Overview
overview
10Static
static
3eeeeeeeeee...00.exe
windows7-x64
eeeeeeeeee...00.exe
windows10-2004-x64
eeeeeeeeee...um.exe
windows7-x64
10eeeeeeeeee...um.exe
windows10-2004-x64
10eeeeeeeeee...ug.exe
windows7-x64
6eeeeeeeeee...ug.exe
windows10-2004-x64
6eeeeeeeeee...le.exe
windows7-x64
1eeeeeeeeee...le.exe
windows10-2004-x64
1eeeeeeeeee...er.exe
windows7-x64
7eeeeeeeeee...er.exe
windows10-2004-x64
7eeeeeeeeee...us.exe
windows7-x64
1eeeeeeeeee...us.exe
windows10-2004-x64
1MEMZ 3.0/MEMZ.bat
windows7-x64
7MEMZ 3.0/MEMZ.bat
windows10-2004-x64
7MEMZ 3.0/MEMZ.exe
windows7-x64
6MEMZ 3.0/MEMZ.exe
windows10-2004-x64
7eeeeeeeeee...MZ.bat
windows7-x64
7eeeeeeeeee...MZ.bat
windows10-2004-x64
7eeeeeeeeee...MZ.exe
windows7-x64
6eeeeeeeeee...MZ.exe
windows10-2004-x64
7eeeeeeeeee...ld.exe
windows7-x64
3eeeeeeeeee...ld.exe
windows10-2004-x64
3eeeeeeeeee....A.exe
windows7-x64
6eeeeeeeeee....A.exe
windows10-2004-x64
1eeeeeeeeee...al.exe
windows7-x64
7eeeeeeeeee...al.exe
windows10-2004-x64
8eeeeeeeeee...15.exe
windows7-x64
3eeeeeeeeee...15.exe
windows10-2004-x64
3eeeeeeeeee...al.exe
windows7-x64
7eeeeeeeeee...al.exe
windows10-2004-x64
8eeeeeeeeee...0r.exe
windows7-x64
10eeeeeeeeee...0r.exe
windows10-2004-x64
10Resubmissions
15-09-2024 23:12
240915-27aqvsxhjq 815-09-2024 23:02
240915-21efgaxake 815-09-2024 22:58
240915-2xypyaxdkj 315-09-2024 22:56
240915-2wn44sxcpk 315-09-2024 22:43
240915-2np2fawhpr 315-09-2024 22:42
240915-2m3k5swhmk 1015-09-2024 22:33
240915-2gqdmawbja 815-09-2024 22:27
240915-2de4gswekk 715-09-2024 22:15
240915-16esravenh 10Analysis
-
max time kernel
490s -
max time network
608s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/000/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/000/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Antivirus Platinum/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Antivirus Platinum/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/ColorBug/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/ColorBug/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/DesktopPuzzle/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/DesktopPuzzle/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/FakeActivation/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/FakeActivation/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Happy Antivirus/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Happy Antivirus/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
MEMZ 3.0/MEMZ.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
MEMZ 3.0/MEMZ.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
MEMZ 3.0/MEMZ.exe
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
MEMZ 3.0/MEMZ.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.bat
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/NavaShield/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/NavaShield/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Petya.A/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Petya.A/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Central/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Central/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Defender 2015/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Defender 2015/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/VineMEMZ-Original.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/VineMEMZ-Original.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/WannaCrypt0r/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/WannaCrypt0r/[email protected]
Resource
win10v2004-20240226-en
General
-
Target
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.exe
-
Size
12KB
-
MD5
a7bcf7ea8e9f3f36ebfb85b823e39d91
-
SHA1
761168201520c199dba68add3a607922d8d4a86e
-
SHA256
3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
-
SHA512
89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
SSDEEP
192:HMDLTxWDf/pl3cIEiwqZKBktLe3P+qf2jhP6B5b2yL3:H4IDH3cIqqvUWq+jhyT2yL
