Malware Analysis Report

2024-09-11 06:06

Sample ID 240521-rv298shc8z
Target 3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe
SHA256 3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d
Tags
discovery exploit upx
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d

Threat Level: Likely malicious

The file 3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe was found to be: Likely malicious.

Malicious Activity Summary

discovery exploit upx

Possible privilege escalation attempt

Executes dropped EXE

Checks computer location settings

UPX packed file

Modifies file permissions

Deletes itself

Loads dropped DLL

Suspicious use of SetThreadContext

Drops file in System32 directory

Drops file in Windows directory

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Runs ping.exe

Modifies data under HKEY_USERS

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-21 14:31

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-21 14:31

Reported

2024-05-21 14:34

Platform

win7-20240221-en

Max time kernel

119s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe"

Signatures

Possible privilege escalation attempt

exploit
Description Indicator Process Target
N/A N/A C:\Windows\system32\takeown.exe N/A
N/A N/A C:\Windows\system32\icacls.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\system32\cmd.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files\Windows Media Player\wmpnetwk.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\takeown.exe N/A
N/A N/A C:\Windows\system32\icacls.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Windows Media Player\background.jpg C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A
File created C:\Program Files\Windows Media Player\mpsvc.dll C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A
File created C:\Program Files\Windows Media Player\wmpnetwk.exe C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A
File created C:\Program Files\Windows Media Player\wmixedwk.exe C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A
File opened for modification C:\Program Files\Windows Media Player\wmixedwk.exe C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\takeown.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2972 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe C:\Windows\System32\cmd.exe
PID 2972 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe C:\Windows\System32\cmd.exe
PID 2972 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe C:\Windows\System32\cmd.exe
PID 2756 wrote to memory of 2548 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\takeown.exe
PID 2756 wrote to memory of 2548 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\takeown.exe
PID 2756 wrote to memory of 2548 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\takeown.exe
PID 2756 wrote to memory of 2584 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\icacls.exe
PID 2756 wrote to memory of 2584 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\icacls.exe
PID 2756 wrote to memory of 2584 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\icacls.exe
PID 2972 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe C:\Windows\system32\cmd.exe
PID 2972 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe C:\Windows\system32\cmd.exe
PID 2972 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 2296 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 2180 wrote to memory of 2296 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 2180 wrote to memory of 2296 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe

"C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" cmd /c takeown /f "C:\Program Files\Windows Media Player\wmpnetwk.exe" && icacls "C:\Program Files\Windows Media Player\wmpnetwk.exe" /grant administrators:F

C:\Windows\system32\takeown.exe

takeown /f "C:\Program Files\Windows Media Player\wmpnetwk.exe"

C:\Windows\system32\icacls.exe

icacls "C:\Program Files\Windows Media Player\wmpnetwk.exe" /grant administrators:F

C:\Program Files\Windows Media Player\wmpnetwk.exe

"C:\Program Files\Windows Media Player\wmpnetwk.exe"

C:\Windows\system32\cmd.exe

cmd /c ""C:\kkxqbh.bat" "

C:\Windows\system32\PING.EXE

ping 127.0.0.1 -n 3

Network

Country Destination Domain Proto
US 8.8.8.8:53 sta.alie3ksgee.com udp
HK 103.146.158.221:80 sta.alie3ksgee.com tcp

Files

memory/2972-0-0x000000013F16A000-0x000000013F16B000-memory.dmp

memory/2972-3-0x0000000002220000-0x000000000224C000-memory.dmp

memory/2972-5-0x000000013F150000-0x000000013F1A6000-memory.dmp

C:\Program Files\Windows Media Player\wmpnetwk.exe

MD5 90b85ffbdeead1be861d59134ea985b0
SHA1 55e9859aa7dba87678e7c529b571fdf6b7181339
SHA256 ed0dc979eed9ab9933c49204d362de575c7112a792633fda75bb5d1dab50a5c2
SHA512 8a1c10bbfe5651ab25bf36f4e8f2f65424c8e1004696c8141498b99ea2fbd7b3e5fae4d2cfee6835f7ff46bd2333602f4d8ac4a0f5b8e9757adb176332a3afce

C:\kkxqbh.bat

MD5 213c3f1aa1f2ee05f1c6618d192fffc5
SHA1 a517128a03b995935ff9cce15916ba84250f28b0
SHA256 8d68538bab28f4e7bd4af85a501e13fb228aae17ab8d5c17abceefa94948b607
SHA512 efabf818a1a1efdf4c448dd8fc98f2956866d80d5cc3b05e00561a767628d3cf3d7912782218acc234ec1e752dc3be0150ba87f00039fdd9f4eaa7922ddd01fe

memory/2972-27-0x0000000002220000-0x000000000224C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-21 14:31

