfd93faf1a
SHA512a23cc05b94842e1f3a53c2ea8a0b78061649e0a97fcd51c8673b2bcb6de80162c841e9fdde212d3dfd453933df2362dcb237fe629f802bafaa144e33ca78b978
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6FGHNCOX\runtime[1]Filesize
41KB
MD55d8ba774645709c0fe80b366ba4957dd
SHA1a43863cf572730d880892984e2d9491e662d8ade
SHA256885c6d677901821d6bcfcb10069675f9cda6cac58bc9f82fdde02f54dd07380c
SHA512f09def78f8162142060c6f6f1b9e7e7821278cfa439f1d37422a7ed01e89039d1167e9b1467f94d88dfbd5d20b1a440493add14fa767c75ea1bde7f9b5610818
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\B1FTPK9F\rtutils[2]Filesize
244B
MD5c0a4cebb2c15be8262bf11de37606e07
SHA1cafc2ccb797df31eecd3ae7abd396567de8e736d
SHA2567da9aa32aa10b69f34b9d3602a3b8a15eb7c03957512714392f12458726ac5f1
SHA512cc68f4bc22601430a77258c1d7e18d6366b6bf8f707d31933698b2008092ba5348c33fa8b03e18c4c707abf20ce3cbcb755226dc6489d2b19833809c98a11c74
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PC8JD7GN\host[2]Filesize
1KB
MD5a752a4469ac0d91dd2cb1b766ba157de
SHA1724ae6b6d6063306cc53b6ad07be6f88eaffbab3
SHA2561e67043252582aea0e042f5a7be4a849b7cd01b133a489c3b2e67c10ade086f3
SHA512abc2899705a23f15862acf3d407b700bb91c545722c02c7429745ab7f722507285c62614dcb87ea846f88fc0779345cb2e22dc3ad5f8113f6907821505be2c02
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PC8JD7GN\layout[2]Filesize
2KB
MD5cc86b13a186fa96dfc6480a8024d2275
SHA1d892a7f06dc12a0f2996cc094e0730fe14caf51a
SHA256fab91ced243da62ec1d938503fa989462374df470be38707fbf59f73715af058
SHA5120e3e4c9755aa8377e00fc9998faab0cd839dfa9f88ce4f4a46d8b5aaf7a33e59e26dbf55e9e7d1f8ef325d43302c68c44216adb565913d30818c159a182120fc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PC8JD7GN\masthead_left[2]Filesize
4KB
MD5b663555027df2f807752987f002e52e7
SHA1aef83d89f9c712a1cbf6f1cd98869822b73d08a6
SHA2560ce32c034dfb7a635a7f6e8152666def16d860b6c631369013a0f34af9d17879
SHA512b104ed3327fed172501c5aa990357b44e3b31bb75373fb8a4ea6470ee6a72e345c9dc4bcf46a1983c81adb567979e6e8e6517d943eb204c3f7fac559cd17c451
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logFilesize
512KB
MD5a8c3836884728a1cf63c307c676054d2
SHA1bb87affb31bc939ef4703f256f8f7ca7c6344a79
SHA2560a19f30655c048c567014149387e02f2e02373e23c94de736af90c9becdb6158
SHA5129bdedcf5ed66c0e48c4521f200fca3f1c3c3fa242e2ee552a840ea22c6c5ab607a9a43748c90cd767750adbb9a8351933a9a63c0f6416672e185167c1aa50176
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chkFilesize
8KB
MD5c1b6d97180f2968913ecd64dcc6fc9f6
SHA1aa274ba58fe244678e036c15223699cec63e9a9a
SHA25693a9a78a376b66d77318fc9a9f16d028cfa55396ece405c6c4c630291ee07c33
