Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30-04-2024 13:42

General

  • Target

    MW2 FOV Changer.exe

  • Size

    15.2MB

  • MD5

    57d5a31aa74a02a1c155aaa618c290c1

  • SHA1

    9dd86085bc7f7497d8b437de5da8db54e8703ace

  • SHA256

    af917a63e27ea18999a8f1feb4e7fa60955f21dd3c8fac6a4d9c5bb34f4d2ca1

  • SHA512

    c46bfd6e3877812bad8456e6d13c36db4f69d8e6798d47a41aa24bb3f16229deef2e852b9956ab745ae1acdbcf1a4b610e7b652ab16902f0efe8f4988c4559f3

  • SSDEEP

    24576:tvoagpQjczZKdUt5TKX+aW1dMG0m6jYg1CZbBJT0n:5TaQgZ2GbMGf4CZDIn

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

kbdjfaskjhgasdfkjg.ddns.com:1604

Mutex

bb5fce1b-dde0-4e14-a44f-41a608ac20db

Attributes
  • activate_away_mode

    true

  • backup_connection_host

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2016-07-29T01:59:05.148193536Z

  • bypass_user_account_control

    false

  • bypass_user_account_control_data

    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

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    1604

  • default_group

    Slave

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    bb5fce1b-dde0-4e14-a44f-41a608ac20db

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    kbdjfaskjhgasdfkjg.ddns.com