Reported

2024-05-21 14:34

Platform

win10v2004-20240426-en

Max time kernel

148s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe"

Signatures

Possible privilege escalation attempt

exploit
Description Indicator Process Target
N/A N/A C:\Windows\system32\takeown.exe N/A
N/A N/A C:\Windows\system32\icacls.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files\Windows Media Player\wmpnetwk.exe N/A
N/A N/A C:\Program Files\Windows Media Player\wmixedwk.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Program Files\Windows Media Player\wmpnetwk.exe N/A
N/A N/A C:\Program Files\Windows Media Player\wmixedwk.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\takeown.exe N/A
N/A N/A C:\Windows\system32\icacls.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\2804.hecate C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\696.hecate C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\info C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\3652.hecate C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\3348.hecate C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\4168.hecate C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\4600.hecate C:\Windows\system32\svchost.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1336 set thread context of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 676 set thread context of 2804 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 set thread context of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 set thread context of 696 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 set thread context of 3652 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 set thread context of 3348 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 set thread context of 4168 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 set thread context of 4600 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Windows Media Player\background.jpg C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A
File created C:\Program Files\Windows Media Player\mpsvc.dll C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A
File created C:\Program Files\Windows Media Player\wmpnetwk.exe C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A
File created C:\Program Files\Windows Media Player\wmixedwk.exe C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A
File opened for modification C:\Program Files\Windows Media Player\wmixedwk.exe C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe N/A
File opened for modification C:\Program Files\Windows Media Player\ppqqxpp C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Program Files\Windows Media Player\ppqqxpa C:\Windows\system32\svchost.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification \??\c:\windows\ppqqxpb C:\Windows\system32\svchost.exe N/A
File opened for modification \??\c:\windows\ppqqxpb C:\Windows\system32\svchost.exe N/A
File opened for modification \??\c:\windows\ppqqxpb C:\Windows\system32\svchost.exe N/A
File opened for modification \??\c:\windows\ppqqxpb C:\Windows\system32\svchost.exe N/A
File opened for modification \??\c:\windows\ppqqxpb C:\Windows\system32\svchost.exe N/A

Enumerates physical storage devices

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software C:\Windows\system32\SearchFilterHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009ed814a88babda01 C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\wshext.dll,-4802 = "VBScript Script File" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000000885dca68babda01 C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86} C:\Windows\system32\SearchFilterHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000553a90a68babda01 C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B} C:\Windows\system32\SearchFilterHost.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000809e19a88babda01 C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009935eda68babda01 C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithList C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000059d5aca68babda01 C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\yzzg C:\Windows\system32\svchost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9911 = "Windows Media Audio shortcut" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie C:\Windows\system32\svchost.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" C:\Windows\system32\svchost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9938 = "3GPP2 Audio/Video" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer C:\Windows\system32\SearchFilterHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9912 = "Windows Media Audio file" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE C:\Windows\system32\SearchFilterHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device C:\Windows\system32\SearchFilterHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9937 = "3GPP Audio/Video" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007483fba68babda01 C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-126 = "Microsoft Word Macro-Enabled Template" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000304f65a68babda01 C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates C:\Windows\system32\SearchFilterHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\wshext.dll,-4804 = "JavaScript File" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections C:\Windows\system32\svchost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie C:\Windows\system32\SearchFilterHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit C:\Windows\system32\svchost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit C:\Windows\system32\SearchFilterHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\yzzg\c = "ㄱ㜱" C:\Windows\system32\svchost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-176 = "Microsoft PowerPoint Macro-Enabled Presentation" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\acppage.dll,-6002 = "Windows Batch File" C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithList C:\Windows\system32\SearchProtocolHost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd C:\Windows\system32\SearchProtocolHost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" C:\Windows\system32\SearchProtocolHost.exe N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\takeown.exe N/A
Token: 33 N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\SearchIndexer.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4992 wrote to memory of 4016 N/A C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe C:\Windows\System32\cmd.exe
PID 4992 wrote to memory of 4016 N/A C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe C:\Windows\System32\cmd.exe
PID 4016 wrote to memory of 2112 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\takeown.exe
PID 4016 wrote to memory of 2112 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\takeown.exe
PID 4016 wrote to memory of 1640 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\icacls.exe
PID 4016 wrote to memory of 1640 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\icacls.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 1336 wrote to memory of 676 N/A C:\Program Files\Windows Media Player\wmixedwk.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2804 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2804 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2804 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2804 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2804 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2804 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2804 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 2436 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 696 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 696 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 696 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 696 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 696 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 696 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 696 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 4992 wrote to memory of 2084 N/A C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe C:\Windows\system32\cmd.exe
PID 4992 wrote to memory of 2084 N/A C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe C:\Windows\system32\cmd.exe
PID 2084 wrote to memory of 5116 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 2084 wrote to memory of 5116 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 2820 wrote to memory of 832 N/A C:\Windows\system32\SearchIndexer.exe C:\Windows\system32\SearchProtocolHost.exe
PID 2820 wrote to memory of 832 N/A C:\Windows\system32\SearchIndexer.exe C:\Windows\system32\SearchProtocolHost.exe
PID 2820 wrote to memory of 4488 N/A C:\Windows\system32\SearchIndexer.exe C:\Windows\system32\SearchFilterHost.exe
PID 2820 wrote to memory of 4488 N/A C:\Windows\system32\SearchIndexer.exe C:\Windows\system32\SearchFilterHost.exe
PID 676 wrote to memory of 3652 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3652 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3652 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3652 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3652 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3652 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3652 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3348 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3348 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3348 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3348 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3348 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3348 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe
PID 676 wrote to memory of 3348 N/A C:\Windows\system32\svchost.exe C:\Windows\system32\svchost.exe

