Analysis
-
max time kernel
198s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-04-2023 17:55
Static task
static1
Behavioral task
behavioral1
Sample
Setup for cm2demo_oWTv-t1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Setup for cm2demo_oWTv-t1.exe
Resource
win10v2004-20230220-en
General
-
Target
Setup for cm2demo_oWTv-t1.exe
-
Size
1.7MB
-
MD5
99a9fbd5fee72ce51585309390a46717
-
SHA1
ff39c56312090a909c2c0c82629c552a3b252a98
-
SHA256
833064195b0c96bce9a8c00dc95df6bd9fce1092c1260ba0e877810bfc44b0aa
-
SHA512
97f9a98fb48c8281818163d3dbe66fa246e1fe6a5a67f15175419992b0ca389cbe086e457177c21ce9c99ff05a1e0b508812cdf30220090a438dd8c94f73c6b7
-
SSDEEP
24576:R4nXubIQGyxbPV0db26Wmd0l4sv1Et9uGpckT52zedlq89Ws5uIzk5aM/phdO7:Rqe3f61mZSffPMWrQ0ZkA
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
Setup for cm2demo_oWTv-t1.tmpfile_oWTv-t1.exefile_oWTv-t1.tmpbooking.com.exebooking.com.tmppid process 620 Setup for cm2demo_oWTv-t1.tmp 1168 file_oWTv-t1.exe 1740 file_oWTv-t1.tmp 1204 booking.com.exe 1544 booking.com.tmp -
Loads dropped DLL 8 IoCs
Processes:
Setup for cm2demo_oWTv-t1.exeSetup for cm2demo_oWTv-t1.tmpfile_oWTv-t1.exefile_oWTv-t1.tmpbooking.com.exebooking.com.tmppid process 316 Setup for cm2demo_oWTv-t1.exe 620 Setup for cm2demo_oWTv-t1.tmp 1168 file_oWTv-t1.exe 1740 file_oWTv-t1.tmp 1740 file_oWTv-t1.tmp 1740 file_oWTv-t1.tmp 1204 booking.com.exe 1544 booking.com.tmp -
Drops file in Program Files directory 13 IoCs
Processes:
booking.com.tmpdescription ioc process File opened for modification C:\Program Files (x86)\booking.com\d3dcompiler_47.dll booking.com.tmp File opened for modification C:\Program Files (x86)\booking.com\libGLESv2.dll booking.com.tmp File opened for modification C:\Program Files (x86)\booking.com\swiftshader\libGLESv2.dll booking.com.tmp File created C:\Program Files (x86)\booking.com\is-NK0PH.tmp booking.com.tmp File opened for modification C:\Program Files (x86)\booking.com\libEGL.dll booking.com.tmp File opened for modification C:\Program Files (x86)\booking.com\swiftshader\libEGL.dll booking.com.tmp File opened for modification C:\Program Files (x86)\booking.com\VkICD_mock_icd.dll booking.com.tmp File opened for modification C:\Program Files (x86)\booking.com\booking.com.exe booking.com.tmp File created C:\Program Files (x86)\booking.com\unins000.dat booking.com.tmp File created C:\Program Files (x86)\booking.com\is-1Q4ML.tmp booking.com.tmp File created C:\Program Files (x86)\booking.com\is-KMLIN.tmp booking.com.tmp File created C:\Program Files (x86)\booking.com\is-Q6MDA.tmp booking.com.tmp File opened for modification C:\Program Files (x86)\booking.com\ffmpeg.dll booking.com.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
file_oWTv-t1.tmpdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file_oWTv-t1.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ file_oWTv-t1.tmp -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388353716" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074b2d77a8e7a944ea7c282b9066208cc00000000020000000000106600000001000020000000f7f8cdc09cc553385b5df931d3e3b7092f7de76212bd189f51f3502d43a0e0c6000000000e8000000002000020000000994511f0327791b792347a5d367e52159b4c224c78abf0cf86eae336a32dd102200000003f1b4aecab197b036e5bfd2680a6745ec1619ee55c0f11785fdc5d13dc2501dc4000000006935cdc07d97fa11079c88668bfa83f2c3c53939ca17df33f522454c030dfd632051ba19a7e417d32438cdda2800348ee04c2550fe46e0b5a6eddd37df6ab97 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F69F6711-DBC7-11ED-89E9-F221FC82CB7E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50012bd7d46fd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DOMStorage\fileplanet.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DOMStorage\fileplanet.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Processes:
