Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14-07-2023 08:06
Static task
static1
Behavioral task
behavioral1
Sample
a662ba3492a7d218908f5d851841ed96.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a662ba3492a7d218908f5d851841ed96.exe
Resource
win10v2004-20230703-en
General
-
Target
a662ba3492a7d218908f5d851841ed96.exe
-
Size
374KB
-
MD5
a662ba3492a7d218908f5d851841ed96
-
SHA1
d292b20fd69fc5eb70075fb8ed3e7da940ca0b41
-
SHA256
c21da75b52a0bc699a83bf0eebc5216573533962d425f875191af178c19bab94
-
SHA512
38d41c8d44ab23c5cb6ea384404592f5dde3b3707bb8d3e3bf75d6e858b0c2d18e1fe27ba963ef2cefd6dad06ed1e4fd394a5f065bd5aa03b5f91b28201f72a5
-
SSDEEP
6144:eLXTm1bNgmdZQBEaR73L/RqEb+xms6DuPa25QkI/7qi2PKuDYDYm1kThqBAtmaqz:ezoOmdZy33zRqESYluPPmkIl2iwmYBh+
Malware Config
Extracted
systembc
adstat477d.xyz:4044
demstat577d.xyz:4044
Extracted
smokeloader
2022
http://serverxlogs21.xyz/statweb255/
http://servxblog79.xyz/statweb255/
http://demblog289.xyz/statweb255/
http://admlogs77x.online/statweb255/
http://blogxstat38.xyz/statweb255/
http://blogxstat25.xyz/statweb255/
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\Users\Admin\Desktop\info.hta
Signatures
-
Detect rhadamanthys stealer shellcode 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2648-60-0x0000000001E50000-0x0000000002250000-memory.dmp family_rhadamanthys behavioral1/memory/2648-58-0x0000000001E50000-0x0000000002250000-memory.dmp family_rhadamanthys behavioral1/memory/2648-59-0x0000000001E50000-0x0000000002250000-memory.dmp family_rhadamanthys behavioral1/memory/2648-62-0x0000000001E50000-0x0000000002250000-memory.dmp family_rhadamanthys behavioral1/memory/2648-73-0x0000000001E50000-0x0000000002250000-memory.dmp family_rhadamanthys behavioral1/memory/2648-76-0x0000000001E50000-0x0000000002250000-memory.dmp family_rhadamanthys -
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
a662ba3492a7d218908f5d851841ed96.exedescription pid process target process PID 2648 created 1220 2648 a662ba3492a7d218908f5d851841ed96.exe Explorer.EXE -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 2568 bcdedit.exe 2272 bcdedit.exe 1808 bcdedit.exe 312 bcdedit.exe -
Renames multiple (311) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Processes:
wbadmin.exewbadmin.exepid process 2536 wbadmin.exe 2516 wbadmin.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Deletes itself 1 IoCs
Processes:
certreq.exepid process 1756 certreq.exe -
Drops startup file 3 IoCs
Processes:
_u-912IeH.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini _u-912IeH.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\_u-912IeH.exe _u-912IeH.exe -
Executes dropped EXE 6 IoCs
Processes:
Ut8{bs.exe_u-912IeH.exeG_P.exe_u-912IeH.exeUt8{bs.exeB8B5.exepid process 1364 Ut8{bs.exe 584 _u-912IeH.exe 924 G_P.exe 3068 _u-912IeH.exe 2540 Ut8{bs.exe 3056 B8B5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
Processes:
certreq.exeexplorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
_u-912IeH.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\_u-912IeH = "C:\\Users\\Admin\\AppData\\Local\\_u-912IeH.exe" _u-912IeH.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows\CurrentVersion\Run\_u-912IeH = "C:\\Users\\Admin\\AppData\\Local\\_u-912IeH.exe" _u-912IeH.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
_u-912IeH.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Searches\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\Pictures\desktop.ini _u-912IeH.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini _u-912IeH.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini _u-912IeH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\desktop.ini _u-912IeH.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini _u-912IeH.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini _u-912IeH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini _u-912IeH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini _u-912IeH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\SUPQ34GC\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AWDPAFLJ\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Links\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\Documents\desktop.ini _u-912IeH.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini _u-912IeH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\DF03YERZ\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\Downloads\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\Libraries\desktop.ini _u-912IeH.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3408354897-1169622894-3874090110-1000\desktop.ini _u-912IeH.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini _u-912IeH.exe File opened for modification C:\Program Files (x86)\desktop.ini _u-912IeH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini _u-912IeH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\UCNEF1W7\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Music\desktop.ini _u-912IeH.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3408354897-1169622894-3874090110-1000\desktop.ini _u-912IeH.exe File opened for modification C:\Program Files\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\C9G3U3S4\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Videos\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\Videos\desktop.ini _u-912IeH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini _u-912IeH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\Music\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Public\Desktop\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini _u-912IeH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini _u-912IeH.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini _u-912IeH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini _u-912IeH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini _u-912IeH.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ut8{bs.exedescription pid process target process PID 1364 set thread context of 2540 1364 Ut8{bs.exe Ut8{bs.exe -