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MEMZ.exedescription ioc process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601780c05773da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "21" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f7000000000200000000001066000000010000200000009ed2ed5873f3dd61a8c7b170ef57e78d27e9062abb3ddfe053f5ea3e582f86a2000000000e8000000002000020000000500354ef569639bddf21f2a21bcc195266b97945d265226b96d5f1259cfa82de20000000f108f9493d36ad63ce08d13f2a8a74a16f5a601eac3fabf2d18ed2a16c9eff444000000059c01478365ba4c145211f980a28321ca52540ffd50ad966930b53e4a0e8e2e940fcd1c6735a5eff4007598c409b6c168f55737b6d7882b3bc78a898cb6e2730 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE337621-DF4A-11EE-B66C-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Runs regedit.exe 3 IoCs
Processes:
regedit.exeregedit.exeregedit.exepid process 3844 regedit.exe 5072 regedit.exe 4536 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 2064 MEMZ.exe 2320 MEMZ.exe 1724 MEMZ.exe 2320 MEMZ.exe 2064 MEMZ.exe 2992 MEMZ.exe 1724 MEMZ.exe 2572 MEMZ.exe 2992 MEMZ.exe 2064 MEMZ.exe 2320 MEMZ.exe 2572 MEMZ.exe 1724 MEMZ.exe 2992 MEMZ.exe 2064 MEMZ.exe 2320 MEMZ.exe 2572 MEMZ.exe 1724 MEMZ.exe 2992 MEMZ.exe 2064 MEMZ.exe 2320 MEMZ.exe 2572 MEMZ.exe 1724 MEMZ.exe 2992 MEMZ.exe 2572 MEMZ.exe 1724 MEMZ.exe 2064 MEMZ.exe 2320 MEMZ.exe 2992 MEMZ.exe 2064 MEMZ.exe 2320 MEMZ.exe 1724 MEMZ.exe 2572 MEMZ.exe 2992 MEMZ.exe 2064 MEMZ.exe 2320 MEMZ.exe 1724 MEMZ.exe 2572 MEMZ.exe 2992 MEMZ.exe 1724 MEMZ.exe 2064 MEMZ.exe 2320 MEMZ.exe 2572 MEMZ.exe 2992 MEMZ.exe 1724 MEMZ.exe 2064 MEMZ.exe 2320 MEMZ.exe 2992 MEMZ.exe 2064 MEMZ.exe 2320 MEMZ.exe 1724 MEMZ.exe 2572 MEMZ.exe 2992 MEMZ.exe 2064 MEMZ.exe 2320 MEMZ.exe 1724 MEMZ.exe 2572 MEMZ.exe 2572 MEMZ.exe 2320 MEMZ.exe 2064 MEMZ.exe 2992 MEMZ.exe 1724 MEMZ.exe 2992 MEMZ.exe 2064 MEMZ.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
mmc.exemmc.exemmc.exeMEMZ.exetaskmgr.exepid process 2560 mmc.exe 2004 mmc.exe 1372 mmc.exe 2548 MEMZ.exe 3360 taskmgr.exe -
Suspicious behavior: SetClipboardViewer 3 IoCs
Processes:
mmc.exemmc.exemmc.exepid process 2004 mmc.exe 1372 mmc.exe 3908 mmc.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
mmc.exeAUDIODG.EXEmmc.exemmc.exetaskmgr.exemmc.exedescription pid process Token: 33 2560 mmc.exe Token: SeIncBasePriorityPrivilege 2560 mmc.exe Token: 33 2560 mmc.exe Token: SeIncBasePriorityPrivilege 2560 mmc.exe Token: 33 2560 mmc.exe Token: SeIncBasePriorityPrivilege 2560 mmc.exe Token: 33 2560 mmc.exe Token: SeIncBasePriorityPrivilege 2560 mmc.exe Token: 33 1572 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1572 AUDIODG.EXE Token: 33 1572 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1572 AUDIODG.EXE Token: 33 2004 mmc.exe Token: SeIncBasePriorityPrivilege 2004 mmc.exe Token: 33 2004 mmc.exe Token: SeIncBasePriorityPrivilege 2004 mmc.exe Token: 33 2004 mmc.exe Token: SeIncBasePriorityPrivilege 2004 mmc.exe Token: 33 1372 mmc.exe Token: SeIncBasePriorityPrivilege 1372 mmc.exe Token: 33 1372 mmc.exe Token: SeIncBasePriorityPrivilege 1372 mmc.exe Token: 33 1372 mmc.exe Token: SeIncBasePriorityPrivilege 1372 mmc.exe Token: SeDebugPrivilege 3360 taskmgr.exe Token: 33 3908 mmc.exe Token: SeIncBasePriorityPrivilege 3908 mmc.exe Token: 33 3908 mmc.exe Token: SeIncBasePriorityPrivilege 3908 mmc.exe Token: 33 3908 mmc.exe Token: SeIncBasePriorityPrivilege 3908 mmc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
iexplore.exetaskmgr.exepid process 2636 iexplore.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
mmc.exemmc.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEmmc.exemmc.exeMEMZ.exeIEXPLORE.EXEmmc.exemmc.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 2132 mmc.exe 2560 mmc.exe 2560 mmc.exe 2636 iexplore.exe 2636 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 760 IEXPLORE.EXE 760 IEXPLORE.EXE 760 IEXPLORE.EXE 760 IEXPLORE.EXE 624 IEXPLORE.EXE 624 IEXPLORE.EXE 624 IEXPLORE.EXE 624 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 2760 mmc.exe 2004 mmc.exe 2004 mmc.exe 2548 MEMZ.exe 484 IEXPLORE.EXE 484 IEXPLORE.EXE 484 IEXPLORE.EXE 484 IEXPLORE.EXE 760 IEXPLORE.EXE 760 IEXPLORE.EXE 760 IEXPLORE.EXE 760 IEXPLORE.EXE 2548 MEMZ.exe 2648 mmc.exe 1372 mmc.exe 1372 mmc.exe 2548 MEMZ.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2548 MEMZ.exe 624 IEXPLORE.EXE 624 IEXPLORE.EXE 624 IEXPLORE.EXE 624 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 2548 MEMZ.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2548 MEMZ.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2548 MEMZ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