Setup for cm2demo_oWTv-t1.tmpfile_oWTv-t1.tmpdescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Setup for cm2demo_oWTv-t1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 file_oWTv-t1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 file_oWTv-t1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 file_oWTv-t1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 Setup for cm2demo_oWTv-t1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 file_oWTv-t1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 file_oWTv-t1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 file_oWTv-t1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Setup for cm2demo_oWTv-t1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A file_oWTv-t1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 file_oWTv-t1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 file_oWTv-t1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Setup for cm2demo_oWTv-t1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 file_oWTv-t1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 file_oWTv-t1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 file_oWTv-t1.tmp -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
booking.com.tmppid process 1544 booking.com.tmp 1544 booking.com.tmp -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Setup for cm2demo_oWTv-t1.tmpfile_oWTv-t1.tmpbooking.com.tmpiexplore.exepid process 620 Setup for cm2demo_oWTv-t1.tmp 1740 file_oWTv-t1.tmp 1544 booking.com.tmp 1764 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1764 iexplore.exe 1764 iexplore.exe 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
Setup for cm2demo_oWTv-t1.exeSetup for cm2demo_oWTv-t1.tmpfile_oWTv-t1.exefile_oWTv-t1.tmpbooking.com.exeiexplore.exedescription pid process target process PID 316 wrote to memory of 620 316 Setup for cm2demo_oWTv-t1.exe Setup for cm2demo_oWTv-t1.tmp PID 316 wrote to memory of 620 316 Setup for cm2demo_oWTv-t1.exe Setup for cm2demo_oWTv-t1.tmp PID 316 wrote to memory of 620 316 Setup for cm2demo_oWTv-t1.exe Setup for cm2demo_oWTv-t1.tmp PID 316 wrote to memory of 620 316 Setup for cm2demo_oWTv-t1.exe Setup for cm2demo_oWTv-t1.tmp PID 316 wrote to memory of 620 316 Setup for cm2demo_oWTv-t1.exe Setup for cm2demo_oWTv-t1.tmp PID 316 wrote to memory of 620 316 Setup for cm2demo_oWTv-t1.exe Setup for cm2demo_oWTv-t1.tmp PID 316 wrote to memory of 620 316 Setup for cm2demo_oWTv-t1.exe Setup for cm2demo_oWTv-t1.tmp PID 620 wrote to memory of 1168 620 Setup for cm2demo_oWTv-t1.tmp file_oWTv-t1.exe PID 620 wrote to memory of 1168 620 Setup for cm2demo_oWTv-t1.tmp file_oWTv-t1.exe PID 620 wrote to memory of 1168 620 Setup for cm2demo_oWTv-t1.tmp file_oWTv-t1.exe PID 620 wrote to memory of 1168 620 Setup for cm2demo_oWTv-t1.tmp file_oWTv-t1.exe PID 1168 wrote to memory of 1740 1168 file_oWTv-t1.exe file_oWTv-t1.tmp PID 1168 wrote to memory of 1740 1168 file_oWTv-t1.exe file_oWTv-t1.tmp PID 1168 wrote to memory of 1740 1168 file_oWTv-t1.exe file_oWTv-t1.tmp PID 1168 wrote to memory of 1740 1168 file_oWTv-t1.exe file_oWTv-t1.tmp PID 1168 wrote to memory of 1740 1168 file_oWTv-t1.exe file_oWTv-t1.tmp PID 1168 wrote to memory of 1740 1168 file_oWTv-t1.exe file_oWTv-t1.tmp