Drops file in Program Files directory 64 IoCs
Processes:
_u-912IeH.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195260.WMF _u-912IeH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0212957.WMF _u-912IeH.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME30.CSS.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe _u-912IeH.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-spi-actions_zh_CN.jar.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\vlc.mo _u-912IeH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-windows.xml _u-912IeH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7es.kic _u-912IeH.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty_dot.png _u-912IeH.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\clock.js _u-912IeH.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\MyriadCAD.otf.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\VSTOInstallerUI.dll.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7ES.DLL _u-912IeH.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\local_policy.jar.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.alert.ja_5.5.0.165303.jar _u-912IeH.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.docs.ja_5.5.0.165303.jar.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\librss_plugin.dll _u-912IeH.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_settings.png _u-912IeH.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)grayStateIcon.png _u-912IeH.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00564_.WMF.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\vk_swiftshader.dll.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dushanbe _u-912IeH.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Mendoza _u-912IeH.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Sales Pipeline.accdt.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00236_.WMF _u-912IeH.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152414.WMF.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Perspective.dotx _u-912IeH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0234001.WMF _u-912IeH.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif _u-912IeH.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\CONCRETE.ELM.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-output2.xml.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File created C:\Program Files\Microsoft Games\Hearts\es-ES\Hearts.exe.mui.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\Windows Journal\de-DE\NBMapTIP.dll.mui _u-912IeH.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\VSTAClientPkgUI.dll.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_zh_4.4.0.v20140623020002.jar.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File created C:\Program Files\Mozilla Firefox\api-ms-win-crt-process-l1-1-0.dll.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CARBN_01.MID _u-912IeH.exe File opened for modification C:\Program Files\Microsoft Office\Office14\IEAWSDC.DLL _u-912IeH.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\44.png _u-912IeH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101863.BMP _u-912IeH.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Csi.dll.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msdaremr.dll.mui _u-912IeH.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-execution.xml.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\ACEWSTR.DLL _u-912IeH.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00336_.WMF.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MORPH9.DLL.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File created C:\Program Files\7-Zip\Lang\nl.txt.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Montreal _u-912IeH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Tirane _u-912IeH.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\ReachFramework.resources.dll _u-912IeH.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\SAVE.GIF.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_hail.png _u-912IeH.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Spelling.api _u-912IeH.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\LoginForm.zip _u-912IeH.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\settings.html _u-912IeH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+2 _u-912IeH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861240811.profile.gz _u-912IeH.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\vlc.mo.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGPQUOT.DPV.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libvmem_plugin.dll _u-912IeH.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.dll.id[215BA69E-3483].[[email protected]].8base _u-912IeH.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.es\Proof.XML _u-912IeH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs-nio2_ja.jar _u-912IeH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Ut8{bs.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ut8{bs.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ut8{bs.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ut8{bs.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
certreq.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2144 vssadmin.exe 2816 vssadmin.exe -
Processes:
mshta.exemshta.exemshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a662ba3492a7d218908f5d851841ed96.execertreq.exeUt8{bs.exe_u-912IeH.exeExplorer.EXEpid process 2648 a662ba3492a7d218908f5d851841ed96.exe 2648 a662ba3492a7d218908f5d851841ed96.exe 2648 a662ba3492a7d218908f5d851841ed96.exe 2648 a662ba3492a7d218908f5d851841ed96.exe 1756 certreq.exe 1756 certreq.exe 1756 certreq.exe 1756 certreq.exe 2540 Ut8{bs.exe 2540 Ut8{bs.exe 584 _u-912IeH.exe 584 _u-912IeH.exe 584 _u-912IeH.exe 584 _u-912IeH.exe 584 _u-912IeH.exe 584 _u-912IeH.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 584 _u-912IeH.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 584 _u-912IeH.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 584 _u-912IeH.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 584 _u-912IeH.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 584 _u-912IeH.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 584 _u-912IeH.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 584 _u-912IeH.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 584 _u-912IeH.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 584 _u-912IeH.exe 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious behavior: MapViewOfSection 31 IoCs
Processes:
Ut8{bs.exeExplorer.EXEpid process 2540 Ut8{bs.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
_u-912IeH.exevssvc.exeWMIC.exewbengine.exeWMIC.exedescription pid process Token: SeDebugPrivilege 584 _u-912IeH.exe Token: SeBackupPrivilege 2644 vssvc.exe Token: SeRestorePrivilege 2644 vssvc.exe Token: SeAuditPrivilege 2644 vssvc.exe Token: SeIncreaseQuotaPrivilege 1676 WMIC.exe Token: SeSecurityPrivilege 1676 WMIC.exe Token: SeTakeOwnershipPrivilege 1676 WMIC.exe Token: SeLoadDriverPrivilege 1676 WMIC.exe Token: SeSystemProfilePrivilege 1676 WMIC.exe Token: SeSystemtimePrivilege 1676 WMIC.exe Token: SeProfSingleProcessPrivilege 1676 WMIC.exe Token: SeIncBasePriorityPrivilege 1676 WMIC.exe Token: SeCreatePagefilePrivilege 1676 WMIC.exe Token: SeBackupPrivilege 1676 WMIC.exe Token: SeRestorePrivilege 1676 WMIC.exe Token: SeShutdownPrivilege 1676 WMIC.exe Token: SeDebugPrivilege 1676 WMIC.exe Token: SeSystemEnvironmentPrivilege 1676 WMIC.exe Token: SeRemoteShutdownPrivilege 1676 WMIC.exe Token: SeUndockPrivilege 1676 WMIC.exe Token: SeManageVolumePrivilege 1676 WMIC.exe Token: 33 1676 WMIC.exe Token: 34 1676 WMIC.exe Token: 35 1676 WMIC.exe Token: SeIncreaseQuotaPrivilege 1676 WMIC.exe Token: SeSecurityPrivilege 1676 WMIC.exe Token: SeTakeOwnershipPrivilege 1676 WMIC.exe Token: SeLoadDriverPrivilege 1676 WMIC.exe Token: SeSystemProfilePrivilege 1676 WMIC.exe Token: SeSystemtimePrivilege 1676 WMIC.exe Token: SeProfSingleProcessPrivilege 1676 WMIC.exe Token: SeIncBasePriorityPrivilege 1676 WMIC.exe Token: SeCreatePagefilePrivilege 1676 WMIC.exe Token: SeBackupPrivilege 1676 WMIC.exe Token: SeRestorePrivilege 1676 WMIC.exe Token: SeShutdownPrivilege 1676 WMIC.exe Token: SeDebugPrivilege 1676 WMIC.exe Token: SeSystemEnvironmentPrivilege 1676 WMIC.exe Token: SeRemoteShutdownPrivilege 1676 WMIC.exe Token: SeUndockPrivilege 1676 WMIC.exe Token: SeManageVolumePrivilege 1676 WMIC.exe Token: 33 1676 WMIC.exe Token: 34 1676 WMIC.exe Token: 35 1676 WMIC.exe Token: SeBackupPrivilege 2128 wbengine.exe Token: SeRestorePrivilege 2128 wbengine.exe Token: SeSecurityPrivilege 2128 wbengine.exe Token: SeIncreaseQuotaPrivilege 2040 WMIC.exe Token: SeSecurityPrivilege 2040 WMIC.exe Token: SeTakeOwnershipPrivilege 2040 WMIC.exe Token: SeLoadDriverPrivilege 2040 WMIC.exe Token: SeSystemProfilePrivilege 2040 WMIC.exe Token: SeSystemtimePrivilege 2040 WMIC.exe Token: SeProfSingleProcessPrivilege 2040 WMIC.exe Token: SeIncBasePriorityPrivilege 2040 WMIC.exe Token: SeCreatePagefilePrivilege 2040 WMIC.exe Token: SeBackupPrivilege 2040 WMIC.exe Token: SeRestorePrivilege 2040 WMIC.exe Token: SeShutdownPrivilege 2040 WMIC.exe Token: SeDebugPrivilege 2040 WMIC.exe Token: SeSystemEnvironmentPrivilege 2040 WMIC.exe Token: SeRemoteShutdownPrivilege 2040 WMIC.exe Token: SeUndockPrivilege 2040 WMIC.exe Token: SeManageVolumePrivilege 2040 WMIC.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of SendNotifyMessage 14 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a662ba3492a7d218908f5d851841ed96.exeUt8{bs.exe_u-912IeH.execmd.execmd.exeExplorer.EXEdescription pid process target process PID 2648 wrote to memory of 1756 2648 a662ba3492a7d218908f5d851841ed96.exe certreq.exe PID 2648 wrote to memory of 1756 2648 a662ba3492a7d218908f5d851841ed96.exe certreq.exe PID 2648 wrote to memory of 1756 2648 a662ba3492a7d218908f5d851841ed96.exe certreq.exe PID 2648 wrote to memory of 1756 2648 a662ba3492a7d218908f5d851841ed96.exe certreq.exe PID 2648 wrote to memory of 1756 2648 a662ba3492a7d218908f5d851841ed96.exe certreq.exe PID 2648 wrote to memory of 1756 2648 a662ba3492a7d218908f5d851841ed96.exe certreq.exe PID 1364 wrote to memory of 2540 1364 Ut8{bs.exe Ut8{bs.exe PID 1364 wrote to memory of 2540 1364 Ut8{bs.exe Ut8{bs.exe PID 1364 wrote to memory of 2540 1364 Ut8{bs.exe Ut8{bs.exe PID 1364 wrote to memory of 2540 1364 Ut8{bs.exe Ut8{bs.exe PID 1364 wrote to memory of 2540 1364 Ut8{bs.exe Ut8{bs.exe PID 1364 wrote to memory of 2540 1364 Ut8{bs.exe Ut8{bs.exe PID 1364 wrote to memory of 2540 1364 Ut8{bs.exe Ut8{bs.exe PID 584 wrote to memory of 1960 584 _u-912IeH.exe cmd.exe PID 584 wrote to memory of 1960 584 _u-912IeH.exe cmd.exe PID 584 wrote to memory of 1960 584 _u-912IeH.exe cmd.exe PID 584 wrote to memory of 1960 584 _u-912IeH.exe cmd.exe PID 584 wrote to memory of 2168 584 _u-912IeH.exe cmd.exe PID 584 wrote to memory of 2168 584 _u-912IeH.exe cmd.exe PID 584 wrote to memory of 2168 584 _u-912IeH.exe cmd.exe PID 584 wrote to memory of 2168 584 _u-912IeH.exe cmd.exe PID 2168 wrote to memory of 1636 2168 cmd.exe netsh.exe PID 2168 wrote to memory of 1636 2168 cmd.exe netsh.exe PID 2168 wrote to memory of 1636 2168 cmd.exe netsh.exe PID 1960 wrote to memory of 2144 1960 cmd.exe vssadmin.exe PID 1960 wrote to memory of 2144 1960 cmd.exe vssadmin.exe PID 1960 wrote to memory of 2144 1960 cmd.exe vssadmin.exe PID 2168 wrote to memory of 1812 2168 cmd.exe netsh.exe