Processes

C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe

"C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" cmd /c takeown /f "C:\Program Files\Windows Media Player\wmpnetwk.exe" && icacls "C:\Program Files\Windows Media Player\wmpnetwk.exe" /grant administrators:F

C:\Windows\system32\takeown.exe

takeown /f "C:\Program Files\Windows Media Player\wmpnetwk.exe"

C:\Windows\system32\icacls.exe

icacls "C:\Program Files\Windows Media Player\wmpnetwk.exe" /grant administrators:F

C:\Windows\system32\SearchIndexer.exe

C:\Windows\system32\SearchIndexer.exe /Embedding

C:\Program Files\Windows Media Player\wmpnetwk.exe

"C:\Program Files\Windows Media Player\wmpnetwk.exe"

C:\Program Files\Windows Media Player\wmixedwk.exe

"C:\Program Files\Windows Media Player\wmixedwk.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe

"C:\Windows\system32\svchost.exe"

C:\Windows\system32\svchost.exe

"C:\Windows\system32\svchost.exe"

C:\Windows\system32\svchost.exe

"C:\Windows\system32\svchost.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\kkxqbh.bat" "

C:\Windows\system32\PING.EXE

ping 127.0.0.1 -n 3

C:\Windows\system32\SearchProtocolHost.exe

"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"

C:\Windows\system32\SearchFilterHost.exe

"C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 784

C:\Windows\system32\svchost.exe

"C:\Windows\system32\svchost.exe"

C:\Windows\system32\svchost.exe

"C:\Windows\system32\svchost.exe"

C:\Windows\system32\svchost.exe

"C:\Windows\system32\svchost.exe"

C:\Windows\system32\svchost.exe

"C:\Windows\system32\svchost.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 sta.alie3ksgee.com udp
HK 103.146.158.221:80 sta.alie3ksgee.com tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 221.158.146.103.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
NL 23.62.61.129:443 www.bing.com tcp
NL 23.62.61.129:443 www.bing.com tcp
US 8.8.8.8:53 129.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 cl.alie3ksgff.com udp
US 8.8.8.8:53 myxqbh.top udp
CN 182.108.14.161:6666 myxqbh.top udp
US 149.28.212.217:6666 cl.alie3ksgff.com udp
US 8.8.8.8:53 161.14.108.182.in-addr.arpa udp
US 8.8.8.8:53 217.212.28.149.in-addr.arpa udp
HK 103.146.158.221:80 sta.alie3ksgee.com tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
CN 182.108.14.161:6666 myxqbh.top udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
CN 182.108.14.161:6666 myxqbh.top udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
CN 182.108.14.161:6666 myxqbh.top udp
CN 182.108.14.161:6666 myxqbh.top udp

Files

memory/4992-0-0x00007FF78776A000-0x00007FF78776B000-memory.dmp

memory/4992-3-0x0000029557BE0000-0x0000029557C0C000-memory.dmp

memory/4992-5-0x00007FF787750000-0x00007FF7877A6000-memory.dmp

C:\Program Files\Windows Media Player\wmpnetwk.exe

MD5 90b85ffbdeead1be861d59134ea985b0
SHA1 55e9859aa7dba87678e7c529b571fdf6b7181339
SHA256 ed0dc979eed9ab9933c49204d362de575c7112a792633fda75bb5d1dab50a5c2
SHA512 8a1c10bbfe5651ab25bf36f4e8f2f65424c8e1004696c8141498b99ea2fbd7b3e5fae4d2cfee6835f7ff46bd2333602f4d8ac4a0f5b8e9757adb176332a3afce