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Drops startup file 9 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 8 IoCs
  • Enumerates processes with tasklist 1 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MW2 FOV Changer.exe
    "C:\Users\Admin\AppData\Local\Temp\MW2 FOV Changer.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\SystemHosts.exe
      "C:\Users\Admin\AppData\Local\Temp\SystemHosts.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f
          4⤵
            PID:2240
        • C:\Users\Admin\AppData\Roaming\tmp.exe
          "C:\Users\Admin\AppData\Roaming\tmp.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2084
        • C:\Users\Admin\AppData\Roaming\svhost.exe
          "C:\Users\Admin\AppData\Roaming\svhost.exe"
          3⤵
          • Executes dropped EXE
          PID:2696
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.bat
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:348
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 6
            4⤵
            • Delays execution with timeout.exe
            PID:1304
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist /nh /fi "imagename eq .exe"
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:780
          • C:\Windows\SysWOW64\find.exe
            find /i ".exe"
            4⤵
              PID:536
            • C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe
              "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"
              4⤵
              • Drops startup file
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2056
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe"
                5⤵
                  PID:1132
                  • C:\Windows\SysWOW64\reg.exe
                    reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f
                    6⤵
                      PID:2136
                  • C:\Users\Admin\AppData\Roaming\tmp.exe
                    "C:\Users\Admin\AppData\Roaming\tmp.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:996
                  • C:\Users\Admin\AppData\Roaming\svhost.exe
                    "C:\Users\Admin\AppData\Roaming\svhost.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:1356
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 6
                  4⤵
                  • Delays execution with timeout.exe
                  PID:992
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist /nh /fi "imagename eq .exe"
                  4⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1736
                • C:\Windows\SysWOW64\find.exe
                  find /i ".exe"
                  4⤵
                    PID:1800
                  • C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe
                    "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"
                    4⤵
                    • Drops startup file
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2784
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe"
                      5⤵
                        PID:1724
                        • C:\Windows\SysWOW64\reg.exe
                          reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f
                          6⤵
                            PID:2604
                        • C:\Users\Admin\AppData\Roaming\tmp.exe
                          "C:\Users\Admin\AppData\Roaming\tmp.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:2752
                        • C:\Users\Admin\AppData\Roaming\svhost.exe
                          "C:\Users\Admin\AppData\Roaming\svhost.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:2748
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /t 6
                        4⤵
                        • Delays execution with timeout.exe
                        PID:2008
                      • C:\Windows\SysWOW64\tasklist.exe
                        tasklist /nh /fi "imagename eq .exe"
                        4⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2732
                      • C:\Windows\SysWOW64\find.exe
                        find /i ".exe"
                        4⤵
                          PID:2960
                        • C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe
                          "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"
                          4⤵
                          • Drops startup file
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2820
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd.exe"
                            5⤵
                              PID:1732
                              • C:\Windows\SysWOW64\reg.exe
                                reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f
                                6⤵
                                  PID:2988
                              • C:\Users\Admin\AppData\Roaming\tmp.exe
                                "C:\Users\Admin\AppData\Roaming\tmp.exe"
                                5⤵
                                • Executes dropped EXE
                                PID:1036
                              • C:\Users\Admin\AppData\Roaming\svhost.exe
                                "C:\Users\Admin\AppData\Roaming\svhost.exe"
                                5⤵
                                • Executes dropped EXE
                                PID:2112
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 6
                              4⤵
                              • Delays execution with timeout.exe
                              PID:2848
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist /nh /fi "imagename eq .exe"
                              4⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2656
                            • C:\Windows\SysWOW64\find.exe
                              find /i ".exe"
                              4⤵
                                PID:3000
                              • C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe
                                "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"
                                4⤵
                                • Drops startup file
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2292
                                • C:\Windows\SysWOW64\cmd.exe
                                  "cmd.exe"
                                  5⤵
                                    PID:2256
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f
                                      6⤵
                                        PID:1432
                                    • C:\Users\Admin\AppData\Roaming\tmp.exe
                                      "C:\Users\Admin\AppData\Roaming\tmp.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      PID:1876
                                    • C:\Users\Admin\AppData\Roaming\svhost.exe
                                      "C:\Users\Admin\AppData\Roaming\svhost.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      PID:960
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 6
                                    4⤵
                                    • Delays execution with timeout.exe
                                    PID:916
                                  • C:\Windows\SysWOW64\tasklist.exe
                                    tasklist /nh /fi "imagename eq .exe"
                                    4⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1764
                                  • C:\Windows\SysWOW64\find.exe
                                    find /i ".exe"
                                    4⤵
                                      PID:1520
                                    • C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe
                                      "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"
                                      4⤵
                                      • Drops startup file
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetThreadContext
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:856
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "cmd.exe"
                                        5⤵
                                          PID:2688
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f
                                            6⤵
                                              PID:2136
                                          • C:\Users\Admin\AppData\Roaming\tmp.exe
                                            "C:\Users\Admin\AppData\Roaming\tmp.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            PID:1632
                                          • C:\Users\Admin\AppData\Roaming\svhost.exe
                                            "C:\Users\Admin\AppData\Roaming\svhost.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            PID:1552
                                        • C:\Windows\SysWOW64\timeout.exe
                                          timeout /t 6
                                          4⤵
                                          • Delays execution with timeout.exe
                                          PID:1744
                                        • C:\Windows\SysWOW64\tasklist.exe
                                          tasklist /nh /fi "imagename eq .exe"
                                          4⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1540
                                        • C:\Windows\SysWOW64\find.exe
                                          find /i ".exe"
                                          4⤵
                                            PID:2060
                                          • C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe
                                            "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"
                                            4⤵
                                            • Drops startup file
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1992
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "cmd.exe"
                                              5⤵
                                                PID:896
                                                • C:\Windows\SysWOW64\reg.exe
                                                  reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f
                                                  6⤵
                                                    PID:2364
                                                • C:\Users\Admin\AppData\Roaming\tmp.exe
                                                  "C:\Users\Admin\AppData\Roaming\tmp.exe"
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:2748
                                                • C:\Users\Admin\AppData\Roaming\svhost.exe
                                                  "C:\Users\Admin\AppData\Roaming\svhost.exe"
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:2044
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 6
                                                4⤵
                                                • Delays execution with timeout.exe
                                                PID:2560
                                              • C:\Windows\SysWOW64\tasklist.exe
                                                tasklist /nh /fi "imagename eq .exe"
                                                4⤵
                                                • Enumerates processes with tasklist
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:324
                                              • C:\Windows\SysWOW64\find.exe
                                                find /i ".exe"
                                                4⤵
                                                  PID:1296
                                                • C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe
                                                  "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"
                                                  4⤵
                                                  • Drops startup file
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetThreadContext
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:568
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "cmd.exe"
                                                    5⤵
                                                      PID:1644
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f
                                                        6⤵
                                                          PID:2280
                                                      • C:\Users\Admin\AppData\Roaming\tmp.exe
                                                        "C:\Users\Admin\AppData\Roaming\tmp.exe"
                                                        5⤵
                                                        • Executes dropped EXE
                                                        PID:1204
                                                      • C:\Users\Admin\AppData\Roaming\svhost.exe
                                                        "C:\Users\Admin\AppData\Roaming\svhost.exe"
                                                        5⤵
                                                        • Executes dropped EXE
                                                        PID:2600
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 6
                                                      4⤵
                                                      • Delays execution with timeout.exe
                                                      PID:1264
                                                    • C:\Windows\SysWOW64\tasklist.exe
                                                      tasklist /nh /fi "imagename eq .exe"
                                                      4⤵
                                                      • Enumerates processes with tasklist
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2176
                                                    • C:\Windows\SysWOW64\find.exe
                                                      find /i ".exe"
                                                      4⤵
                                                        PID:2036
                                                      • C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe
                                                        "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1092
                                                    • C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe
                                                      C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe
                                                      3⤵
                                                      • Drops startup file
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:316
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe"
                                                        4⤵
                                                          PID:1536
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f
                                                            5⤵
                                                              PID:2316
                                                          • C:\Users\Admin\AppData\Roaming\tmp.exe
                                                            "C:\Users\Admin\AppData\Roaming\tmp.exe"
                                                            4⤵
                                                            • Executes dropped EXE
                                                            PID:2344
                                                          • C:\Users\Admin\AppData\Roaming\svhost.exe
                                                            "C:\Users\Admin\AppData\Roaming\svhost.exe"
                                                            4⤵
                                                            • Executes dropped EXE
                                                            PID:2808
                                                      • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Checks whether UAC is enabled
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2664
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          "schtasks.exe" /create /f /tn "NAS Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp31AB.tmp"
                                                          3⤵
                                                          • Creates scheduled task(s)
                                                          PID:2760