PID 2168 wrote to memory of 1812 2168 cmd.exe netsh.exe PID 2168 wrote to memory of 1812 2168 cmd.exe netsh.exe PID 1220 wrote to memory of 3056 1220 Explorer.EXE B8B5.exe PID 1220 wrote to memory of 3056 1220 Explorer.EXE B8B5.exe PID 1220 wrote to memory of 3056 1220 Explorer.EXE B8B5.exe PID 1220 wrote to memory of 3056 1220 Explorer.EXE B8B5.exe PID 1220 wrote to memory of 3068 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 3068 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 3068 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 3068 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 3068 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1716 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1716 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1716 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1716 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1104 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1104 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1104 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1104 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1104 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1328 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1328 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1328 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1328 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 1328 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 2344 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 2344 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 2344 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 2344 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 2344 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 536 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 536 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 536 1220 Explorer.EXE explorer.exe PID 1220 wrote to memory of 536 1220 Explorer.EXE explorer.exe PID 1960 wrote to memory of 1676 1960 cmd.exe WMIC.exe PID 1960 wrote to memory of 1676 1960 cmd.exe WMIC.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a662ba3492a7d218908f5d851841ed96.exe"C:\Users\Admin\AppData\Local\Temp\a662ba3492a7d218908f5d851841ed96.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Deletes itself
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\B8B5.exeC:\Users\Admin\AppData\Local\Temp\B8B5.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Users\Admin\AppData\Local\Microsoft\Ut8{bs.exe"C:\Users\Admin\AppData\Local\Microsoft\Ut8{bs.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\Ut8{bs.exe"C:\Users\Admin\AppData\Local\Microsoft\Ut8{bs.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Microsoft\_u-912IeH.exe"C:\Users\Admin\AppData\Local\Microsoft\_u-912IeH.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\_u-912IeH.exe"C:\Users\Admin\AppData\Local\Microsoft\_u-912IeH.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off3⤵
- Modifies Windows Firewall
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
-
C:\Users\Admin\AppData\Local\Microsoft\G_P.exe"C:\Users\Admin\AppData\Local\Microsoft\G_P.exe"1⤵
- Executes dropped EXE
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW.cab.id[215BA69E-3483].[[email protected]].8baseFilesize
143.1MB
MD5d284cc48ba380f1f453724eab26856f3
SHA16fe51776e9c5f257cfca5cf6e8b09a8cbb52bbca
SHA2564ccc0f736b4fc6c81111cac475fb87484bda5af50b5f21623a79f988db719986
SHA512be16cea6db849f9e0e35774a68fb7f24f50a661783c6b5a8c9a8cf8b3fa1c702d704ff74f1bc7b444d621129ad3a51542b85f2e637c5ebaa53f5bfe37cafc653
-
C:\Users\Admin\AppData\Local\Microsoft\G_P.exeFilesize
165KB
MD5771e03d1211a93261e4b5686aa911243
SHA1d0b249fe34b8bdeac98712ac9dd37f340f287b4c
SHA25618cbb36da4425cd9d142d75e9e07b02fddeede075bf6f4c9297d014a9163e342
SHA5128aa08956338fbb5fe9f04126e09123e3fb5c512a73b00b843c517d9cd05695ff7d6df7e1bdea5621b1b660cec3e2a191ff68d10a1a12789a870dd8d49ad52ed5
-
C:\Users\Admin\AppData\Local\Microsoft\G_P.exeFilesize
165KB
MD5771e03d1211a93261e4b5686aa911243
SHA1d0b249fe34b8bdeac98712ac9dd37f340f287b4c
SHA25618cbb36da4425cd9d142d75e9e07b02fddeede075bf6f4c9297d014a9163e342
SHA5128aa08956338fbb5fe9f04126e09123e3fb5c512a73b00b843c517d9cd05695ff7d6df7e1bdea5621b1b660cec3e2a191ff68d10a1a12789a870dd8d49ad52ed5
-
C:\Users\Admin\AppData\Local\Microsoft\Ut8{bs.exeFilesize
165KB
MD5d8a652141be195333dd68e662b04c523
SHA1266363bf92a157ca769f3cce33f13363cf94eb3f
SHA25682e21c96880af14b90e7d8a688ec83c41bddcaa29ee05557b763795d1416ad39
SHA512ce0d269674d139358b5068b3df7ccbae1e5470a031d3e59ac1ab68493438e51dc733a6be5d36854257d8d5d5e822a9ad421398cc0a2f3c783d5d33b04af484ea
-
C:\Users\Admin\AppData\Local\Microsoft\Ut8{bs.exeFilesize
165KB
MD5d8a652141be195333dd68e662b04c523
SHA1266363bf92a157ca769f3cce33f13363cf94eb3f
SHA25682e21c96880af14b90e7d8a688ec83c41bddcaa29ee05557b763795d1416ad39
SHA512ce0d269674d139358b5068b3df7ccbae1e5470a031d3e59ac1ab68493438e51dc733a6be5d36854257d8d5d5e822a9ad421398cc0a2f3c783d5d33b04af484ea
-
C:\Users\Admin\AppData\Local\Microsoft\Ut8{bs.exeFilesize
165KB
MD5d8a652141be195333dd68e662b04c523
SHA1266363bf92a157ca769f3cce33f13363cf94eb3f
SHA25682e21c96880af14b90e7d8a688ec83c41bddcaa29ee05557b763795d1416ad39
SHA512ce0d269674d139358b5068b3df7ccbae1e5470a031d3e59ac1ab68493438e51dc733a6be5d36854257d8d5d5e822a9ad421398cc0a2f3c783d5d33b04af484ea
-
C:\Users\Admin\AppData\Local\Microsoft\_u-912IeH.exeFilesize
165KB
MD5a2f3d796dc2c2f474188db58d5ca7593
SHA1dc88893abba370aab576dcc9bd60b5fc7bb5dd4e
SHA256408d62cbf4789d9533230eff49b8b45c11b01fd8c8d6d65ec339725d7521a48c
SHA5129a454f6eb65ef53baa5cff2e2dd3b4691e80acc37b78e27b4832a045420942425aa458243d3640fe9b3d5c756cfb8d65d7f828cd4b6633228a6500327c1f2b7c
-
C:\Users\Admin\AppData\Local\Microsoft\_u-912IeH.exeFilesize
165KB
MD5a2f3d796dc2c2f474188db58d5ca7593