MEMZ.exeMEMZ.exemmc.exeiexplore.exedescription pid process target process PID 1316 wrote to memory of 2064 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2064 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2064 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2064 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 1724 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 1724 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 1724 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 1724 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2320 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2320 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2320 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2320 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2572 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2572 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2572 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2572 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2992 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2992 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2992 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2992 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2548 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2548 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2548 1316 MEMZ.exe MEMZ.exe PID 1316 wrote to memory of 2548 1316 MEMZ.exe MEMZ.exe PID 2548 wrote to memory of 2660 2548 MEMZ.exe notepad.exe PID 2548 wrote to memory of 2660 2548 MEMZ.exe notepad.exe PID 2548 wrote to memory of 2660 2548 MEMZ.exe notepad.exe PID 2548 wrote to memory of 2660 2548 MEMZ.exe notepad.exe PID 2548 wrote to memory of 2132 2548 MEMZ.exe mmc.exe PID 2548 wrote to memory of 2132 2548 MEMZ.exe mmc.exe PID 2548 wrote to memory of 2132 2548 MEMZ.exe mmc.exe PID 2548 wrote to memory of 2132 2548 MEMZ.exe mmc.exe PID 2132 wrote to memory of 2560 2132 mmc.exe mmc.exe PID 2132 wrote to memory of 2560 2132 mmc.exe mmc.exe PID 2132 wrote to memory of 2560 2132 mmc.exe mmc.exe PID 2132 wrote to memory of 2560 2132 mmc.exe mmc.exe PID 2548 wrote to memory of 2636 2548 MEMZ.exe iexplore.exe PID 2548 wrote to memory of 2636 2548 MEMZ.exe iexplore.exe PID 2548 wrote to memory of 2636 2548 MEMZ.exe iexplore.exe PID 2548 wrote to memory of 2636 2548 MEMZ.exe iexplore.exe PID 2636 wrote to memory of 1668 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 1668 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 1668 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 1668 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 760 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 760 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 760 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 760 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 624 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 624 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 624 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 624 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 2796 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 2796 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 2796 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 2796 2636 iexplore.exe IEXPLORE.EXE PID 2548 wrote to memory of 2472 2548 MEMZ.exe explorer.exe PID 2548 wrote to memory of 2472 2548 MEMZ.exe explorer.exe PID 2548 wrote to memory of 2472 2548 MEMZ.exe explorer.exe PID 2548 wrote to memory of 2472 2548 MEMZ.exe explorer.exe PID 2548 wrote to memory of 2760 2548 MEMZ.exe mmc.exe PID 2548 wrote to memory of 2760 2548 MEMZ.exe mmc.exe PID 2548 wrote to memory of 2760 2548 MEMZ.exe mmc.exe PID 2548 wrote to memory of 2760 2548 MEMZ.exe mmc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\MEMZ 3.0 (1)\MEMZ 3.0\MEMZ.exe" /main2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵PID:2660
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://google.co.ck/search?q=bonzi+buddy+download+free3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:603152 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:760
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:537620 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:624
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:930834 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:930864 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:484
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:996407 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:1979443 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:1717306 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:1324107 /prefetch:24⤵
- Modifies Internet Explorer settings
PID:1720
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:1258572 /prefetch:24⤵
- Modifies Internet Explorer settings
PID:1504
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:2569288 /prefetch:24⤵
- Modifies Internet Explorer settings
PID:3252
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:1389688 /prefetch:24⤵
- Modifies Internet Explorer settings
PID:3328
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:996512 /prefetch:24⤵
- Modifies Internet Explorer settings
PID:3728
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:2372752 /prefetch:24⤵PID:3440
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:2962541 /prefetch:24⤵PID:5116
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:2831528 /prefetch:24⤵PID:4704
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵PID:2472
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1372
-
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"3⤵PID:2328
-
-
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\System32\mspaint.exe"3⤵
- Drops file in Windows directory
PID:2524
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵PID:2856
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"3⤵PID:2872
-
-
C:\Windows\SysWOW64\taskmgr.exe"C:\Windows\System32\taskmgr.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3360
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe"3⤵PID:3700
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵PID:3228
-
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵PID:4020
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:2024
-
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵PID:2932
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"3⤵PID:2060
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- Runs regedit.exe
PID:3844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:4428
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵PID:4104
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵PID:5108
-
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵PID:4380
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵PID:4328
-
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"3⤵PID:4532
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- Runs regedit.exe
PID:5072
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- Runs regedit.exe
PID:4536
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_34D61B4A2A4AE0D3DDAB879224BCA77B
Filesize2KB
MD5fc92b2c6175b15300cba0822c2bace0d
SHA1c23875c1655a5fd48099d82762aa3045fd20d476
SHA256bb50723924f16869f441be92ce21befefc21a10095b851b74f688f57e90b8947
SHA512572165088628a78f91cd74dc75b211d6c1159de36209e286ef8b23f900538484558edfa1a662f2882132a1c7680633a617fd473f5c8a13211a0ab3820c0bdc0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD525815685f4efc87d1162095a54295fad
SHA178c369eebfa4cbd40ceda7a9fb935b1ff9568b04
SHA2567f8831f8c3b72f6e05ba336c028530a99e7846970778d639def50eedb9d35cf4