PID 1168 wrote to memory of 1740 1168 file_oWTv-t1.exe file_oWTv-t1.tmp PID 1740 wrote to memory of 1204 1740 file_oWTv-t1.tmp booking.com.exe PID 1740 wrote to memory of 1204 1740 file_oWTv-t1.tmp booking.com.exe PID 1740 wrote to memory of 1204 1740 file_oWTv-t1.tmp booking.com.exe PID 1740 wrote to memory of 1204 1740 file_oWTv-t1.tmp booking.com.exe PID 1740 wrote to memory of 1204 1740 file_oWTv-t1.tmp booking.com.exe PID 1740 wrote to memory of 1204 1740 file_oWTv-t1.tmp booking.com.exe PID 1740 wrote to memory of 1204 1740 file_oWTv-t1.tmp booking.com.exe PID 1204 wrote to memory of 1544 1204 booking.com.exe booking.com.tmp PID 1204 wrote to memory of 1544 1204 booking.com.exe booking.com.tmp PID 1204 wrote to memory of 1544 1204 booking.com.exe booking.com.tmp PID 1204 wrote to memory of 1544 1204 booking.com.exe booking.com.tmp PID 1204 wrote to memory of 1544 1204 booking.com.exe booking.com.tmp PID 1204 wrote to memory of 1544 1204 booking.com.exe booking.com.tmp PID 1204 wrote to memory of 1544 1204 booking.com.exe booking.com.tmp PID 1740 wrote to memory of 1764 1740 file_oWTv-t1.tmp iexplore.exe PID 1740 wrote to memory of 1764 1740 file_oWTv-t1.tmp iexplore.exe PID 1740 wrote to memory of 1764 1740 file_oWTv-t1.tmp iexplore.exe PID 1740 wrote to memory of 1764 1740 file_oWTv-t1.tmp iexplore.exe PID 1764 wrote to memory of 1520 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1520 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1520 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1520 1764 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup for cm2demo_oWTv-t1.exe"C:\Users\Admin\AppData\Local\Temp\Setup for cm2demo_oWTv-t1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-ILIP0.tmp\Setup for cm2demo_oWTv-t1.tmp"C:\Users\Admin\AppData\Local\Temp\is-ILIP0.tmp\Setup for cm2demo_oWTv-t1.tmp" /SL5="$7012C,831488,831488,C:\Users\Admin\AppData\Local\Temp\Setup for cm2demo_oWTv-t1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-ETO9F.tmp\file_oWTv-t1.exe"C:\Users\Admin\AppData\Local\Temp\is-ETO9F.tmp\file_oWTv-t1.exe" /LANG=en /NA=Rh85hR643⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-5C2QU.tmp\file_oWTv-t1.tmp"C:\Users\Admin\AppData\Local\Temp\is-5C2QU.tmp\file_oWTv-t1.tmp" /SL5="$201B6,1559708,780800,C:\Users\Admin\AppData\Local\Temp\is-ETO9F.tmp\file_oWTv-t1.exe" /LANG=en /NA=Rh85hR644⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\prod0_extract\booking.com.exe"C:\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\prod0_extract\booking.com.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-89738.tmp\booking.com.tmp"C:\Users\Admin\AppData\Local\Temp\is-89738.tmp\booking.com.tmp" /SL5="$8012C,44041568,831488,C:\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\prod0_extract\booking.com.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.fileplanet.com/archive5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\booking.com\is-Q6MDA.tmpFilesize
80.9MB
MD5e0eb85cbc618e8d8b5a65394da966902
SHA1e348bddc0d4efd87f2f51ca759de564a3729ec1d
SHA25679b37e88304ae6714bfed2bad59bc12b70f2f8332c6d901fef4d666dee953819
SHA5122ed5a12583d2d365f802c1b3a4e354585f5d11e86cc74412baee8546305984f06d47906e915ac3597dd13fa0c220c8f7aa27dd25eb68db59253ccd264e6dbf43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD535b3ff729e67c5c1c6c88cf5f1b47bd6
SHA12bd378f8f28c443b0313e83b69f243ec319c0953
SHA256adea3576ff1fd7a91bb08c1a2cce727ba847952558832b2558818e73f08cb8fd