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Temp\tmp31AB.tmp

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      24de2170a8dce23ab327cf07c00cd17e

                                                      SHA1

                                                      c759a98d8447e9674d0707da64cd97204720c0ae

                                                      SHA256

                                                      fa98fbb5ddd9fcbcdc76196d8dc524602815d90d244eb43f7f983a829b7d3b3d

                                                      SHA512

                                                      83ea8711513efbd1a4045b27fcd916cab7c9b6ab3e519500db114287b8a42103f44142e1c350f1f7a0bb76d291bfc838834d423338a23a30ff2f15066ff87d2b

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMIhook.exe.lnk

                                                      Filesize

                                                      888B

                                                      MD5

                                                      96a4212f83ab5075cbfd833f68d44c5b

                                                      SHA1

                                                      0048b5acf59d1178f47f419bd459b86d43b6bb55

                                                      SHA256

                                                      9fe2acda4de2f9c12fea7147b36ca98770afe86b5a902c9f90341e24ac805ac0

                                                      SHA512

                                                      a66272947871062634c4977991cbaa75324ed5ffd9695fae8e0d3d077ece31738f21fba481bea39facdad6e6cb39d41c60552f4e27f87f98f84cd4be3978176e

                                                    • C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.bat

                                                      Filesize

                                                      190B

                                                      MD5

                                                      7940fc58219887a93fd5ec25cb249429

                                                      SHA1

                                                      86a8f8971dcfb9d6411bf0376a68ff11f1cf5272

                                                      SHA256

                                                      a4bb7d456f665ce87b608df3ad11c684d231553a511ef0050b197c1dc632b1db

                                                      SHA512

                                                      0adcaf63ec2920082b9ff81ab992aad6c80f9498ada61b88b6fbcef26b667ca6ebb9414354bc7faeaecb0d3c0d5a21313a8e94ca9b440327be68289128d573cb

                                                    • C:\Users\Admin\AppData\Roaming\WMIHost\melt.bat

                                                      Filesize

                                                      100B

                                                      MD5

                                                      2aa15a8028ab63147ea2c88ced182f8c

                                                      SHA1

                                                      ed98166113b2952ff5d61fb2211f6d20d1c39e1d

                                                      SHA256

                                                      28cb990a5b7789117a735e842c8a6345ff20e4c2662ec4ae6d664d759bf6dfe1

                                                      SHA512

                                                      f3a13023ab0f06e0abb398d0dec2638ff12d180ad816d23fda257fba091cb347ca174c4c4f0bc6f193bb838c29bae64ad662389c313e07f1fec33a30b5435e64