SHA1dc88893abba370aab576dcc9bd60b5fc7bb5dd4e
SHA256408d62cbf4789d9533230eff49b8b45c11b01fd8c8d6d65ec339725d7521a48c
SHA5129a454f6eb65ef53baa5cff2e2dd3b4691e80acc37b78e27b4832a045420942425aa458243d3640fe9b3d5c756cfb8d65d7f828cd4b6633228a6500327c1f2b7c
-
C:\Users\Admin\AppData\Local\Microsoft\_u-912IeH.exeFilesize
165KB
MD5a2f3d796dc2c2f474188db58d5ca7593
SHA1dc88893abba370aab576dcc9bd60b5fc7bb5dd4e
SHA256408d62cbf4789d9533230eff49b8b45c11b01fd8c8d6d65ec339725d7521a48c
SHA5129a454f6eb65ef53baa5cff2e2dd3b4691e80acc37b78e27b4832a045420942425aa458243d3640fe9b3d5c756cfb8d65d7f828cd4b6633228a6500327c1f2b7c
-
C:\Users\Admin\AppData\Local\Temp\B8B5.exeFilesize
165KB
MD5a2f3d796dc2c2f474188db58d5ca7593
SHA1dc88893abba370aab576dcc9bd60b5fc7bb5dd4e
SHA256408d62cbf4789d9533230eff49b8b45c11b01fd8c8d6d65ec339725d7521a48c
SHA5129a454f6eb65ef53baa5cff2e2dd3b4691e80acc37b78e27b4832a045420942425aa458243d3640fe9b3d5c756cfb8d65d7f828cd4b6633228a6500327c1f2b7c
-
C:\Users\Admin\AppData\Local\Temp\B8B5.exeFilesize
165KB
MD5a2f3d796dc2c2f474188db58d5ca7593
SHA1dc88893abba370aab576dcc9bd60b5fc7bb5dd4e
SHA256408d62cbf4789d9533230eff49b8b45c11b01fd8c8d6d65ec339725d7521a48c
SHA5129a454f6eb65ef53baa5cff2e2dd3b4691e80acc37b78e27b4832a045420942425aa458243d3640fe9b3d5c756cfb8d65d7f828cd4b6633228a6500327c1f2b7c
-
C:\Users\Admin\AppData\Local\Temp\B8B5.exeFilesize
165KB
MD5a2f3d796dc2c2f474188db58d5ca7593
SHA1dc88893abba370aab576dcc9bd60b5fc7bb5dd4e
SHA256408d62cbf4789d9533230eff49b8b45c11b01fd8c8d6d65ec339725d7521a48c
SHA5129a454f6eb65ef53baa5cff2e2dd3b4691e80acc37b78e27b4832a045420942425aa458243d3640fe9b3d5c756cfb8d65d7f828cd4b6633228a6500327c1f2b7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zf65wlcn.default-release\cookies.sqlite.id[215BA69E-3483].[[email protected]].8baseFilesize
96KB
MD50118853aefb7c3f5c3a04552faead425
SHA11504a0dce2ad700572941eab6748c7bf2293245c
SHA256a04323170b6e5a98d3b87a1310ffaf0121d5f261471a67fb06e8ba1f466a98b3
SHA512e804dac909abf46ce8d685425683ed1922b85d937f61dd687d966c9ee16af1c4ede83423583b23428ad88ea11853460990d6881a7e048c93a471648574d57592
-
C:\Users\Admin\AppData\Roaming\ejcbfsrFilesize
165KB
MD5d8a652141be195333dd68e662b04c523
SHA1266363bf92a157ca769f3cce33f13363cf94eb3f
SHA25682e21c96880af14b90e7d8a688ec83c41bddcaa29ee05557b763795d1416ad39
SHA512ce0d269674d139358b5068b3df7ccbae1e5470a031d3e59ac1ab68493438e51dc733a6be5d36854257d8d5d5e822a9ad421398cc0a2f3c783d5d33b04af484ea
-
C:\Users\Admin\AppData\Roaming\wbbffvcFilesize
438KB
MD528da584a90c29a9ef5d248bd58771a1f
SHA148792b2bc89646a0ec9f3b1879e05c8308672c7d
SHA256a7e2c1e9bd80246e1ab0bd931fc83be8512a2a9643389e44309163b0ca3b7d5b
SHA51273999339d006875f3e73e2bd1ff478287a49cc840c13fc8a010b64fd91c40688a7b3c965e5e414be154de4d2cad2e2223acb010f962700b4e20722502643f466
-
C:\Users\Admin\Desktop\AddCompare.rtf.id[215BA69E-3483].[[email protected]].8baseFilesize
609KB
MD56392910dcbc53550fde7e7b59f08c724
SHA1958df5ae89f60a671c8bd4777362a2fe44138fa1
SHA25681dcc6eb87891f90827ae306b039c10503358452e0a70caf633b7d949be17493
SHA512f6bd62fa5763fce44bbccff675dc2ae1261e0df2186711fe030a6fedbed7c7d414f9457bfdba3560edb04202619f08479029a4ddc28e219e17283da431e56208
-
C:\Users\Admin\Desktop\BackupMove.dib.id[215BA69E-3483].[[email protected]].8baseFilesize
981KB
MD5cf9d6955eb268db6ffe66c459db9a5b2
SHA1e3601422cf0d00f04f91f7593a835d2ba6aed4d5
SHA256359fdbbee971b59307835eb1f9f2c3a8aa84d8111169ead0956843a6bbc51128
SHA5120455f4c710858a3747ba607e9ea6a938b43bdffec7dbac827b9b069a4c4b5496da863918c7fb63281f3100ef6202782f2b4d3c0537c41359891fbe40670499bc
-
C:\Users\Admin\Desktop\CheckpointSwitch.tiff.id[215BA69E-3483].[[email protected]].8baseFilesize
880KB
MD56471bce59861402000463e56a2308874
SHA183ab8dc37b14eaf407ba943260f0709b71496875
SHA256fdd1fc6fd67f476e1eab3e9355ef27a80686714710adcba4d263da219e165a48
SHA512cd8b92fb95048baa5b44d67e59ba129427bb945afa8d0c07176921357c143a6bda6f3c447e7708e5d88b6670237809dea203eb51bf199ee102f6b51c3cfea0ad
-
C:\Users\Admin\Desktop\ClearPush.m3u.id[215BA69E-3483].[[email protected]].8baseFilesize
541KB
MD59ad497786bf717be14419e1d18122dd5
SHA199c7f2c6456e113d48358dc3139dc936f7f94f7e
SHA2563b446ae7dfe70fca12b7daf018e1a9a87cad9dcd1e4673c6f3ec640be576e168
SHA512b211d9ba2fc929eb811598d6171f185b0c409057037cc2f957bfd961d9a8e5426cb9c3c29539b006d4b663ce721735cfe64b31d1a8fb3aad27e083387d47767a
-
C:\Users\Admin\Desktop\ConvertFromWrite.mpe.id[215BA69E-3483].[[email protected]].8baseFilesize
1.0MB
MD5fabca6f0d86628b0ce3cc13bff3bbfa9
SHA139f381071e6d6f80d320e3a989e731e6e62c2220
SHA25691718d95226dc4c6bad478341623870d22daeceb1432abec2dbd8d190d91317d
SHA51259c9dfff7b309f9b63f38164298f23c5e328bd697fcffd4e1feaa841d2e23841c3dc97df576ec28cfc098d141a24b264f7ddfa0c96577149cc3f59891818e0b4
-
C:\Users\Admin\Desktop\DebugRegister.txt.id[215BA69E-3483].[[email protected]].8baseFilesize
474KB
MD507d1eccda809180af85a8865f4bccf1a
SHA1adf6dc4e347debc68098d35beddfb48cebd4e4d9
SHA256cc5e825c1e209a149e910bbd06200014e1e57d2d4dd596ebd7f7f012a78f9445
SHA512cdb536a2c8912b59cf293eb8811f61cc57227c560b07fbbd049e31aa653a1440d3d2d727610715144702313ccfdeba11ebe9fce99edae3a11a6fcc82eeb098dd
-
C:\Users\Admin\Desktop\DenySend.potx.id[215BA69E-3483].[[email protected]].8baseFilesize
406KB
MD5117d1319a97123695a477e6c83796c0d
SHA1eeb2a153fdae9632c1c9da23e2efc9552c3367a3
SHA256dd044c03e2cae7679d7f73b549eac9594002979b61de23c7b62846f301927021
SHA512dce2311f0f969f3bb7d9c1761605d112c40bf566238c081be2fb93c30bc2105e0070a278690a1a2f15d85ea1c30fac3d077d674324861e95aa63515ad9480d1a
-
C:\Users\Admin\Desktop\DisablePing.xlt.id[215BA69E-3483].[[email protected]].8baseFilesize
812KB
MD502b6e433f2505dd18c461ef59691b65b
SHA14fd708b9401a6cabbd400404c0d50771f709ab93
SHA256c6d1c034631c53b908a8562907db19f58afb4e3124ae99195067e2bb2b9f1f00
SHA512e86ce91ea1cdc01792568d0179fc3ed4dfb41010775185ef6fb71f24f484843b040777901aeeb3f58a0eb562711eab59d2079e5c8f106ab8048537b0a510102c