SHA5125d95b536636c67b7e824cb458bcea24dc356be719812c27eb0258d8548b1195ed600e929b56567c3ca11b7c668087d26967fd130c666091710d033ac70c15299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD551a644b8eb55a9807330206790920d1d
SHA1beea97545d47b0bf5d2f0bcb36f09f9005c2ad1c
SHA256a97e5c13426632392514c49364a66bf95e39a1f0e9b433f9b80c5c393e9739e6
SHA5122bb285d1c9bb01027310b720ddce6521c74378ccd0707a7b0d9a2a3bc76b1b58c5bc047717e4134498a6fa87b33c941117474d3f136c339963f18acd992fa24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD544264d248bf3846addc9c87f62d53342
SHA1d6a2e4251fc6cf58469f9b1a094dd6f388347ebb
SHA25650ef1f04d84eba46453f57e91a6b9c4ba9bd7a9ee58c22ef633b3ee531cd1143
SHA512ce529db8c14ac58541682e418054a344a554f2e2959942cd76c9c738f05b18546bee2f6c4ac11c119daaae7be35e93eb8ac49ac6dfffbe8e45bd897be390776c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD525f266e9c922ad5e7b7282bee73424c2
SHA139ff1e6ec5cf23888a939d763df70bae8190b360
SHA256e87082b468ebef6ee2b35d8cd18b2831e810cf80bbf820ba282f728a72500f02
SHA512429305e21127349984d17c611d7575414f5c332339586f3b450c44bbe88516acb165cde161d7fb85fa0285f82cfb330c1826147ae7e1942821f7544b2bdb17c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD500c6db366475da2f01b2de5692cea47e
SHA1f609a7876ed23c4c95a89aaad0d0f393b49e00b9
SHA25654916c409d746b02861c245bfa088c27cbc13e5145d674848771fca077964d28
SHA512ecc6139ad8e0eac996b97ee4ef3ef90d788b63c519eaa84d7119ecf6ae8f96bb4dbbae5df9558429cbe132105208492e079a5bb368e217e766b685b8272a5adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53cb5b2bdf40cecc45f9a5a416bbc5097
SHA187af8b99c277ae4b46ef94eb1c09d6dbb19ed6c3
SHA2565b5802c7f8ec972bce835e9083f2884eff3e0c56238d55f72512669f2ef21448
SHA512fe6f37de94ebbaab22617cae6a502f19f180c0c7aec43039ea31f45ff9b5f8749d9446d4fe9cb06dd01e23894594007b437943aa56f905a3add47bf57b804fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5767a11fbe49e267a925fe23596494a85
SHA1c9407be30ad3adb226ff927f02d7ea94d26a8a6a
SHA25616f58c49e92f783486d8a797ec4e12ae5006f6818d8c3d7b7c0fedd7b623140a
SHA5120b8bf3c33cd4a061766585f4e8d5ed22204d09c28f4322b017277caab814c77b83d4ea259e445179e81d8bdf2cd0635d6f206aa5fe3f22da5c4fe2692dc6aa2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5dca7ca70b389fded02f9d8dd81bbf82d
SHA106ed6bb8c7c7ea247dfe3ad8326d15c0c2800d82
SHA2561e92a402dec4295d11bb57386cfd2a9932a45dd372b572f6c62699a9aa1937e4
SHA5127024197354b72e6ca0c1319ce0fef6701cb0e47acd129535840bd08d91676df2ee08a62e893a6b347333f13e7e58760a47c76623ab5f84458af05539b25322d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD538fb52a1c180243d82bf699dffc2f2a7
SHA13212869a891e84c7acebbecf92241eb3f52040a6
SHA256056a18e5ce4c9cab857e04cbdc46ad59ebea2f29d0ccf81932969cb4bf8b1cf0
SHA5120a3262f6468c991f22671df7e05dcda7293c14d6bb83a2298ae3f2b5542f9492d0ad9cb74c6e736b64607e6a9929beb32b8d289bd4cba9760c45203170e94169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5db3ad97c55e47bb4d6ea36bc60134df6
SHA1a7e38008375d504beeeb84339acceaf199fbab94
SHA2560e65cb6bdb4320ce7ade40f7abc8cc7c45876a36e30454f10b6f2a398df6e2e9
SHA512d92b19986eba9b71b1e5e95d3f61c1e9ba16f88b4fa9462a28a93f6b99dd99a34060f966cec17fba864d76f1ea265ec0c00de29da335b38ead64812e8c64b143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5764ad4a5ceff051c6e028d2b14d9885b
SHA14692299a0fa346d8845c2eb449216a5b78efdb68
SHA256685925abe0f0784e91d45e0cd70ff842eff0efe65c91db94085f7e471709acca
SHA512762b6059ec44263ba9e5ca5c89273be5ea04d547e153a15c3d26c6b684f279a516af0220bb438902fb3ca06bdce6272887de716a9ed04f53bb2179b8fb1f74b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51e018e260f998c06da597cc001a5c7ff