SHA512435c1da6733c8c59a10d1f0b51b157d0cc8647f784a1753abf89edd845d2b1535765b448da3f14b44e925c0531cf9595cd9a06939a7a749a1356ebdae3f721dc
-
Filesize
5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_8F0CBD8C47BA2D164C9E6FDB222DBC71
Filesize472B
MD5562c1305690263b343cfbabd7a401e6c
SHA1c6a624083ccb8f1b7aba90b7c4b1e3ac66c2942c
SHA2560f0f1c33614d42186e73e4feb4d03d3605e903c06390461d86784fc36b6789ad
SHA51260e3060ff1172c76a85e85b09a8e9eb9c1eb918f82da83fc79cd4eb150adb4a2e02403bded0ad91643b246d587907d2b2ba6ed185ef6cb14307b51203682e3f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD502be4b01991a79ad90dfa5c48fd9f3d1
SHA15d21477930dd665bca274029c5a07012a83c9f0c
SHA25659ed00a9a0711c349ac7e35380e60196223d7045d996ab8e1719da0ba438f913
SHA512bc43f6099d769adc9e69e8bd12d42bbd3ccba4ecb11b220abd2625cdc6e8e6a8ecf17585c14f82631a4c8d21efda6fae7cb4305d1fdf5be7a226c7b96904947a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_749F323800EEA448718955FAC254DD4F
Filesize471B
MD568be297696f6df373169f0c6e2d06c83
SHA1947f0e3b4942d22ac9b1ec6ff51e1afd32bf1834
SHA256b419aae79b16a2161dca133ad6b4ff68a3287994ec849c01a0ddf35471c38810
SHA5120eb1c88e8ddde49dc11ba89207de461e1ec16ef6561b1077987593b229959a251d9a213ce6e6697ff4957f3642168f1a180b434690e0266bd198f224dafc06e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_09B924C8A99A26A75B535D3B83388BE5
Filesize471B
MD50bbb0c0a7acaae6f119c49a57aded9ad
SHA1def2006a613312d647661ef94f6ac9d43b84202a
SHA256da2482009e08ab5c1df8db6f2b5454e5a32becbb50e9bc9e3a23982ebd55dbc9
SHA5127dd647c57f9c57487195c453c1bfd3500e9bf17ae68fd175d3cc2469ba718cc0369d1b0fcc11cf47513a2fb9286dbbe0dd20c47bed4037e449caee77519fcc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_34D61B4A2A4AE0D3DDAB879224BCA77B
Filesize488B
MD5c0df98e52540c26bedfb4ce4e865179e
SHA18aa7f81c41cfcf0a1ddbe974159451110c441d2b
SHA256a0906709335755a51e1fdd6e6dd0d9f1866b48003a286b81255358959cfaf04c
SHA512a0d5aebbe7e7268d6c963be25e0c793ddebc1c8ec761aed5c4d659a903f138ae002e21d45fa520f2a51f1ce6d8ff70c25c2b3245674fe785b6d728b4fb7dd33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56f6307e823a146c8a0c4774832ea86c7
SHA146fa0487860f7f617e0d96c3397f96253220ab48
SHA256835bef9aa1bd35716f607d7ec8fb5c97237744c7f7d2ae9475a079a7e48ceadc
SHA5126a9fe039a344982a1ead225e2b4eef6929bf20903a18e1b1aa3e7a297f590b8e0396c827d90b0039ee73bfd9d7c9eb6961dbe07d77d4f0c741d6401977debdc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\329C03A4966B136B54FB137DCA798EB7
Filesize426B
MD57f50c7c12742580fdf8662331eb52b2b
SHA1a42ac9d7f84b8eefb64d25a9fd9ef2da1e0b9001
SHA25652056fd81a789f63e6d97196a595f5b41e083a58546bcc75da96397ac5aeefb5
SHA51242340f43f99d43d3dc811d9178a899ec8c4f0c8c2350940ee4379c706563a5f2e90a2b5343aa3d04e831e2ebbb92a7fefd25a954cc6f5ac7726e9a2ae3ffc9fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\329C03A4966B136B54FB137DCA798EB7
Filesize426B
MD546be0dfe3583c5f78236901b4b66e9e3
SHA170b30e920e9797e4fbc23464549255b3ab6606b5
SHA2563b977582e1f69b18d053283b51dcbe114f6690f8613f5bdd31e2ff1874f0142e
SHA512fe21f99b435a29470cff042577dd8af6d23cd02161deff259c583d4f8348b725417a230f17b0f22c47d6f6fbfb17576277eb6efd9323d06e81b3f3ca5578bc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a5d5b18f50002376c404710fcf591c5
SHA157aa4702a7c8d98ebfe45ad1de9c8ca1b3f5ee43
SHA25668ca28ef875020199c54dfcc8e6792dd39e3d1b0c829fd0c6566ac783e15fbb4
SHA5121898bc3d98ce317cd5d9bedd6076f6e37b295305225e7c44eee1fe5083e2765ea12557e42ee47e92b76a2a38bbc68c0a95c37983569a745bc3ba6d7b2f8a798e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e45bb75b71ea7e2c94adcb6f93153bd
SHA14a48124b8b966c0a2ce59de377cc035e9d91b57f
SHA256fb8e2ce519d83ef2ad2a2b2aeca678c3761f6d1319c7c52bd6776c3f0ffdcc61
SHA51270c1630f92c9834c4e397aecd2b04246d2da26d4ad230655b20b4a64a9abc22b0ebf038b7ab2c087fdab3fdb6a0a975bc95fc33eefa66fc6e95bbd40718ed159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5608e88ec20f86de717254ad3574c0a0c
SHA1d78316801ce0a975e538db38f3307670c24427b7
SHA256b866d7da254ef3ed10dc9403a72f49472ba57bd899096338d9c5e7e24434739d