                                                    • \Users\Admin\AppData\Local\Temp\SystemHosts.exe

                                                      Filesize

                                                      6.7MB

                                                      MD5

                                                      ffbb57869e7c843b9cbf902b18a7a94e

                                                      SHA1

                                                      34feee7ae338d055b7176a49baa8e23165f2352f

                                                      SHA256

                                                      d3ceef6f206fd2c0b1768f6767da1accfb2c2870512569169fe4706e56b75736

                                                      SHA512

                                                      0fa8b38a7e82964a054c8f56911e6276d50921c3659120b8275e5cfd55fc69644beb6a45f29423a14c26f8b7c39141dcbf25a6aac88de2b5f3ee93a2e8c705eb

                                                    • \Users\Admin\AppData\Local\Temp\svhost.exe

                                                      Filesize

                                                      52KB

                                                      MD5

                                                      278edbd499374bf73621f8c1f969d894

                                                      SHA1

                                                      a81170af14747781c5f5f51bb1215893136f0bc0

                                                      SHA256

                                                      c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391

                                                      SHA512

                                                      93b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9

                                                    • \Users\Admin\AppData\Roaming\tmp.exe

                                                      Filesize

                                                      349KB

                                                      MD5

                                                      4a00f1474bf08339715d1fbc3c7d72b0

                                                      SHA1

                                                      92459a6ac28efe4b6ef89e73de1de29ae3d59ce0

                                                      SHA256

                                                      f6b061ab8081596317876f9c7b776cb6466e0c2a19398c31d1a83741d2f94b6c

                                                      SHA512

                                                      4f46d7d00065d1a16ad3db88a6633f0665f2a4fda6041d657b2ea5dfc634d58947e44c3e0957fca30f3e4c473100e28cd77d60e8eea73a1f9a16c3a110b68266

                                                    • memory/1356-132-0x0000000000080000-0x00000000000DE000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/1356-135-0x0000000000080000-0x00000000000DE000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/1356-128-0x0000000000080000-0x00000000000DE000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/1356-125-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2208-0-0x00000000747A0000-0x0000000074D4B000-memory.dmp

                                                      Filesize

                                                      5.7MB

                                                    • memory/2208-2-0x00000000008B0000-0x00000000008F0000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/2208-1-0x00000000747A0000-0x0000000074D4B000-memory.dmp

                                                      Filesize

                                                      5.7MB

                                                    • memory/2208-37-0x00000000747A0000-0x0000000074D4B000-memory.dmp

                                                      Filesize

                                                      5.7MB

                                                    • memory/2648-31-0x0000000000B00000-0x0000000000B40000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/2648-30-0x00000000747A0000-0x0000000074D4B000-memory.dmp

                                                      Filesize

                                                      5.7MB

                                                    • memory/2648-90-0x00000000747A0000-0x0000000074D4B000-memory.dmp

                                                      Filesize

                                                      5.7MB

                                                    • memory/2664-28-0x0000000000400000-0x0000000000438000-memory.dmp

                                                      Filesize

                                                      224KB

                                                    • memory/2664-19-0x0000000000400000-0x0000000000438000-memory.dmp

                                                      Filesize

                                                      224KB

                                                    • memory/2664-138-0x0000000000EC0000-0x0000000000F00000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/2664-18-0x0000000000400000-0x0000000000438000-memory.dmp

                                                      Filesize

                                                      224KB

                                                    • memory/2664-17-0x0000000000400000-0x0000000000438000-memory.dmp

                                                      Filesize

                                                      224KB

                                                    • memory/2664-20-0x0000000000400000-0x0000000000438000-memory.dmp

                                                      Filesize

                                                      224KB

                                                    • memory/2664-32-0x0000000000EC0000-0x0000000000F00000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/2664-26-0x0000000000400000-0x0000000000438000-memory.dmp

                                                      Filesize

                                                      224KB

                                                    • memory/2664-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2664-23-0x0000000000400000-0x0000000000438000-memory.dmp

                                                      Filesize

                                                      224KB

                                                    • memory/2696-65-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2696-64-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2696-62-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2696-53-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2696-55-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2696-57-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2696-59-0x0000000000400000-0x000000000045E000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2696-61-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2748-155-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2808-105-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                      Filesize

                                                      4KB