memory/2820-19-0x0000024E1B290000-0x0000024E1B2A0000-memory.dmp

memory/2820-35-0x0000024E1B390000-0x0000024E1B3A0000-memory.dmp

memory/2820-51-0x0000024E1F880000-0x0000024E1F888000-memory.dmp

C:\Program Files\Windows Media Player\mpsvc.dll

MD5 51835bc0013021fac02572d2a4f371c3
SHA1 1c5dc6300992e0410a469280c7384d2dee1033f0
SHA256 1ec23649104d52fe4bd81868896ace1860c2b579c07b1ff3ae8bf9b544cf093d
SHA512 beb67411146a72c610a298547e86934ef48258d9caaa0f7c024a9914d0e010dde5ddd9699e25baddbbe0c6b9cb3d43124de3673c4bae4fe45f61d7d7f0f99f68

C:\Program Files\Windows Media Player\background.jpg

MD5 2ae78a18e71d4696964e021f3241287a
SHA1 562ac6a611ef5b44abd61db261a11289950f7efb
SHA256 ac4c16749c6d77dd153327c18c4bf6d48c8268efcbbb9d0515ea582e0fed19d2
SHA512 a7d1bcee4296fa1569d401b1886022da2384a33080baa1ab82cf86ff708351fe3784297d9e104927b7f581ad351bc7c900db5953e22dbd262ce76b9ee62c11ca

memory/676-70-0x0000000140000000-0x0000000140026000-memory.dmp

memory/676-68-0x0000000140000000-0x0000000140026000-memory.dmp

memory/676-67-0x0000000140000000-0x0000000140026000-memory.dmp

memory/676-66-0x0000000140000000-0x0000000140026000-memory.dmp

memory/676-65-0x0000000140000000-0x0000000140026000-memory.dmp

memory/676-64-0x0000000140000000-0x0000000140026000-memory.dmp

memory/676-63-0x0000000140000000-0x0000000140026000-memory.dmp

memory/1336-73-0x00007FFC22510000-0x00007FFC22536000-memory.dmp

memory/2804-79-0x0000000140000000-0x000000014011B000-memory.dmp

memory/3152-80-0x00007FFC22510000-0x00007FFC22536000-memory.dmp

memory/2436-90-0x0000000140000000-0x00000001400D1000-memory.dmp

memory/2436-89-0x0000000140000000-0x00000001400D1000-memory.dmp

C:\kkxqbh.bat

MD5 213c3f1aa1f2ee05f1c6618d192fffc5
SHA1 a517128a03b995935ff9cce15916ba84250f28b0
SHA256 8d68538bab28f4e7bd4af85a501e13fb228aae17ab8d5c17abceefa94948b607
SHA512 efabf818a1a1efdf4c448dd8fc98f2956866d80d5cc3b05e00561a767628d3cf3d7912782218acc234ec1e752dc3be0150ba87f00039fdd9f4eaa7922ddd01fe

memory/2436-87-0x0000000140000000-0x00000001400D1000-memory.dmp

memory/2436-86-0x0000000140000000-0x00000001400D1000-memory.dmp

memory/2436-85-0x0000000140000000-0x00000001400D1000-memory.dmp

memory/2436-83-0x0000000140000000-0x00000001400D1000-memory.dmp

memory/2436-82-0x0000000140000000-0x00000001400D1000-memory.dmp

memory/2436-81-0x0000000140000000-0x00000001400D1000-memory.dmp

memory/2436-84-0x0000000140000000-0x00000001400D1000-memory.dmp

memory/2804-78-0x0000000140000000-0x000000014011B000-memory.dmp

memory/2804-76-0x0000000140000000-0x000000014011B000-memory.dmp

memory/2804-75-0x0000000140000000-0x000000014011B000-memory.dmp

memory/2804-74-0x0000000140000000-0x000000014011B000-memory.dmp

memory/676-72-0x0000000140000000-0x0000000140026000-memory.dmp

memory/676-71-0x0000000140000000-0x0000000140026000-memory.dmp

C:\Windows\Temp\aad9f05a9a826b65ff2b94740ca196c2

MD5 98ddf99d62e398f7f9958cb8c3bb655b
SHA1 1edf9932c9e048e2de35d595a7283d8e1d1b48aa
SHA256 ce62abda7d9d2917d7d765000d93bf9f551c6a2ce8082e89cf589af3c97410ee
SHA512 9770c5548beda6a31b8b1a061071fe04879e0c2f75aad2d1ff6a0cf94fa5fe1d8124ae78245403111216ceb094c17282d35a3b48994d3beecee298cf242022b2