SHA5123dc864619bc0856f494cee35ad33a5323638b1440b53d1634191fdabac5b46a4d04be1b5a999cff2cd441816272c9796d72292440f52e24fde63e67222808ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d7f0d511c0b7d78121f6fe6b80cfeda
SHA1eb8f49316ac3dd713dc0e7b7344faf00ddb06ba2
SHA25670b2a40d280ef3fa9ae8d48d3940693cbb8d0936da3954ad4455779c91ed06d1
SHA512152b3969e4a5c982dd859e8f157e20ee13b423b41c4835022f7620e51b652786b06b757b47fb1d0ec5dea0d870e524ee7ec1e3ffce80f9e615c000bd94508311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52678041534d235bece863d44a1245cff
SHA100ae5520eb5e20b8f780528e2dbfd29ba4742f32
SHA25675b198280308928eb9bca9f20d7ea338d00f44628fd8ebcff29afdbbcd97340e
SHA5126763e6ed33f4d970c132370abab91b3d3ec96ec9a4c434943872f9aed01fc9a39e0e3931a918194d926f2b3f825050a9f946b1d2f55f6293195430f9da4e41cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d54695bdf7da0b3611f56ee64f2700
SHA10c39860436fdcbdfac2fccddffe1dc98364aa94f
SHA2560794d956256bc513261fc2873ecdb120cc41b1aab3caca181abd643bdbc6e929
SHA512af19399c33382f4718ed1a344bba20a4b210ef65233f21d970345caec432aa08aaf296fd15cb0c35e9a2b716e062176e1ad602c1927349ebf2c1908343ecbf18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556beb3e7a6666c0107ba345b3510a96a
SHA13e89c68db5ae7beb871096be667ae86ff0d337af
SHA256b27ad2610717f518f9a64767977ce80b9d908287b60ad4a284dcfdd638bd5a12
SHA512f3f5358041695f29c21c337da698ea29e08c44f04a6482c6fe21e0106a6813cf1873d6f82c5122bf4cf7118f1cae12d5ec5796d6e47a69538f1481db40a66f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c0c185fe20cc72d7b83ce6c316df33a
SHA116b497a5c76223bedd08ed92dd88972744ac9cc9
SHA2566f4247d8c3399df9dd7df0528f98a6c18db18e152c6f309ea1bca771388c6dd7
SHA512fdd8aba3e07d796de022fee6033ca1ce5ace4610dd44204546918ba7d8effd9c0f4859c449220af9b5167972387b01116825a526c930a99621d4347c23d3018e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5934dabc8f2c881a16a0f92dfe2b2c474
SHA191e867ad0428b467656c16cd2f82e186b71cc386
SHA2568b2d0092ff3cd2a89856a23403ae0d9d133bb98cb2229c009374fd215591a5a2
SHA5128e45c701deb12c5d52ea2f12e929e4955d7483979b906d94eb96f9aca316983f80880b3254a87ec53bafb613cf79b0f2490a442047fb59fb518d413252abefba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5318ae20951a789dd89f64f562bb4c92a
SHA199c1766a3e1d8e2b7b1148bc80a8f2d171805ee5
SHA256cd4b1fa6363a85413b88e28f5866498237a6328f88530672c6607f487fdad83c
SHA512217fb04792e3cbbc717934226aaa53c43a6f56099d486bf6f05eb8f0792603c11b10cefc8d245fcd429f5ad281f028da924979ede6e070f1129aa95e8752074e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521b6726a0eb1d80a3595630a446892c9
SHA12295af46c3611eb1a6867b111adf5db615f31604
SHA256522962cf82888b2bad504c032d639b1719048049cf9f329142e7c9b1a6ac3a7b
SHA512f9c9c2b283ba75cb9b6e62391f9555130727c092651450e220e9f0b8f24e21bd97ebc23751604a825bbc73fdf17357aa72dfe6141e2f19273bbd0755934f309f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527a31e8dfe3feec368c4207428179db4
SHA1b0aa1d225181d88f4cee41780b3c88394710835a
SHA2569996db0ea1ee3155b7584beffbadc11c1a2769e8ab8a34f99cb692f42da58d65
SHA512759946233f516bec3651c84f8e1103c915c213e06e2fa7edf9cc96198a1f8966473664911886a7fa7f3c5d605d7ec53d77dcce70617cd2cf0af992195bfcfa5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e97021fb54726a2b2c42fa2441fec6c
SHA156ed41cc80d4e2c9387894e3f1a5beece47acd7c
SHA256f4d57426fda5e6ce0b553a5b8e9dc5d36c2ff5819c6287cb600139f15c337a44
SHA5128e66e401103009a3daa2c71e9f539799343aaf5116f4747c8b3a276fa3607fc7d211621e2a72eb309fbcc70448c0dd9e5b30562a89d666b52adc872e9cdd83d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3566bc582dce34f3d81afc3be80fdae
SHA15327e27bff820cc40d7b2a8c1722b298ba557e4c
SHA2569d78d60b7178c328c8c46715a1347f113459641554a40d297190d969fc6a1eaa
SHA51283f6a5c2ba1a6ab447043b57c25720a43cdc700f8bb9ed74fa99308f353b3095d5808b7e584128e42891fa7fa6c4644cacfe776959d5045d612d57d51b4cf995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_8F0CBD8C47BA2D164C9E6FDB222DBC71
Filesize402B
MD5ee79636359348c9d146557ea1be5db3b
SHA15713576d625aa3911f4ab40c2f0ac9013a9c2b73
SHA256bfc09d1e4731ab571bf8111c32488963969fcad90d6fe70ed5442f0470037267