-
C:\Users\Admin\Desktop\DisableSubmit.mht.id[215BA69E-3483].[[email protected]].8baseFilesize
372KB
MD5106a78a4364a6cbd09ce1789ba32eafc
SHA179c5f51fba04c0ad59555a3d8cfaacebb1e0bcd6
SHA256b1160e2bbd8408382ae03a6371267ccdddeedce8c68679be4bd469c388ccd64b
SHA512a8ef029a573575976dd9287b14e3aa1e33b00cfd5b188cb40b1fa8f870502b4d7f2226dbf34cef9fc242f9e625e43041a5bcad981f03eab922849937d85d926e
-
C:\Users\Admin\Desktop\HideInitialize.wma.id[215BA69E-3483].[[email protected]].8baseFilesize
1.4MB
MD563dc96e185a12d586735c27ce72efdb6
SHA1edcd885ccd39999206e9018e8517d9346b06058d
SHA256912d0d298d8268e682fac39ca54b6c063f03b52a8e07faf35e83c11f88c9ef77
SHA5121830a974fd2ae41f5d26093002181e49ab27176f268522bea70dda242e795bf067e02ca6e6af78dc3f6adf81012e6fd61196644b4bb9669e4f76abb5cfe32151
-
C:\Users\Admin\Desktop\HideSave.zip.id[215BA69E-3483].[[email protected]].8baseFilesize
1015KB
MD598410befe4e81286ffde198591a2bb5a
SHA19a1913dba967dddd6cda4d8ee210b982bfc59adf
SHA256b1aa814ea8c7a178d76ca3554d028eb219ed872b4f18b895c60e52ee744dc1a0
SHA512343ea8dd6783b9b65d59996073c3e7343ece37c8d19c71ac042d6f5af851ef9a3ea6440ba03d09af05ef68097cb6bbad89eb1c103a478dcdf24abef5da2df5cf
-
C:\Users\Admin\Desktop\MoveDismount.avi.id[215BA69E-3483].[[email protected]].8baseFilesize
778KB
MD51ee42eba2f4b0e024cd9e54cb8f4b834
SHA179bb2385e792d1e6477b2643c3141ead84049677
SHA256493a52656fd1e7a0bc90b0fdfa71443873b1555105efc21436c6c01c9e5da4d6
SHA512fef070a8b8df07f80f4c676982d999a648ee4939df79f7df001e66f96292d7978069b08129487d70a91dd7ee83f1ecbc03f9858253384438486cb52780d449fb
-
C:\Users\Admin\Desktop\OpenJoin.xml.id[215BA69E-3483].[[email protected]].8baseFilesize
575KB
MD5e30feb179b324395ffc6ccfd39be1217
SHA1aadd0676023d528c909cc6d6e96be4c4e8d22cca
SHA256d5b43b68a6f32070a8b3a3719186d27bdf6ca2cacc5b7f67981bbdf387e1f44d
SHA512f184478a4c544a43215a1b66fbf0569b1cc6911acf6e0b5956a1a6098734900f7e3ca8c8042e7e6db562804d09cf23a7a47f73dae0059ae39708cb3d0292047f
-
C:\Users\Admin\Desktop\ResetConvertTo.m1v.id[215BA69E-3483].[[email protected]].8baseFilesize
914KB
MD5847476be67005f82d59c709b68d2615f
SHA19aff704237a2a10362378f9159cb3690b8919e7d
SHA256a6359008cb212d3cb203a51176113476be5d727f26a1f498bcde201fef9faa66
SHA5121e4cad192fdf9060bd00ea03303c13149a3e1c0e318788e6ca33ea5566ebe258f8c2143eb878caabcc0bed4981b693ae27baa28a0f39088e62fc4382a81de375
-
C:\Users\Admin\Desktop\SplitNew.xps.id[215BA69E-3483].[[email protected]].8baseFilesize
440KB
MD55bd4a4682bf050120c8721eaecc4820e
SHA16e03176486f1c231fede439a76fa321dd60e205c
SHA25657bcbf74db6f05d4aa3f3cc7bb030a122d988fff37fea2b81c3e4df1c799139f
SHA512ff568954e457a20d2ed9783ae004715fa3324192d524c91061173a012b5637d4123df6204bca3a2ec27334f4eb3adccc85f2e2d0eec7e830f3f54240d093e65f
-
C:\Users\Admin\Desktop\SwitchUnpublish.mpa.id[215BA69E-3483].[[email protected]].8baseFilesize
745KB
MD595ee02514852536e6840fa18fa5db57a
SHA11c70439b7b60784d649ab4ffd4530e4f92a41733
SHA25636f8fe9455cd290e437df18bcc568f95c270fa0264752650efdf44d80687a26d
SHA51220c8d1cecbf4887a448b2a24603e7a52f9f4de02164137c580cfff526db28b453fe1fc03bb0b4e1db12f4c6c9db6f914a3307b1375d35077f8c64628a3e8bed3
-
C:\Users\Admin\Desktop\SyncUnpublish.ocx.id[215BA69E-3483].[[email protected]].8baseFilesize
677KB
MD52a2a5eaf4734f21f49f26804d931c7d6
SHA1c17a95c24909d56395ab176e5302bc77dcdd495a
SHA256bc0c7f13db76db2e6835518b4eb4c5f0c9172458735c7acec3128216d9e6f039
SHA512e2f0207153b348520226f1c323bbacd0da1fbe88873cb7b1763cfc09c26e553e92cc56ac73ad10da8b53cd8bf77e49fef9a0560bd483b17309d6022979543e18
-
C:\Users\Admin\Desktop\UndoConfirm.xlsb.id[215BA69E-3483].[[email protected]].8baseFilesize
508KB
MD5a7fadc3d5e94a6e9742e984e812b0bc3
SHA142a45eb1907ecbabad9bd3b57ec2963eafd61ea7
SHA25663a9c9d411fd2193df26fb000cf6920043cabba849acd957884ec72b68249e8c
SHA512f40b37eca1fbcb99836e5c1222ae2cbb913e4b28d5dba8046c8e8243107f14681b682b8ef65e43716fdd3c9bc10a0c86424cd1fde572c7fa10f9345df45ba7ac
-
C:\Users\Admin\Desktop\UninstallConnect.rm.id[215BA69E-3483].[[email protected]].8baseFilesize
643KB
MD5e53647fb88d414153f3d7436d42d0761
SHA1eb60fa1cb5eb3864b2c4bf35a67ed7c971401ae1
SHA256e1e22cb811f28c037fd27802e92651f89d8e748d8af68934ee678ce3da499bce
SHA5124ddb03db8222a235c4d7847b7a7eeb4ac010dfdffc6dfe7bf052aaa43e150a4e68c10401a5a4c0cc14138cce3e3798f1fa014704b623dc4642f5b4dd93576ddf
-
C:\Users\Admin\Desktop\UpdateRevoke.vbe.id[215BA69E-3483].[[email protected]].8baseFilesize
948KB
MD55933d683413a83b0db0f3ef955bf789e
SHA139c6ea1b6bcb4ad91d9f9e63339021fc65c141b3
SHA2560cc8f0b471f3b52a0c73f8a04dcfd48648c2d51ee87a30d53ca64b76d63b4f35
SHA512ff1f6e096b8f4f312bf2f2be985ce47a78abfa52e79e61fdff2a653225dd7f53ce95b02a88146ece1fca5b3ef9ea0c634056ac48e72db08c49dc467de7059739
-
C:\Users\Admin\Desktop\UseLock.pub.id[215BA69E-3483].[[email protected]].8baseFilesize
846KB
MD5c1a89429ee8e77493b7beee711995fe5
SHA1ddc95fc71a2f2bfd46fe7dcc38da0bb86ac11ea0
SHA256010afd37897771b727f95d11bb974bce3505994861972d437c9e92cb288d1bc3
SHA512106aee71859cb34c7a7bd9f1c5e3c1bb4411bf9d666247f1d4da8e618b9533aa6b022db772963ce6d0e3cf4781f8b81a78b211fcbfe297d9d04697c7cd47b465
-
C:\Users\Admin\Desktop\WaitSet.shtml.id[215BA69E-3483].[[email protected]].8baseFilesize
711KB
MD51416cdba84193c8c186969a1a7f48e3f
SHA1572d2bb23d786e83d6fb42e966e72a733f4c523b
SHA25605e5c8b1cac109f92692e8f743b74c95ea9a9a5f80d7b7e33bf0e18aaac78426
SHA5127f9ad171245dfaccb76bcc1bec237c0cc8d8ae181a8c0a00b61844b48b7e81fb145a0c4cc21b4625e9fb4d238331500a403708e0a91653ef1e696f4ce926cc19
-
C:\Users\Admin\Desktop\info.htaFilesize
5KB
MD5e6fc569bdb5fc632b48a139839264da8
SHA15af9bd158b68421d8b4f52db7455b32d7556c75d
SHA256895dfaa240b5f2cf0752d4ecae4bdaa69a5657a6d269b35a42f69e8fdb23f407
SHA512e516fa81ea4ba431c54c59e5e0ed93a338c57725517e25d8c75198dfa80cf22df8e90f06cf5bdadc4c60f3e76ebe64ce8afda5266bcbab30adcb930de10de296
-
C:\Users\Admin\Desktop\info.txtFilesize
216B
MD5785cafecedf21b32589f303a8a490a6a
SHA15388d3b2a40734142918364eadc02b4429d856e3
SHA256e455b6bfe96488ca6d4ee70ef495c8925040d22a7cba422e0db7469065daf932
SHA5124511937134dd7809e888f9bcfcf06d24c17a06f55b5a2b9690a381fda8de9cb793a9799c91814ce43f47ca6db594b010c5feae8aff08bd3edd448967d06fc93b
-
C:\Users\Public\Desktop\Adobe Reader 9.lnk.id[215BA69E-3483].[[email protected]].8baseFilesize
2KB
MD531f665c67a1c10ffc8a6a4c53ae4b47b
SHA1b347edc82cd8636e7fa0e467f6a76637a1912543
SHA256fcb833c399e80975cd5099447760f739db57bc374cf2948a6fa36b996a6410f0
SHA5120ffb9cb646ab1368326297231e04da7797ea14f1bff5aba2507723531f8e4eb771af9b0bbc172a760a4b9abd15b69f22e2d539bf15100635eeb1520c0bcac0bf
-
C:\Users\Public\Desktop\Firefox.lnk.id[215BA69E-3483].[[email protected]].8baseFilesize
1KB
MD5fa26c55dcd4f57357194436b73ee87af
SHA182dfd3368339f12624eb0f7a7074ad57f36b0a9b
SHA25641262eb2d912f509a96fe3a373a44b329d901df239f713e8aa5ba819ad715fcc
SHA512d07f057af852b4b0dd2573f2e0fe4f34aa2b044ec2f8fe76654fa95ba3f5f368c2c18492da425f18a1d63b295ba2f95e45a113c9e5abc556278b5cd010fb9e5c
-
C:\Users\Public\Desktop\Google Chrome.lnk.id[215BA69E-3483].[[email protected]].8baseFilesize
2KB
MD569401169ffb58262685e1411b06cc024
SHA1db1ee400ae0b5220a94637f17c09c7b71925a894
SHA256a105778ceef6ebc175be048a17d363e88c93a422aff4df5c2703d124bb7ba24e
SHA51216ed33fe50b2f3cf3633ec6ecaff5468b326ab8bcf65290f29830bf70c8b03a3635a963e482f5c27a6bc9b3ac2df804256b6f52cf8a0704c3bb11ed3672694e6
-
C:\Users\Public\Desktop\VLC media player.lnk.id[215BA69E-3483].[[email protected]].8baseFilesize
1KB
MD5498b7d7a692b6f51a600c956f5e94bdc
SHA17bd9d3c1dcf3ebcf8592182349b1965232c5a08f
SHA256752bd09c1ac1660d8fa6e58e005bf4f49f33441d8ba9a68a0a5ad4f451494019
SHA512cde7360847c0aa4d610833807430690888ba113dd56d9bf19bd8a6a59aacdc937ffff768b95dee28a74d8c02196267b223bae791290df34f1f85df14f404d224
-
C:\Users\Public\Desktop\info.txtFilesize
216B
MD5785cafecedf21b32589f303a8a490a6a
SHA15388d3b2a40734142918364eadc02b4429d856e3
SHA256e455b6bfe96488ca6d4ee70ef495c8925040d22a7cba422e0db7469065daf932
SHA5124511937134dd7809e888f9bcfcf06d24c17a06f55b5a2b9690a381fda8de9cb793a9799c91814ce43f47ca6db594b010c5feae8aff08bd3edd448967d06fc93b
-
C:\info.htaFilesize
5KB
MD5e6fc569bdb5fc632b48a139839264da8
SHA15af9bd158b68421d8b4f52db7455b32d7556c75d
SHA256895dfaa240b5f2cf0752d4ecae4bdaa69a5657a6d269b35a42f69e8fdb23f407
SHA512e516fa81ea4ba431c54c59e5e0ed93a338c57725517e25d8c75198dfa80cf22df8e90f06cf5bdadc4c60f3e76ebe64ce8afda5266bcbab30adcb930de10de296
-
C:\info.htaFilesize
5KB
MD5e6fc569bdb5fc632b48a139839264da8
SHA15af9bd158b68421d8b4f52db7455b32d7556c75d
SHA256895dfaa240b5f2cf0752d4ecae4bdaa69a5657a6d269b35a42f69e8fdb23f407
SHA512e516fa81ea4ba431c54c59e5e0ed93a338c57725517e25d8c75198dfa80cf22df8e90f06cf5bdadc4c60f3e76ebe64ce8afda5266bcbab30adcb930de10de296
-
C:\users\public\desktop\info.htaFilesize
5KB
MD5e6fc569bdb5fc632b48a139839264da8
SHA15af9bd158b68421d8b4f52db7455b32d7556c75d
SHA256895dfaa240b5f2cf0752d4ecae4bdaa69a5657a6d269b35a42f69e8fdb23f407
SHA512e516fa81ea4ba431c54c59e5e0ed93a338c57725517e25d8c75198dfa80cf22df8e90f06cf5bdadc4c60f3e76ebe64ce8afda5266bcbab30adcb930de10de296
-
F:\info.htaFilesize
5KB
MD5e6fc569bdb5fc632b48a139839264da8
SHA15af9bd158b68421d8b4f52db7455b32d7556c75d
SHA256895dfaa240b5f2cf0752d4ecae4bdaa69a5657a6d269b35a42f69e8fdb23f407
SHA512e516fa81ea4ba431c54c59e5e0ed93a338c57725517e25d8c75198dfa80cf22df8e90f06cf5bdadc4c60f3e76ebe64ce8afda5266bcbab30adcb930de10de296
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/204-3830-0x0000000000060000-0x000000000006D000-memory.dmpFilesize
52KB
-
memory/204-3852-0x0000000000060000-0x000000000006D000-memory.dmpFilesize
52KB
-
memory/204-3851-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/536-3207-0x00000000000F0000-0x00000000000F9000-memory.dmpFilesize
36KB
-
memory/536-3636-0x00000000000F0000-0x00000000000F9000-memory.dmpFilesize
36KB
-
memory/536-3208-0x00000000000E0000-0x00000000000EF000-memory.dmpFilesize
60KB
-
memory/536-3206-0x00000000000E0000-0x00000000000EF000-memory.dmpFilesize
60KB
-
memory/584-109-0x0000000000610000-0x0000000000710000-memory.dmpFilesize
1024KB
-
memory/584-4891-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB
-
memory/584-194-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB
-
memory/584-3249-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB
-
memory/584-111-0x0000000000220000-0x000000000022F000-memory.dmpFilesize
60KB
-
memory/584-112-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB
-
memory/584-2482-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB
-
memory/584-1448-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB
-
memory/584-126-0x0000000000610000-0x0000000000710000-memory.dmpFilesize
1024KB
-
memory/924-371-0x00000000005E0000-0x00000000006E0000-memory.dmpFilesize
1024KB
-
memory/924-374-0x0000000000220000-0x0000000000225000-memory.dmpFilesize
20KB
-
memory/924-117-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB
-
memory/924-116-0x0000000000220000-0x0000000000225000-memory.dmpFilesize
20KB
-
memory/924-115-0x00000000005E0000-0x00000000006E0000-memory.dmpFilesize
1024KB
-
memory/1104-3041-0x00000000000C0000-0x00000000000C9000-memory.dmpFilesize
36KB
-
memory/1104-3243-0x00000000000D0000-0x00000000000D4000-memory.dmpFilesize
16KB
-
memory/1104-3039-0x00000000000C0000-0x00000000000C9000-memory.dmpFilesize
36KB
-
memory/1104-3040-0x00000000000D0000-0x00000000000D4000-memory.dmpFilesize
16KB
-
memory/1220-344-0x0000000002940000-0x0000000002956000-memory.dmpFilesize
88KB
-
memory/1320-4254-0x0000000000060000-0x000000000006D000-memory.dmpFilesize
52KB
-
memory/1320-3951-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/1328-3046-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/1328-3048-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/1328-3047-0x0000000000090000-0x000000000009A000-memory.dmpFilesize
40KB
-
memory/1364-118-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1364-119-0x00000000008E0000-0x00000000009E0000-memory.dmpFilesize
1024KB
-
memory/1488-3642-0x0000000000080000-0x0000000000089000-memory.dmpFilesize
36KB
-
memory/1488-3646-0x0000000000080000-0x0000000000089000-memory.dmpFilesize
36KB
-
memory/1716-3030-0x0000000000060000-0x000000000006C000-memory.dmpFilesize
48KB
-
memory/1716-3034-0x0000000000060000-0x000000000006C000-memory.dmpFilesize
48KB
-
memory/1716-3031-0x0000000000070000-0x0000000000077000-memory.dmpFilesize
28KB
-
memory/1756-107-0x0000000000120000-0x0000000000122000-memory.dmpFilesize
8KB
-
memory/1756-80-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-108-0x0000000077560000-0x0000000077709000-memory.dmpFilesize
1.7MB
-
memory/1756-105-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-95-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-94-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-93-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-92-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-91-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-64-0x0000000000060000-0x0000000000063000-memory.dmpFilesize
12KB
-
memory/1756-77-0x0000000000060000-0x0000000000063000-memory.dmpFilesize
12KB
-
memory/1756-78-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/1756-90-0x0000000077560000-0x0000000077709000-memory.dmpFilesize
1.7MB
-
memory/1756-89-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-88-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-87-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-79-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-106-0x0000000077560000-0x0000000077709000-memory.dmpFilesize
1.7MB
-
memory/1756-81-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-82-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-85-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1756-83-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmpFilesize
1.2MB
-
memory/1932-4035-0x0000000000070000-0x0000000000075000-memory.dmpFilesize
20KB
-
memory/1932-3634-0x0000000000060000-0x0000000000069000-memory.dmpFilesize
36KB
-
memory/1932-3632-0x0000000000060000-0x0000000000069000-memory.dmpFilesize
36KB
-
memory/1932-3633-0x0000000000070000-0x0000000000075000-memory.dmpFilesize
20KB
-
memory/2056-3456-0x0000000000060000-0x000000000006C000-memory.dmpFilesize
48KB
-
memory/2056-3474-0x0000000000060000-0x000000000006C000-memory.dmpFilesize
48KB
-
memory/2056-3471-0x00000000000C0000-0x00000000000C9000-memory.dmpFilesize
36KB
-
memory/2092-3242-0x00000000000C0000-0x00000000000C9000-memory.dmpFilesize
36KB
-
memory/2092-3228-0x00000000000C0000-0x00000000000C9000-memory.dmpFilesize
36KB
-
memory/2092-3643-0x00000000000D0000-0x00000000000D5000-memory.dmpFilesize
20KB
-
memory/2092-3229-0x00000000000D0000-0x00000000000D5000-memory.dmpFilesize
20KB
-
memory/2344-3631-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/2344-3103-0x00000000000D0000-0x00000000000D7000-memory.dmpFilesize
28KB
-
memory/2344-3102-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/2540-121-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2540-123-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2540-125-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2540-345-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2552-3635-0x0000000000100000-0x0000000000127000-memory.dmpFilesize
156KB
-
memory/2552-3638-0x0000000000100000-0x0000000000127000-memory.dmpFilesize
156KB
-
memory/2552-3637-0x0000000000060000-0x0000000000069000-memory.dmpFilesize
36KB
-
memory/2648-65-0x0000000000310000-0x0000000000381000-memory.dmpFilesize
452KB
-
memory/2648-61-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/2648-55-0x0000000000310000-0x0000000000381000-memory.dmpFilesize
452KB
-
memory/2648-56-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/2648-57-0x0000000000230000-0x0000000000237000-memory.dmpFilesize
28KB
-
memory/2648-60-0x0000000001E50000-0x0000000002250000-memory.dmpFilesize
4.0MB
-
memory/2648-58-0x0000000001E50000-0x0000000002250000-memory.dmpFilesize
4.0MB
-
memory/2648-59-0x0000000001E50000-0x0000000002250000-memory.dmpFilesize
4.0MB
-
memory/2648-62-0x0000000001E50000-0x0000000002250000-memory.dmpFilesize
4.0MB
-
memory/2648-63-0x0000000000570000-0x0000000000670000-memory.dmpFilesize
1024KB
-
memory/2648-54-0x0000000000570000-0x0000000000670000-memory.dmpFilesize
1024KB
-
memory/2648-66-0x0000000001DD0000-0x0000000001E06000-memory.dmpFilesize
216KB
-
memory/2648-72-0x0000000001DD0000-0x0000000001E06000-memory.dmpFilesize
216KB
-
memory/2648-75-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/2648-76-0x0000000001E50000-0x0000000002250000-memory.dmpFilesize
4.0MB
-
memory/2648-73-0x0000000001E50000-0x0000000002250000-memory.dmpFilesize
4.0MB
-
memory/2748-3670-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/2748-3718-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/2748-3675-0x0000000000090000-0x0000000000096000-memory.dmpFilesize
24KB
-
memory/2796-3630-0x00000000000C0000-0x00000000000C9000-memory.dmpFilesize
36KB
-
memory/2796-3850-0x0000000000060000-0x000000000006C000-memory.dmpFilesize
48KB
-
memory/2796-3628-0x00000000000C0000-0x00000000000C9000-memory.dmpFilesize
36KB
-
memory/2796-3629-0x0000000000060000-0x000000000006C000-memory.dmpFilesize
48KB
-
memory/3068-2861-0x0000000000080000-0x00000000000EB000-memory.dmpFilesize
428KB
-
memory/3068-2849-0x0000000000080000-0x00000000000EB000-memory.dmpFilesize
428KB
-
memory/3068-2857-0x0000000000430000-0x00000000004A5000-memory.dmpFilesize
468KB
-
memory/3068-1780-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB
-
memory/3068-2925-0x0000000000080000-0x00000000000EB000-memory.dmpFilesize
428KB
-
memory/3068-1779-0x00000000005C0000-0x00000000006C0000-memory.dmpFilesize
1024KB