SHA512a8b35ec2079e5abf177af986ceb17bafd48c13cda5800751985aaa075f2d9577669aa77a899424dd1fd25633a234757cb8fe81011329253d8a42d99a7c49cd4e
-
C:\Users\Admin\AppData\Local\Temp\JavaDeployReg.logFilesize
50KB
MD51ebc92923d350397a9b20bff342d88fc
SHA1c5afef9e6e1108d44ab2c343d68af14f2e8dacac
SHA256194bde1869f5ba44377317342439e6fd5d0638ff6a42c903beec6012fc15f822
SHA5124d75087505fb19bf723265aad2be5877adc354f5899205fdf82c72befecd08230e2de61208d78c756e5414f1aa684c25e3100f3918b25b1056bd7b1c2bbe33b4
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\cache\ModrinthPacks\logos\i0ue0k1JFilesize
37KB
MD5978e433e64d4f250a46d5236a3f5e0e3
SHA184c4112580562c00302eb5004208c552b7ca248d
SHA2560bb88d8be4936fb484e1c4560169b9bb353401f955f358897603fbd15e2e72c3
SHA5128a7bac2ba475db9f5f979fb70b96dc65de3e3123a3e36b63aabff6244e564293f935ed0f5f6450341bebc62c92c47c2ed9cded1b44e3ddfd2e2fed05af237522
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\multimc.cfg.zQ4152Filesize
352B
MD5307c29ae1b6b4e2fd369252a89b58e62
SHA1ff77fa89b8b62c18bbe02cf0e53cfcb6f5e97502
SHA2564515fcd5f1b5b25601f1ed84e7b5a691189c482932a20cebccb83523ff6ba800
SHA5127acfe20ac0ed066f9a6e3f3e21476730070b58dbab284dd6d1e9df2c325d0eff4af0b238b58e5850ed05d42f48ca1a0275b8d971ee53c697f03294cda604b114
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\translations\index_v2.jsonFilesize
15KB
MD54d18ce01732ff1fe8305af3d74e6cb41
SHA143437da4cbc9e0e6adbc88a76e75721963c07d3b
SHA256284159c2183faff37ff5659330ea42e31acc1ab105f68f9efb5faffc83ca98fe
SHA512d2e9466bfeb76eb46d9d1cd144ef04c3f51512bf92b2f15d3d62344e90beeabc5b117a5afbcac860cfd4910e66f8716f59a68837bcd125851a15d548bff122af
-
C:\Users\Admin\AppData\Local\Temp\jds240964500.tmp\jre-8u361-windows-x64.exeFilesize
61.7MB
MD5e920cf3e63612868ed4b6cd9612bae77
SHA1ef64fb46f8e955430d6fbd3778ff03e4c1f0e1b0
SHA256a45104f8bf9a356b538f74aec9c7d25b92bef2d8e97cc27ed6d7232294a8ed82
SHA512b02af44d9a87e06b0309e842d550b54b92575ba36a3ea74184bba40d4665751d91c8547ddd9c1c009d413f56829f7fcc604592ba51118c916cd1e039930571b2
-
C:\Users\Admin\AppData\Local\Temp\jds240964500.tmp\jre-8u361-windows-x64.exeFilesize
61.7MB
MD5e920cf3e63612868ed4b6cd9612bae77
SHA1ef64fb46f8e955430d6fbd3778ff03e4c1f0e1b0
SHA256a45104f8bf9a356b538f74aec9c7d25b92bef2d8e97cc27ed6d7232294a8ed82
SHA512b02af44d9a87e06b0309e842d550b54b92575ba36a3ea74184bba40d4665751d91c8547ddd9c1c009d413f56829f7fcc604592ba51118c916cd1e039930571b2
-
C:\Users\Admin\AppData\Local\Temp\jusched.logFilesize
267KB
MD5adba5aad1e5bef4f0272ded762b208ab
SHA1f51c9f147198dc8112a755e0218c0597d6ee5439
SHA2565a808965323f895f5c1166cbefdf40b210b0e7d105d25104c7fecb936cdd3650
SHA512c5f8a528712ed6261c716c72ca60d4301fec341ec459096e69f572e95bd1daf777b7ed6a8ee940383a0c8e89cedb45468fcc197ba73ce07d5054d50aab607370
-
C:\Users\Admin\AppData\Local\Temp\jusched.logFilesize
267KB
MD59696ec788962902dcf92a557c85a05a0
SHA1b71fc4797d97c174e61cf5a110b0a6d2b35f09c1
SHA2562b318c3aeed3c8947380894f76c833e40fb9f5e39e598fc1355bdffb089f3cbc
SHA512a2d568e0970a38b7b76d5d8bc5115a5aa06606e1ad460676e485f3fdde7fc5b0795a0b71d14c687d22d31de285eec2abbcd1cd4a2ffb62d710d0a58d6a5b9f6b
-
C:\Users\Admin\AppData\Local\Temp\jusched.logFilesize
293KB
MD5b0b51e7d068dbebb96fac334a07dc39a
SHA1bd9850e7cebc26908a97e92f11f610e554416317
SHA25641e82ea4764915baf3b93b8dd3a58fcacbf2e3ed45ff84c7e383c7b7c973a102
SHA51273b0edccef06020ff589adce7e1bc3eaf70cb39c575428525d6fa4c35085878ecd7cd00467f7abe6c38b067580ff395163e26b117a55224cb4a97b31567612c1
-
C:\Users\Admin\AppData\Local\Temp\jusched.logFilesize
296KB
MD5da46f05ca7392970b9eec6926448dc78
SHA1c8659cc7909a9a1f7b1db80a831e22f96d6ec144
SHA2564ca5c1946bbe609a4f20d05ec2c21fadf3570cf647b873c17eeec162789344c2
SHA51270699085be143e3e5b454bb1d03ec2a47035a901fad9511ca9989b8563fbf313cb0ffd755bdef2ea377641acf35ec68b550ed227b5e7c95e1ccbc5700576950a
-
C:\Users\Admin\Downloads\jre-8u361-windows-x64.exeFilesize
62.1MB
MD5e70de386ebc763932a181fc37a2ad042
SHA118e76e452b289ae2fc167667b55a81b11ec2693f
SHA256419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d
SHA512a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d
-
C:\Users\Admin\Downloads\jre-8u361-windows-x64.exeFilesize
62.1MB
MD5e70de386ebc763932a181fc37a2ad042
SHA118e76e452b289ae2fc167667b55a81b11ec2693f
SHA256419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d
SHA512a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d
-
C:\Users\Admin\Downloads\jre-8u361-windows-x64.exeFilesize
62.1MB
MD5e70de386ebc763932a181fc37a2ad042
SHA118e76e452b289ae2fc167667b55a81b11ec2693f
SHA256419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d
SHA512a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d
-
C:\Windows\Installer\MSI3011.tmpFilesize
198KB
MD5c7018628101e1bb69437b4ab2f6b7465
SHA1e185b2a7685490f74e11e794bf8e54bd9b21e295
SHA2568c33499755edda822c1ed58354f0353134707f143ea0290758510781e515c8d8
SHA512374f90ca6ae78e784967f314715cd282ea49332de1c1a59b3ed27389799f84eaae8ed9950a0b67ccc383c1ff872984114c2d43538cc39b50e9646e958dbf95f4
-
C:\Windows\Installer\MSI41FD.tmpFilesize
759KB
MD5216acbc40fb42eb247260a1feb124114
SHA13f16a8479e9e467a200c9fc6d98ffe56cfa642ec
SHA256bbad98c96204a8f8b09457779a5da5cc3563de73925f0535e37b3f5e73fdc2a9
SHA512001cf5470656cce65205074fda01528e066226b135b8e8bcb0e5dd13ca64e8bb70b45ee8e99ec2d8139157d40355a1cba353022c8a69bc3f9fa9af18304448e5
-
C:\Windows\Installer\MSI4460.tmpFilesize
759KB
MD5216acbc40fb42eb247260a1feb124114
SHA13f16a8479e9e467a200c9fc6d98ffe56cfa642ec
SHA256bbad98c96204a8f8b09457779a5da5cc3563de73925f0535e37b3f5e73fdc2a9
SHA512001cf5470656cce65205074fda01528e066226b135b8e8bcb0e5dd13ca64e8bb70b45ee8e99ec2d8139157d40355a1cba353022c8a69bc3f9fa9af18304448e5
-
C:\Windows\Installer\MSI4CED.tmpFilesize
759KB
MD5216acbc40fb42eb247260a1feb124114
SHA13f16a8479e9e467a200c9fc6d98ffe56cfa642ec
SHA256bbad98c96204a8f8b09457779a5da5cc3563de73925f0535e37b3f5e73fdc2a9
SHA512001cf5470656cce65205074fda01528e066226b135b8e8bcb0e5dd13ca64e8bb70b45ee8e99ec2d8139157d40355a1cba353022c8a69bc3f9fa9af18304448e5
-
C:\Windows\Installer\MSI4CED.tmpFilesize
759KB
MD5216acbc40fb42eb247260a1feb124114
SHA13f16a8479e9e467a200c9fc6d98ffe56cfa642ec
SHA256bbad98c96204a8f8b09457779a5da5cc3563de73925f0535e37b3f5e73fdc2a9
SHA512001cf5470656cce65205074fda01528e066226b135b8e8bcb0e5dd13ca64e8bb70b45ee8e99ec2d8139157d40355a1cba353022c8a69bc3f9fa9af18304448e5
-
C:\Windows\Installer\e5d33a5.msiFilesize
58.7MB
MD5407d36101348022e67342b44292d2b39
SHA11811ab3993672a9f329868622d96014043bd5f4a
SHA256213e9fa760dfa2af22a4ac94a10c7f21f4b482aa04e8cf3706264e4c17d2481e
SHA512cd78f2d3d8057467f87c846fd2252cc2632de822b2c5d37a9f2bcd0c68fafe598bdc4bc69760cd7e84037a5b28b3f11a4385684962857e3ce572ec9b302f0c0c
-
C:\Windows\Installer\e5d33a8.msiFilesize
58.7MB
MD5407d36101348022e67342b44292d2b39
SHA11811ab3993672a9f329868622d96014043bd5f4a
SHA256213e9fa760dfa2af22a4ac94a10c7f21f4b482aa04e8cf3706264e4c17d2481e
SHA512cd78f2d3d8057467f87c846fd2252cc2632de822b2c5d37a9f2bcd0c68fafe598bdc4bc69760cd7e84037a5b28b3f11a4385684962857e3ce572ec9b302f0c0c
-
C:\Windows\Installer\e5d3472.msiFilesize
1016KB
MD5d82092d71622d5121dac785254a53707
SHA16e26aef9fbc34eda9b099e03242c2ee4a8e3a845
SHA2561f6b3176e5e7ecfd7d262e9470eec2ac1a7fe9401bb064c87810af9a0aa7bb82
SHA512e1f54163b242d8b3149d536d7bc3d3da896da229a8fc298e613bcbf75b3a77129d07b99df3008a30f95a80a91c17fe0feeaa8ad0e2ebfe4deb8678751258eca0
-
\??\pipe\crashpad_1716_JCXHSEPTKPVPGMKDMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Program Files\Java\jre1.8.0_361\bin\java.dllFilesize
163KB
MD5db081a9968bb0c37a57725cdb66a0c7b
SHA1d5fed172d82111d1f3bcb46ab3bd8b412f3ee003
SHA2565b9b01f1ec06ad559285201cf0907e1c31473f6fb91aa09813dd8f076f94afe3
SHA5128a3717be2bdc1d2e628a069a61ac5b504467c52c7b52496c14050cd0fbc3e1023c791ca8b5c3270579e1cc725a8a0cff62c427dc1c25c2ec74725d1dacc621d5
-
\Program Files\Java\jre1.8.0_361\bin\msvcp140.dllFilesize
613KB
MD5c1b066f9e3e2f3a6785161a8c7e0346a
SHA18b3b943e79c40bc81fdac1e038a276d034bbe812
SHA25699e3e25cda404283fbd96b25b7683a8d213e7954674adefa2279123a8d0701fd
SHA51236f9e6c86afbd80375295238b67e4f472eb86fcb84a590d8dba928d4e7a502d4f903971827fdc331353e5b3d06616664450759432fdc8d304a56e7dacb84b728
-
\Program Files\Java\jre1.8.0_361\bin\server\jvm.dllFilesize
8.2MB
MD5a5b5e313919826735b73731252a2bc2e
SHA1090054f0aeeaaac570130ef5a03c26970cdb050c
SHA25686765f3558ffbb2cf28fb683ee17c288967e636b5cb4fe0422ade39591f6abf4
SHA5122e0199624f91f9c952ea4fb81a01096febe8dde6fba85f66e7978c98ba749da3cd53cb6d986260e357c19a1d3b5411d6716548ef57e31ec75d55f4d3a3420c3f
-
\Program Files\Java\jre1.8.0_361\bin\vcruntime140.dllFilesize
83KB
MD51453290db80241683288f33e6dd5e80e
SHA129fb9af50458df43ef40bfc8f0f516d0c0a106fd
SHA2562b7602cc1521101d116995e3e2ddfe0943349806378a0d40add81ba64e359b6c
SHA5124ea48a11e29ea7ac3957dcab1a7912f83fd1c922c43d7b7d78523178fe236b4418729455b78ac672bb5632ecd5400746179802c6a9690adb025270b0ade84e91
-
\Program Files\Java\jre1.8.0_361\bin\verify.dllFilesize
54KB
MD5c15088054d639475e51b88251369c226
SHA18849a9ee53e6bc7d1618103b674a6f481b72f3aa
SHA256a7e7890ec2e238b3108fe2d9b4796898b2fff30ce07957f60689975d7460098c
SHA51281ae70caf0304c63adadc3437e592ea9540db59ac7bd7417b769b5702a2aa012bec79aab8ce01187ebbd78555b7824fc4434a113dd9be5b667ce693b293122c4
-
\Program Files\Java\jre1.8.0_361\bin\zip.dllFilesize
84KB
MD57c7a8adce66eeb67a96ca617c8286d72
SHA1da1f100637f0b94aaea4e3999ef96a32a63bfc2b
SHA256d15be64cc05ae14db69b5a3558cd57767eda91e708c74d3dccdc4958c42cb5d9
SHA51200d3c1145b8c8ea246f456000c2fcfe1e978d148ad69ddabdf9e5f332db4e44025211916c6452b5030f8326d523d6e72de8aebd9e41d83afccb8713e88782f31
-
\Windows\Installer\MSI41FD.tmpFilesize
759KB
MD5216acbc40fb42eb247260a1feb124114
SHA13f16a8479e9e467a200c9fc6d98ffe56cfa642ec
SHA256bbad98c96204a8f8b09457779a5da5cc3563de73925f0535e37b3f5e73fdc2a9
SHA512001cf5470656cce65205074fda01528e066226b135b8e8bcb0e5dd13ca64e8bb70b45ee8e99ec2d8139157d40355a1cba353022c8a69bc3f9fa9af18304448e5
-
\Windows\Installer\MSI4460.tmpFilesize
759KB
MD5216acbc40fb42eb247260a1feb124114
SHA13f16a8479e9e467a200c9fc6d98ffe56cfa642ec
SHA256bbad98c96204a8f8b09457779a5da5cc3563de73925f0535e37b3f5e73fdc2a9
SHA512001cf5470656cce65205074fda01528e066226b135b8e8bcb0e5dd13ca64e8bb70b45ee8e99ec2d8139157d40355a1cba353022c8a69bc3f9fa9af18304448e5
-
\Windows\Installer\MSI4CED.tmpFilesize
759KB
MD5216acbc40fb42eb247260a1feb124114
SHA13f16a8479e9e467a200c9fc6d98ffe56cfa642ec
SHA256bbad98c96204a8f8b09457779a5da5cc3563de73925f0535e37b3f5e73fdc2a9
SHA512001cf5470656cce65205074fda01528e066226b135b8e8bcb0e5dd13ca64e8bb70b45ee8e99ec2d8139157d40355a1cba353022c8a69bc3f9fa9af18304448e5
-
memory/4152-151-0x0000000061DC0000-0x0000000062404000-memory.dmpFilesize
6.3MB
-
memory/4152-153-0x0000000001660000-0x0000000001BD5000-memory.dmpFilesize
5.5MB
-
memory/4152-142-0x0000000061740000-0x0000000061771000-memory.dmpFilesize
196KB
-
memory/4152-141-0x0000000070940000-0x000000007095C000-memory.dmpFilesize
112KB
-
memory/4152-140-0x0000000000400000-0x0000000000A1D000-memory.dmpFilesize
6.1MB
-
memory/4152-135-0x0000000005370000-0x0000000005582000-memory.dmpFilesize
2.1MB
-
memory/4152-125-0x0000000000400000-0x0000000000A1D000-memory.dmpFilesize
6.1MB
-
memory/4152-124-0x000000006C8C0000-0x000000006C8FF000-memory.dmpFilesize
252KB
-
memory/4152-123-0x0000000061740000-0x0000000061771000-memory.dmpFilesize
196KB
-
memory/4152-150-0x000000006E940000-0x000000006E964000-memory.dmpFilesize
144KB
-
memory/4152-149-0x0000000064940000-0x0000000064954000-memory.dmpFilesize
80KB
-
memory/4152-144-0x000000006C8C0000-0x000000006C8FF000-memory.dmpFilesize
252KB
-
memory/4152-152-0x000000006FC40000-0x000000006FD41000-memory.dmpFilesize
1.0MB
-
memory/4152-143-0x0000000063400000-0x0000000063415000-memory.dmpFilesize
84KB
-
memory/4152-155-0x000000006A880000-0x000000006A9F6000-memory.dmpFilesize
1.5MB
-
memory/4152-145-0x0000000061B80000-0x0000000061B98000-memory.dmpFilesize
96KB
-
memory/4152-154-0x0000000000030000-0x000000000003C000-memory.dmpFilesize
48KB
-
memory/4152-156-0x000000006E600000-0x000000006E674000-memory.dmpFilesize
464KB
-
memory/4152-122-0x0000000070940000-0x000000007095C000-memory.dmpFilesize
112KB
-
memory/4152-157-0x0000000005370000-0x0000000005582000-memory.dmpFilesize
2.1MB
-
memory/4152-121-0x0000000001660000-0x0000000001BD5000-memory.dmpFilesize
5.5MB
-
memory/4152-146-0x0000000068880000-0x0000000068DAF000-memory.dmpFilesize
5.2MB
-
memory/4152-3992-0x00000000012E0000-0x00000000012F0000-memory.dmpFilesize
64KB
-
memory/4152-147-0x0000000069700000-0x0000000069894000-memory.dmpFilesize
1.6MB
-
memory/4152-148-0x0000000066C00000-0x0000000066C3E000-memory.dmpFilesize
248KB
-
memory/4152-204-0x0000000005B20000-0x0000000005B31000-memory.dmpFilesize
68KB
-
memory/4152-119-0x0000000001660000-0x0000000001BD5000-memory.dmpFilesize
5.5MB
-
memory/4152-5070-0x00000000012E0000-0x00000000012F0000-memory.dmpFilesize
64KB