SHA512931a4dd8be8cd6619ccc32a789be7d6f1cabad8cd872fe5d5c5825b5ae6c412c52ce0b27f2bd0d887b9b01374a4a1964d4d208bda285747fdfe0399c9d3c8b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5cca8ee44e4ff5f5acd56a30848ee7c6c
SHA1d9335e005c1aae05952091a42914714cbad9f98c
SHA256d49e1e7e7d311b7e03abbfbae1abce36480b60e9c744e0c7d683ec31031ddc1e
SHA512e5f099b317bf5fbd391ed75f1413e58f3f59c0f2f3bc486c9e6a26b0accb2d8353781bb149ddf03a8ee05a84e2ec0cd5e42c552a53440faf0e9c5aeaa6223e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5d2bd8fd507010ad19e17bcd5a0b99063
SHA199385b982e25caae24ff8cd0616e926e6fc0131e
SHA256839ff05c9b2862654f036c7ac359f341b681fe184d52c8d728a53fd4ed9884cc
SHA51223680d4e62e19127dcfd3de798a897d7e2897033a9c54e5baa8588a1cb0384bc3ec27386d18e9c8d484076bf91891d878cb7e053fa466a5aa342b9532984b05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_749F323800EEA448718955FAC254DD4F
Filesize406B
MD578ad481add8911e2de1fc798d8d44b84
SHA1df6b37b9e126e9821548e28c0c7bdc68b64af3ad
SHA256e09b5ae59e0bf86ff15d56d0111bfa55890c553b35f65f1b96eef0057683130e
SHA51233686b260f1dbea922b730e8b5f0a2ac5953ba39e1b38160b66dae0d5dd81f1e8a44ea651862358656760279e3cbb6525f40347eafbc1c8bd86ea3bd3532a3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_09B924C8A99A26A75B535D3B83388BE5
Filesize406B
MD586b1fe7907850373ba6cc5caa1377188
SHA1faa72a17f34359fc3b7b06dad6423d25fa46a1c7
SHA256edbd5eaafc9bd6f81fac45e917a0f4b5506ee836af8b02b7e26ef752a87276b2
SHA512983511445c1f7acc673b6a387d5ec0404a0e2f0207eb9a37f6d9bce73284066f062a04d06d7fb86aba30514b270946e48703b528097909ff61a5ecd7b78c1470
-
Filesize
95B
MD5d1e5a19626930d2e850515374b96a906
SHA1fd9871a67d2a9a846fa98e08ef39fe16207aba0a
SHA256d6e376050162e9df1d501dcee9f75666b87c8e1fb4a7040ea06d5b86cdef55d6
SHA5120a8d4d4f41e80bf0baad5d8db6f84522ae307931ab346d86a896b913cf8487d4e913ec37e41bd67a6b718da12cf4964eb29caf71f8b027e4529c84ed53cf6458
-
Filesize
6KB
MD5873151931c1ca5d7a32341e3bc6f9390
SHA12acfe6d8348d1a4d59bf4ff616317a328589e4c2
SHA256b10a8a517457ab103f9a7d651a80c2407705f46641be2828cd9b1d9ffa2077f1
SHA512e20e6c5361301de307eff6fcfd084bcf78c832bb49552d04ca8350823dc17c816c9d0c2f0b69f1fa504f3d0bbb12912155414c59bf8a92d5d5bed2467e93dd29
-
Filesize
5KB
MD5b082cc3b9a07608d9f05452ef2d7f17f
SHA1dce1505d2d3eac09dfde65700bdf2de0e535ad09
SHA2569071d8722f65130a67fde29c689eb12be43a25fee78946695a425182ed52dab2
SHA51290427b90ca181702dfafbaa701ec3b72b94413872731c3591a7682d20a1862b1cef2598423e9ca636152eff395ba77f2ec194ffe29325065d0f3a504212be13f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BD3NDTTD\SANgo9F4nm5u2dMq42p2HajKzd6tIQxdZSIadGt1b8g[1].js
Filesize24KB
MD5e5aae696ce9963f03693958cf4b2d3ad
SHA128ab61d79382b83de80278c73ed6c308e45552f4
SHA256480360a3d1789e6e6ed9d32ae36a761da8cacddead210c5d65221a746b756fc8
SHA512618735e2392f1fc9635c7f9da7ba77b43fbd3f2cbef0697b820b27e98e12a83bfc6fbe134921b51630e7a11a1313981f30aa5acaeca9cd0d47d4997f4928e1bc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BD3NDTTD\logo_48[1].png
Filesize2KB
MD5ef9941290c50cd3866e2ba6b793f010d
SHA14736508c795667dcea21f8d864233031223b7832
SHA2561b9efb22c938500971aac2b2130a475fa23684dd69e43103894968df83145b8a
SHA512a0c69c70117c5713caf8b12f3b6e8bbb9cdaf72768e5db9db5831a3c37541b87613c6b020dd2f9b8760064a8c7337f175e7234bfe776eee5e3588dc5662419d9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BD3NDTTD\recaptcha__en[1].js
Filesize489KB
MD5d52ac252287f3b65932054857f7c26a7
SHA1940b62eae6fb008d6f15dfb7aaf6fb125dba1fec
SHA2564c06e93049378bf0cdbbe5d3a1d0c302ac2d35faec13623ad812ee41495a2a57
SHA512c08ff9d988aea4c318647c79ae8ca9413b6f226f0efbdab1cdd55ec04b6760812716ff27e0ee86941e8a654d39cddd56251d8392a0ac2c4c8839f27853556154
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IKDEMF4Q\KFOmCnqEu92Fr1Mu4mxP[1].ttf
Filesize34KB
MD5372d0cc3288fe8e97df49742baefce90
SHA1754d9eaa4a009c42e8d6d40c632a1dad6d44ec21
SHA256466989fd178ca6ed13641893b7003e5d6ec36e42c2a816dee71f87b775ea097f
SHA5128447bc59795b16877974cd77c52729f6ff08a1e741f68ff445c087ecc09c8c4822b83e8907d156a00be81cb2c0259081926e758c12b3aea023ac574e4a6c9885
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IKDEMF4Q\styles__ltr[1].css
Filesize55KB
MD5eb4bc511f79f7a1573b45f5775b3a99b