SHA1f26ac1438626f5afeb3f6976eb68c55aeae231aa
SHA256bd31a75bea293197095ff2a26acbbd5c036ba16f7fde860fe73ea6024430548e
SHA51214a0be7fc9a052691056aabfb1ed9028f49dc5bd71b0fa7ea05125df7ae0d921db98a1bf6fcc24456b21f1db49a9fe8f7fc6db2f6cc14726822ff3b22ab6276b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD50d1fc17440224da4a9f1cf441d8069bd
SHA12998564bfd19f57d03684352e3a52c81344f63c8
SHA2569333b4166e6025a9357c644aff23c1a7268db1632673686552ec8754b9184034
SHA51201d64715102e8d48e76f816375dfcae0bcdb3e43ed5bd3ad48425a52116559b198cd8c8c2072fc440206443ab3e40878497ef7dac6368800875ace49b7a94425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD570f53a09edac707516cf5cf9c4f8adea
SHA1e07efcaed51fac98b9ae9c2681c12d0393002220
SHA256a71382788fe05f76138908815b1c4480de4a41e055b05f1e785fa8f4b603b03c
SHA512d756d860217666f07ae5d7e2d4fe24e76e7e1ca68322edddba52b4dfc534d91262daeee58437fb6d7a63dc5aaa1fb576170aaa5e17985107b5e4f3c46aa32d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD593bbf1bc377e2ebe25275f9502156329
SHA15bd03a334d7e9acb23981ba1356b2d0ea62254f5
SHA2566a4a662545813eb9dcdfab7b2b7885be621ef017d1c5ea7c711bb280a58f0c2c
SHA5123336d8cc5ca8190fc807ad7a13cb1e1d3b42e6ca62cf8bba465810efd8fb258353c5b3e5f750bfceaafb3d79f928a6478031c7777a2c41630344a26d71ba4c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD563fe305bbddc32b23565b153fac7bf5e
SHA1d7dbbd14688e312d2279ff6dfa13b8721a268f94
SHA256c5a853428c1701502566dad619d6eea98b8b7d9d693e450624346830ed9535ff
SHA5128d38eb5b97f2c205712e0a571bc0881ef9c4d51d67423a5433f026442635342d2b3a7c17e171cccc774fb3089a136cd780717ce9c1e5ecf3f137654cd5b527a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54f3c16742ce596baffdff561b6e6a7bd
SHA14e4822067770aabaef0411e04e86d2cf1e659f44
SHA256c2dfe75fc95ec9f361d3047f7724bfc887a30b3a4372539d6bd7b25406d0c9bc
SHA512b132c0bbd28d7c97ddaf41c55743e0ec202a96a7ab3f67bd9e95284851fc0e61d66766059616166cefcc36f270f7a7bde48598ae18e4dc03043d67bacf94f5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a1a3f26ba3812e432c8df1a834752921
SHA1f3442427f9862f983aa59748422a03faef2dd833
SHA256e1b37e6c0981768a6069572970bb6bd4524f119dbc65eb13bbdb6065b06c3048
SHA51256c36f4f5e839e9054a9367fa7b3161f0b42cddef919193f55cf9ffa28841f411c29cb6bd4d596d887603cb55288b0a8120802c78b808380ad41509fda8982bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b8956953caf496d1adafc2cf042c5113
SHA137241390f507e8dba13435d9797d5dca4dbddcd8
SHA256d6415671e80082bbe8a9ef6165caaf4cc1f2cb1ac261e326a35e029c0612c301
SHA5122efb2b4de850014e50a6bfc97861d51339af3e03750294899996207a40e092471547627efed1f7aa784875e3ccd37867207ddf4d7bdde7a20c8cacc2864fa7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56aaa4fd392160f901dfaec23c79c77f9
SHA156ee64e041c2e67ddfacd8256e212b232b2402c8
SHA25633f881ff18aaac9f9eae318c70df4bbd463e0403e0a89e2d55c607b1fdfb24f7
SHA5122785041545c725cba592a94673da34f1cef546f1de931518bd8195041638684e09d895f1e4d34d2f4d44ae9e90d14a1392a93213a4515dce2dfb314ed46a65b8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DE9Y0H7M\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\Tar3C7C.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Local\Temp\is-5C2QU.tmp\file_oWTv-t1.tmpFilesize
2.9MB
MD5623a3abd7b318e1f410b1e12a42c7b71
SHA188e34041850ec4019dae469adc608e867b936d21
SHA256fe1a4555d18617532248d2eaa8d3fcc2c74182f994a964a62cf418295e8554d3
SHA5129afea88e4617e0f11416c2a2c416a6aa2d5d1f702d98d2cc223b399736191a6d002d1b717020ca6aae09e835c6356b7ddafad71e101dacab15967d89a105e391
-
C:\Users\Admin\AppData\Local\Temp\is-89738.tmp\booking.com.tmpFilesize
3.0MB
MD557e1b2c7657531b07873d76bb9675fe7
SHA1fca3d4bca18f4d2b43d842cd8cb9a6c52274334d
SHA256141550a06909c4a437dca18ebaf232457dde776cc1c6691a31ef42254e09113e
SHA5127583f7c41ad3e2288f9a3ab4f32dcd7e0fd45ab007818cf5cae004cd49e25b0109d023cd35b35e24bc0e5a93db7c03ed7c57cb554a9f8fd4cd7918478373991b
-
C:\Users\Admin\AppData\Local\Temp\is-89738.tmp\booking.com.tmpFilesize
3.0MB
MD557e1b2c7657531b07873d76bb9675fe7
SHA1fca3d4bca18f4d2b43d842cd8cb9a6c52274334d
SHA256141550a06909c4a437dca18ebaf232457dde776cc1c6691a31ef42254e09113e
SHA5127583f7c41ad3e2288f9a3ab4f32dcd7e0fd45ab007818cf5cae004cd49e25b0109d023cd35b35e24bc0e5a93db7c03ed7c57cb554a9f8fd4cd7918478373991b
-
C:\Users\Admin\AppData\Local\Temp\is-89738.tmp\booking.com.tmpFilesize
3.0MB
MD557e1b2c7657531b07873d76bb9675fe7
SHA1fca3d4bca18f4d2b43d842cd8cb9a6c52274334d
SHA256141550a06909c4a437dca18ebaf232457dde776cc1c6691a31ef42254e09113e
SHA5127583f7c41ad3e2288f9a3ab4f32dcd7e0fd45ab007818cf5cae004cd49e25b0109d023cd35b35e24bc0e5a93db7c03ed7c57cb554a9f8fd4cd7918478373991b
-
C:\Users\Admin\AppData\Local\Temp\is-ETO9F.tmp\file_oWTv-t1.exeFilesize
2.3MB
MD520e7817860584d82adfba3acaf368ed1
SHA13faecf1643bec7781feac4184c6eae606ecf2958
SHA25669bbd536793cf4d7e1deee84eb74ca9d19e8e4a6b15c22df4288a9c9dd15e9da
SHA512bd214e04aa79a99ca61158971559abd9a02d4137ac0e443f1eee685ec3743ce0522838ff286811d8d5defd974e7a037d9132a85bda4311e88eda2c0249dfaa9e
-
C:\Users\Admin\AppData\Local\Temp\is-ETO9F.tmp\file_oWTv-t1.exeFilesize
2.3MB
MD520e7817860584d82adfba3acaf368ed1
SHA13faecf1643bec7781feac4184c6eae606ecf2958
SHA25669bbd536793cf4d7e1deee84eb74ca9d19e8e4a6b15c22df4288a9c9dd15e9da
SHA512bd214e04aa79a99ca61158971559abd9a02d4137ac0e443f1eee685ec3743ce0522838ff286811d8d5defd974e7a037d9132a85bda4311e88eda2c0249dfaa9e
-
C:\Users\Admin\AppData\Local\Temp\is-ILIP0.tmp\Setup for cm2demo_oWTv-t1.tmpFilesize
3.0MB
MD50c229cd26910820581b5809c62fe5619
SHA128c0630385b21f29e3e2bcc34865e5d15726eaa0
SHA256abfa49a915d2e0a82561ca440365e6a2d59f228533b56a8f78addf000a1081b3
SHA512b8ff3dc65f7c0e03721572af738ec4886ba895dc70c1a41a3ce8c8abe0946d167cec71913017fd11d5892452db761ea88901a5a09a681ae779dd531edbb83a2a
-
C:\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\Booking_com.pngFilesize
148KB
MD50c3679093b2b4b5eeaa107a0b4441a7f
SHA1179cabf5c3e647fe4a0d68e61b1473af5a803f31
SHA256b781277a2aa83f02bfa16e1ec60bef3227c79082ae22385c356e0b87d225f30b
SHA51266334fe661226b0dbcad18b7cc5b4c63249a7c939f6b07e4d84587022837142274b4287e6faa051952bef10d352dcc77786f677842f82dfabdf4b349f6d70303
-
C:\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\finish.pngFilesize
2KB
MD57afaf9e0e99fd80fa1023a77524f5587
SHA1e20c9c27691810b388c73d2ca3e67e109c2b69b6
SHA256760b70612bb9bd967c2d15a5133a50ccce8c0bd46a6464d76875298dcc45dea0
SHA512a090626e7b7f67fb5aa207aae0cf65c3a27e1b85e22c9728eee7475bd9bb7375ca93baaecc662473f9a427b4f505d55f2c61ba36bda460e4e6947fe22eedb044
-
C:\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\mainlogo.pngFilesize
7KB
MD5c552e74a342cb35fa8b45ed4190c1609
SHA11e914f5a79af3bc1dc990a9f2d1ebdb41edc82d5
SHA256d386a1220f26de84d3b9a220db6a058e94d82b2403c8f70103ee20fa5579407f
SHA51280837907c8febe9306b149114b637b491bedede7c49d426e6ce9c1b416014c4beb4de57da1bef39a3783a345971b92532ce374f9138255588ebae6d15232a081
-
C:\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\prod0.zipFilesize
42.3MB
MD5a6236fe786cfd405d7dd6c5577478655
SHA1fcb0aca7f5ecf530a1f21e2e3c6e2a21cbf13202
SHA256438101d9a184e61d6ffb6e84b18adadb9ba9cf87d54c8c152c8f6193a5b0a272
SHA5122a259f41619e3324fede19931a600d6fa29522402ec83fe695945676e0f1b17a32739c02c676b95ae73dd0e509114011cba0bdebcebeda643accf24645b90f50
-
C:\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\prod0_extract\booking.com.exeFilesize
42.9MB
MD5056f5a50acb5e5708822dcddc7c74bcf
SHA1b9b18c4db2250740ac6cde056350864baa259e01
SHA2568d8347df5bbe962aa966288489a01a9a95d2ded4551d9c3c56306e19f712313c
SHA512edfe23eec1e855309d780feaaf7e59fcf7491441ca489d8f2bfc423a673e04438191c75be6f122fb5bf3c157f739fee864d4f83d14f77b0e7973496473441450
-
C:\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\prod0_extract\booking.com.exeFilesize
42.9MB
MD5056f5a50acb5e5708822dcddc7c74bcf
SHA1b9b18c4db2250740ac6cde056350864baa259e01
SHA2568d8347df5bbe962aa966288489a01a9a95d2ded4551d9c3c56306e19f712313c
SHA512edfe23eec1e855309d780feaaf7e59fcf7491441ca489d8f2bfc423a673e04438191c75be6f122fb5bf3c157f739fee864d4f83d14f77b0e7973496473441450
-
C:\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\prod0_extract\booking.com.exeFilesize
42.9MB
MD5056f5a50acb5e5708822dcddc7c74bcf
SHA1b9b18c4db2250740ac6cde056350864baa259e01
SHA2568d8347df5bbe962aa966288489a01a9a95d2ded4551d9c3c56306e19f712313c
SHA512edfe23eec1e855309d780feaaf7e59fcf7491441ca489d8f2bfc423a673e04438191c75be6f122fb5bf3c157f739fee864d4f83d14f77b0e7973496473441450
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8LXZT8JM.txtFilesize
604B
MD59cf0297e91e421af6560f280c6625594
SHA1a6b9703905cae5c4b9e9ea8a1a86f3e17f690228
SHA256aacb383d4ba7a7a1558473a97c0d072d9b0cacdb1d87d2af4fef90717006ebb8
SHA512a19a941c21aa2a23a8ede4ea288e045aaa93ef6f21c39d4d767e6be3b1673559c0489d6defde044a5315b1c7826e9666562bc81b61aa1d553cb5cac01894af4b
-
C:\Users\Admin\Downloads\cm2demo.zipFilesize
1.9MB
MD554803cf42ba84f17ad77eb066a1b51f5
SHA1130b1736fc5c5d32f17829b605209dbb7bf034a2
SHA256cdb7930dcb5e99eac92b8ddd8ab7f8301f07a68b3ea1ced8067141943fc2484e
SHA512d67b8b17fcf2794d3298ea5e3ba278333164caa39ccef55e284f27febdadf442ae52578f632b4c75f53c6e5efe7a4948036875fcdeac5aa83fea82720cd3ce20
-
\Users\Admin\AppData\Local\Temp\is-38963.tmp\idp.dllFilesize
228KB
MD59a83f220bf8ca569e3cfa654539a47a4
SHA19d1fb7087c12512d5f66d9d75f2fbae8e1196544
SHA256b1c4c9b2dd6a40974fa8789b218b52d967f5ccd1b47e95b4f6bda4b6ce864d0d
SHA5129b6460aca9720a4762a28e78a0e5f3e7358f73383926caf7f4a071e66c79f1032abd131432387f108de27894c147e2f34f01b094b6688826ce78f007d9dafbc5
-
\Users\Admin\AppData\Local\Temp\is-5C2QU.tmp\file_oWTv-t1.tmpFilesize
2.9MB
MD5623a3abd7b318e1f410b1e12a42c7b71
SHA188e34041850ec4019dae469adc608e867b936d21
SHA256fe1a4555d18617532248d2eaa8d3fcc2c74182f994a964a62cf418295e8554d3
SHA5129afea88e4617e0f11416c2a2c416a6aa2d5d1f702d98d2cc223b399736191a6d002d1b717020ca6aae09e835c6356b7ddafad71e101dacab15967d89a105e391
-
\Users\Admin\AppData\Local\Temp\is-89738.tmp\booking.com.tmpFilesize
3.0MB
MD557e1b2c7657531b07873d76bb9675fe7
SHA1fca3d4bca18f4d2b43d842cd8cb9a6c52274334d
SHA256141550a06909c4a437dca18ebaf232457dde776cc1c6691a31ef42254e09113e
SHA5127583f7c41ad3e2288f9a3ab4f32dcd7e0fd45ab007818cf5cae004cd49e25b0109d023cd35b35e24bc0e5a93db7c03ed7c57cb554a9f8fd4cd7918478373991b
-
\Users\Admin\AppData\Local\Temp\is-ETO9F.tmp\file_oWTv-t1.exeFilesize
2.3MB
MD520e7817860584d82adfba3acaf368ed1
SHA13faecf1643bec7781feac4184c6eae606ecf2958
SHA25669bbd536793cf4d7e1deee84eb74ca9d19e8e4a6b15c22df4288a9c9dd15e9da
SHA512bd214e04aa79a99ca61158971559abd9a02d4137ac0e443f1eee685ec3743ce0522838ff286811d8d5defd974e7a037d9132a85bda4311e88eda2c0249dfaa9e
-
\Users\Admin\AppData\Local\Temp\is-ILIP0.tmp\Setup for cm2demo_oWTv-t1.tmpFilesize
3.0MB
MD50c229cd26910820581b5809c62fe5619
SHA128c0630385b21f29e3e2bcc34865e5d15726eaa0
SHA256abfa49a915d2e0a82561ca440365e6a2d59f228533b56a8f78addf000a1081b3
SHA512b8ff3dc65f7c0e03721572af738ec4886ba895dc70c1a41a3ce8c8abe0946d167cec71913017fd11d5892452db761ea88901a5a09a681ae779dd531edbb83a2a
-
\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\Helper.dllFilesize
2.0MB
MD54eb0347e66fa465f602e52c03e5c0b4b
SHA1fdfedb72614d10766565b7f12ab87f1fdca3ea81
SHA256c73e53cbb7b98feafe27cc7de8fdad51df438e2235e91891461c5123888f73cc
SHA5124c909a451059628119f92b2f0c8bcd67b31f63b57d5339b6ce8fd930be5c9baf261339fdd9da820321be497df8889ce7594b7bfaadbaa43c694156651bf6c1fd
-
\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\botva2.dllFilesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
\Users\Admin\AppData\Local\Temp\is-RA18P.tmp\prod0_extract\booking.com.exeFilesize
42.9MB
MD5056f5a50acb5e5708822dcddc7c74bcf
SHA1b9b18c4db2250740ac6cde056350864baa259e01
SHA2568d8347df5bbe962aa966288489a01a9a95d2ded4551d9c3c56306e19f712313c
SHA512edfe23eec1e855309d780feaaf7e59fcf7491441ca489d8f2bfc423a673e04438191c75be6f122fb5bf3c157f739fee864d4f83d14f77b0e7973496473441450
-
memory/316-54-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/316-348-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/316-91-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/620-230-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/620-342-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/620-186-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/620-93-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/620-188-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/620-61-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1168-231-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/1168-414-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/1168-199-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/1204-345-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/1204-1472-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/1204-396-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/1544-408-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/1544-441-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/1544-390-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1544-440-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/1544-981-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/1544-1356-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/1544-1471-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/1544-1422-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/1740-394-0x0000000000400000-0x00000000006EE000-memory.dmpFilesize
2.9MB
-
memory/1740-215-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1740-223-0x0000000003620000-0x000000000362F000-memory.dmpFilesize
60KB
-
memory/1740-232-0x0000000000400000-0x00000000006EE000-memory.dmpFilesize
2.9MB
-
memory/1740-233-0x0000000003620000-0x000000000362F000-memory.dmpFilesize
60KB
-
memory/1740-241-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1740-297-0x0000000000400000-0x00000000006EE000-memory.dmpFilesize
2.9MB
-
memory/1740-412-0x0000000000400000-0x00000000006EE000-memory.dmpFilesize
2.9MB
-
memory/1740-395-0x0000000003620000-0x000000000362F000-memory.dmpFilesize
60KB
-
memory/1740-307-0x0000000003620000-0x000000000362F000-memory.dmpFilesize
60KB
-
memory/1740-328-0x0000000000400000-0x00000000006EE000-memory.dmpFilesize
2.9MB