SHA1d910fb51ad7316aa54f055079374574698e74b35
SHA2567859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050
SHA512ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NXAFS242\G796R37P.htm
Filesize150B
MD52eeb2e0202b1bf9daf39ac6eb1466b42
SHA126abaa251ff391b4311c5cfa927be41b09ced5d3
SHA25666f963290dda5adc89f8ce4e16676df4540d5b8f600e0fecf86e03a4fcfc1c02
SHA512101659d11d34d4d38aeeb181917a7ab7630dd6909699a018166a9cbbb4346eeb9801c75c57fb67b63f330bd363b7367ba99ab604bdd9f097127474207b871e16
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NXAFS242\TG_XdOEg3NKIdftsV7XidAgI3OvClCw0-7YgJxQ1GFY[1].js
Filesize23KB
MD5a364179c3816839427c4d9fdbe8ecf3b
SHA1fd423514f4f0e614688a99571b9165b4e212119b
SHA2564c6fd774e120dcd28875fb6c57b5e2740808dcebc2942c34fbb6202714351856
SHA512c4e29c47bb229a293d79a1aa4b9e226ff6261b723b75e0479df367fc7eee3ac006e4993e5406f510aa35da592b525e3f6a0bf62f8671cfa576cae40a627bc45e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NXAFS242\api[1].js
Filesize850B
MD533d99cfc94db7d1ab5149b1e677b4c85
SHA1ffec081b0a5b325f2b124ea8804ba0de9beae98c
SHA2560e945fe9e80b82b1ac2e714f03672ed0c439e61e489430ba46623245399fca25
SHA512315ed3f0edae2d3057be354d7d97ab298f51e791c03cd19c46d96e0116a6757033e509d92633eafba9365d6588af2b96cce4b0088020a88eac5086d07a0b3b26
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NXAFS242\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U4VLHPRO\KFOlCnqEu92Fr1MmEU9fBBc9[1].ttf
Filesize34KB
MD54d88404f733741eaacfda2e318840a98
SHA149e0f3d32666ac36205f84ac7457030ca0a9d95f
SHA256b464107219af95400af44c949574d9617de760e100712d4dec8f51a76c50dda1
SHA5122e5d3280d5f7e70ca3ea29e7c01f47feb57fe93fc55fd0ea63641e99e5d699bb4b1f1f686da25c91ba4f64833f9946070f7546558cbd68249b0d853949ff85c5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U4VLHPRO\KFOlCnqEu92Fr1MmYUtfBBc9[1].ttf
Filesize34KB
MD54d99b85fa964307056c1410f78f51439
SHA1f8e30a1a61011f1ee42435d7e18ba7e21d4ee894
SHA25601027695832f4a3850663c9e798eb03eadfd1462d0b76e7c5ac6465d2d77dbd0
SHA51213d93544b16453fe9ac9fc025c3d4320c1c83a2eca4cd01132ce5c68b12e150bc7d96341f10cbaa2777526cf72b2ca0cd64458b3df1875a184bbb907c5e3d731
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U4VLHPRO\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U4VLHPRO\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U4VLHPRO\favicon[2].ico
Filesize1KB
MD5ac0cd867e03ed914827807d4715bdfe7
SHA14051a8c23756c10d9cc00fcde6f7215c780fdf6f
SHA256b50546da121186fbffd2aec430249cb21c7c2e2c85e561a393a9df9abfc4477c
SHA512fa11d1d76c39719c218b4ffa34de8dd44d398bdcbb236a666f0be6eeee96bcbe4da9ac65a89441ad284c0de21788c135dc4fd21f6f82c7039f00c8a7c705c8e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U4VLHPRO\webworker[1].js
Filesize102B
MD55734e3c2032fb7e4b757980f70c5867e
SHA122d3e354a89c167d3bebf6b73d6e11e550213a38
SHA25691e9008a809223ca505257c7cb9232b7bf13e7fbf45e3f6dd2cfca538e7141eb
SHA5121f748444532bc406964c1be8f3128c47144de38add5c78809bbcdae21bf3d26600a376df41bf91c4cd3c74a9fae598d51c76d653a23357310343c58b3b6d7739
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
16KB
MD5634b92ed41916c6326e8df32c937e2d7
SHA1f96b56d6c78cac2b257450e81d2f341cfb05b2f0
SHA2566ee19ff64caf1b294dc27ff8e7eb8585a3316f3bca0a233fc4d54cf0b78cf908
SHA512d20343500ac2af7a12d97265a9612caef3b2f8dad679a746cf4dfa0a26bd87e7eba7a800760594384e773892ae5ed9363c9fde05cc9c978f4aba1282af0b881e
-
Filesize
378B
MD53b4c0b27f70aba59cc8ff3b892f8e185
SHA12083c9b6bd16071145fb66648cc2ea195c3d38b9
SHA256956111f50352f8961473ffbb278e82eeb68deb2a6e2255c4d0cd0721e8587d60
SHA5121a56f55942ba39656dd6e9d89e738e805496f9c37c71ea2f574360e01a8490cf552105f3372515b5dccf447b06f68289ee25730f39eb24a838737adaa38ba588
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
Filesize3KB
MD5d492af61d8eb5cd5666a5be1f88c73fd
SHA1b8fd32b7b538e04a862b45dd0d875aac968f50a6
SHA25624fc8071b1c0610b6976a86e2ee95375eb6359b05825653468ac8b75fdb4f714
SHA512cefd1869512454bec62a5fdf62596e4a98e15a20d79eca1f1452d7f787d18695fabed03c0cdef9fe339874314ee6bf81cdf0be5119b3c00869a47954adf386a7
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf