Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 18:15
Static task
static1
Behavioral task
behavioral1
Sample
25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe
Resource
win10v2004-20240508-en
General
-
Target
25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe
-
Size
8.3MB
-
MD5
0e325c1047cd5a0d17da652d12f642b2
-
SHA1
821df9a143bebed52b4a1685e2d2978fb0d46b51
-
SHA256
25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9
-
SHA512
21b08680887bff65f36ac21f44b8c4db47f569bb2a64a1dc52a3a2c97ea7ebc8070ae5756b5db4dfea506b575479becaf339f2f684f7132c13594ad426cdb71e
-
SSDEEP
196608:f5gGhArtAXr5k6Vswjo3ae6/7XQMEnLc6ioy47RsJ26H:BgGhsc2yXQDc6ioy47e7
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\240606000.bat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240606000.bat" look2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ComputerZService.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ComputerZService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ComputerZService.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
360DrvMgr.exeHD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 360DrvMgr.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe -
Executes dropped EXE 6 IoCs
Processes:
look2.exeHD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exeHD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe360DrvMgr.exeComputerZService.exesvchcst.exepid process 5000 look2.exe 3700 HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe 5108 HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe 8 360DrvMgr.exe 2244 ComputerZService.exe 4956 svchcst.exe -
Loads dropped DLL 15 IoCs
Processes:
look2.exesvchost.exe360DrvMgr.exeComputerZService.exesvchcst.exepid process 5000 look2.exe 1040 svchost.exe 8 360DrvMgr.exe 8 360DrvMgr.exe 8 360DrvMgr.exe 8 360DrvMgr.exe 8 360DrvMgr.exe 8 360DrvMgr.exe 8 360DrvMgr.exe 2244 ComputerZService.exe 8 360DrvMgr.exe 2244 ComputerZService.exe 4956 svchcst.exe 2244 ComputerZService.exe 2244 ComputerZService.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ComputerZService.exe360DrvMgr.exedescription ioc process File opened (read-only) \??\J: ComputerZService.exe File opened (read-only) \??\M: ComputerZService.exe File opened (read-only) \??\O: ComputerZService.exe File opened (read-only) \??\S: ComputerZService.exe File opened (read-only) \??\Z: ComputerZService.exe File opened (read-only) \??\F: 360DrvMgr.exe File opened (read-only) \??\B: ComputerZService.exe File opened (read-only) \??\I: ComputerZService.exe File opened (read-only) \??\Y: ComputerZService.exe File opened (read-only) \??\A: ComputerZService.exe File opened (read-only) \??\E: ComputerZService.exe File opened (read-only) \??\G: ComputerZService.exe File opened (read-only) \??\K: ComputerZService.exe File opened (read-only) \??\N: ComputerZService.exe File opened (read-only) \??\P: ComputerZService.exe File opened (read-only) \??\Q: ComputerZService.exe File opened (read-only) \??\X: ComputerZService.exe File opened (read-only) \??\H: ComputerZService.exe File opened (read-only) \??\L: ComputerZService.exe File opened (read-only) \??\R: ComputerZService.exe File opened (read-only) \??\T: ComputerZService.exe File opened (read-only) \??\U: ComputerZService.exe File opened (read-only) \??\V: ComputerZService.exe File opened (read-only) \??\W: ComputerZService.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
360DrvMgr.exeComputerZService.exedescription ioc process File opened for modification \??\PhysicalDrive0 360DrvMgr.exe File opened for modification \??\PhysicalDrive0 ComputerZService.exe -
Drops file in System32 directory 13 IoCs
Processes:
ComputerZService.exesvchost.exelook2.exedescription ioc process File created C:\Windows\System32\DriverStore\FileRepository\hdaudio.inf_amd64_fe5b23ea7991a359\hdaudio.PNF ComputerZService.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF ComputerZService.exe File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF ComputerZService.exe File created C:\Windows\System32\DriverStore\FileRepository\machine.inf_amd64_b748590104fe1c15\machine.PNF ComputerZService.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF ComputerZService.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File created C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF ComputerZService.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF ComputerZService.exe File created C:\Windows\System32\DriverStore\FileRepository\input.inf_amd64_adeb6424513f60a2\input.PNF ComputerZService.exe File created C:\Windows\System32\DriverStore\FileRepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF ComputerZService.exe File created C:\Windows\SysWOW64\240606000.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe -
Drops file in Program Files directory 1 IoCs
Processes:
25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe -
Drops file in Windows directory 7 IoCs
Processes:
360DrvMgr.exeComputerZService.exedescription ioc process File created C:\Windows\INF\c_volume.PNF 360DrvMgr.exe File created C:\Windows\INF\c_diskdrive.PNF 360DrvMgr.exe File created C:\Windows\INF\c_media.PNF 360DrvMgr.exe File created C:\Windows\INF\c_display.PNF 360DrvMgr.exe File created C:\Windows\INF\c_processor.PNF 360DrvMgr.exe File opened for modification C:\Windows\ ComputerZService.exe File created C:\Windows\INF\c_monitor.PNF 360DrvMgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 36 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ComputerZService.exe360DrvMgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName ComputerZService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Driver ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Mfg ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc ComputerZService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Driver ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName ComputerZService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 ComputerZService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Driver 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Driver 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Mfg 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc 360DrvMgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service ComputerZService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags ComputerZService.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
ComputerZService.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ComputerZService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate ComputerZService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor ComputerZService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion ComputerZService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate ComputerZService.exe -
Processes:
360DrvMgr.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 360DrvMgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\360DrvMgr.exe = "8000" 360DrvMgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DOCUMENT_COMPATIBLE_MODE 360DrvMgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DOCUMENT_COMPATIBLE_MODE\360DrvMgr.exe = "8000" 360DrvMgr.exe -
Processes:
ComputerZService.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C ComputerZService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ComputerZService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ComputerZService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 ComputerZService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 ComputerZService.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 ComputerZService.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exeComputerZService.exepid process 116 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe 116 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe 2244 ComputerZService.exe 2244 ComputerZService.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 652 652 -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
360DrvMgr.exeComputerZService.exedescription pid process Token: SeLoadDriverPrivilege 8 360DrvMgr.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe Token: 33 2244 ComputerZService.exe Token: SeIncBasePriorityPrivilege 2244 ComputerZService.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe360DrvMgr.exepid process 116 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe 116 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe 8 360DrvMgr.exe 8 360DrvMgr.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exeHD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exeHD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe360DrvMgr.exesvchost.exedescription pid process target process PID 116 wrote to memory of 5000 116 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe look2.exe PID 116 wrote to memory of 5000 116 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe look2.exe PID 116 wrote to memory of 5000 116 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe look2.exe PID 116 wrote to memory of 3700 116 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe PID 116 wrote to memory of 3700 116 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe PID 116 wrote to memory of 3700 116 25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe PID 3700 wrote to memory of 5108 3700 HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe PID 3700 wrote to memory of 5108 3700 HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe PID 3700 wrote to memory of 5108 3700 HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe PID 5108 wrote to memory of 8 5108 HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe 360DrvMgr.exe PID 5108 wrote to memory of 8 5108 HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe 360DrvMgr.exe PID 5108 wrote to memory of 8 5108 HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe 360DrvMgr.exe PID 8 wrote to memory of 2244 8 360DrvMgr.exe ComputerZService.exe PID 8 wrote to memory of 2244 8 360DrvMgr.exe ComputerZService.exe PID 8 wrote to memory of 2244 8 360DrvMgr.exe ComputerZService.exe PID 1040 wrote to memory of 4956 1040 svchost.exe svchcst.exe PID 1040 wrote to memory of 4956 1040 svchost.exe svchcst.exe PID 1040 wrote to memory of 4956 1040 svchost.exe svchcst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe"C:\Users\Admin\AppData\Local\Temp\25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exeC:\Users\Admin\AppData\Local\Temp\HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe"C:\Users\Admin\AppData\Local\Temp\HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exe" -sfxwaitall:0 "C:\Users\Admin\AppData\Local\Temp\360DrvMgr\360DrvMgr.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\360DrvMgr.exe"C:\Users\Admin\AppData\Local\Temp\360DrvMgr\360DrvMgr.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\ComputerZService.exe"C:\Users\Admin\AppData\Local\Temp\360DrvMgr\ComputerZService.exe"5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:4588
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240606000.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4956
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\360Base.dllFilesize
900KB
MD5a73cf0457df35fab74ef3393d2766667
SHA1c123e15967e7ab980eba5431a6993e646500befd
SHA256df411ebc1b4a652a3822de0cebd5a48151abb3dd99c8c3d15f858401b27243fd
SHA512faee2c8c3caf31ee2cceefadff4c442ef3aaed36fabf61a4217e1ba13b315808f09b575b5789ef7cc342cb16219afb4a1c4e7f7686ea8d079c9d7dd9ee782b90
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\360DrvMgr.exeFilesize
762KB
MD5aaa3aab403ff02947c0b20472e40af4e
SHA1b63acf58aeb317fbfb253ad6ad8ffb53ce1ecc75
SHA2562ffb6d0703e990e5b2cbeee5378e94cf53e35c56b99c412bf888e0b7aad9affa
SHA512876f92457a10b5b3e0814f10b431bf26b781fb39210b568f88e0a3098bb8e31e2f5dcf7ae293b132e42f1e8b0dc51fd92637e054a426b567ec6d41c7277e54b4
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\360LibDrvmgr.datFilesize
1KB
MD55c49c76eab7f4cb98161b028f56fef0d
SHA1ee1694139f30b991dbc1f0d26af691976e462cc7
SHA256d261b133220d0878de4d2151e71c5acb1802314b023c751a1e55fe83bff9d928
SHA5127c8b68df7e774c9a9fb5adf6a5616ee5ce222bb6b6f2f0c2bb72ca660efa916e7c2b0084ce4b47064043f5ccaec2cc5b81bd302cddc3be8d11b2ca2a3368d8c0
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\360NetBase.dllFilesize
1.4MB
MD514c6b4bbd31f6fd13530bc941cc71d1a
SHA1ce4e38ac82a54f64d318507ddc28f9ffbb378f0f
SHA256401d8529a84f1d80a439be8cd4e869202162458e5afb5e5bac97c4859bfe8eb5
SHA512c16d525f1d3fc098b4d6c8b8a872a9013ef2f945f27af73ed7826f61a2b80d756ae5348105432909eccc71f03834cd1301f87fa5a0107e0c7137f5c8e3a3cc95
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\ComputerZ.setFilesize
65B
MD52d190642e5162c95e649f0032cf66dae
SHA1262f8e1e5fff6784f31eb1a33b72e91405595297
SHA25654a58179f47494502dd6750e2dba0008fd08958f5945346bbd8af818f52a6b3b
SHA5126e5aa767f214c86bd1f7216ef4203931019efb7f11900d755bd409329576e4a4d6bf458b62676feab7093c9734a486e759af012a1a4bd0d1d0b246b1f10f88d8
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\ComputerZ.setFilesize
81B
MD508b5c8ebb198ee2f49e95605f1476de1
SHA1355467d5922b29397e7b7cdc4b3a4181d18141a9
SHA2569d9bbcafd1c4b6570d7a3b5dad0d7ccef03e51a1fb8ca3861c09d8ef6ca43a7b
SHA51251412ff34cb0e67aa2b65e5bb11d01ba3ddd2835e50fb9d77ba21b9416b68adc682aec55112115f12c57e69b432f9e928e03e6abb7fc8c1564ae26da7c186a83
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\ComputerZ2.dllFilesize
229KB
MD5a75f38215a115f9260b58cdd935d7d81
SHA1dbb7d9d7e69cd5f2f4cda49bebc0fd922316a866
SHA256102459b35d0b36f915b2cafc2e083d95f4e042815c732a2520dfb646efae4cd1
SHA5123eeacb82ed9e61d9dc8fec13c2f87fd07b90a5052dd1a3482ee4cdb5122db77587078e7966bf72d73b776973bac09f53f37081f4af0828f1a914c0cd31d03ce9
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\ComputerZ5.dllFilesize
197KB
MD5d8308aa7cc08c3a56c9187029db56702
SHA1f8a1b97e321660d814d4d01f03911f6da0caed9d
SHA256850bb1419ab0c93d524284a6c9c15db69a1e5328e9f84f06bb27ba5efb8a65b8
SHA5120a6c757b3e5cfaf2de92e4f402dc97306a551244501d97a099ac2a586c7501f087fe7c82c8a81e95b4fea851a0690733c116345360b5dbeb343966fdbda08baa
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\ComputerZService.exeFilesize
1.1MB
MD566bed313b2a1d83113ced5c4297c0abc
SHA1bfc0ca5ca11b5e9e0a84c5a25fb3fb7bfc8cc5eb
SHA256b6ce0f204ed6f92ed8949c12cff5ac63f003adcbeb6e744ab81f7ac10d18e23f
SHA5128ad3abfd830e4d500be988bc0c771cb7537fbfcdae15dbe44b82cdeabbbeef6b523ae3c0038c0026c7937289ba9bc526ecbe640cc1757a1552d4f3555a3746d6
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\ComputerZ_HardwareDll.dllFilesize
8.5MB
MD52bcee702e76853c61a3621e410521a20
SHA1824a186e0f1d77692b416877c18d867885dc2dca
SHA25614f5ffec3b83ed5831f7cd046552b9b224a6ec2613643f85c8cebfdf72df80d5
SHA512f20fec854d0399d57e58b2056063be9414a0714c8938e914fbbab6cd1fc2eac09fb3919359eaee83284b60923f38252c417ce430c081dbf4bcfbf2c176fa20e9
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\DataMgr.dllFilesize
664KB
MD5af1cc0d945bceb82863195d11ad9827e
SHA1215884e6188ebf94b73bffbff7e040e376954874
SHA25618d8c74199c73a226436b3cbde6ce232b8aa30dabdc0dbb64e9dc52c18fa0a05
SHA51239f1e822ea1b0f1ac292533df058977ece4386b7636256a4158f65c9f1e6ad05cc1c91f0edb19af03fe9b757661348256b667d285243db55404c42ea3e3d3daf
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\DownloadMgr.dllFilesize
431KB
MD59df1215e8ff502a448f5e03555b62b95
SHA1fe7f3fe364634879a155ec2abbdf2abe302412a5
SHA256dbe9efd63ce1b628a2a96457d0b26d48e7ae96a564a413e0e641f81caa48fc1f
SHA5124e28a52b761a67f2d0affe73df423092d319f772ef7d79d544c32737b7c5bddb3680b2ddf9a7de6a25adc62d23579ae8a7472f3e8b45d79eb52fa05e0ced3000
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\DrvInst64.exeFilesize
190KB
MD588b760633dda4594397b2f8b88d48183
SHA16b86e7419c64d20b66ccfcebadd7d9781bf62b34
SHA25659624413da628923f722f24b407b18fccc9a8c7652042cf7d9d0f0b337d11148
SHA5125071431448a5b95dddd55a01bd1ca2c3d97a6e5a7337203c51b877f804e61f46fc7e2970fef488c6a94ec045313e2a317a14c66627b0927ae1830cc13725d340
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\DrvMgrUI.dllFilesize
2.5MB
MD50338213fedc063dc411e5f50fe1111cf
SHA1101710994ad3a05fbb4d184c35dbb7be3fbcef61
SHA25607fed5a0577ec23cf4697a0aec87a5e47e13e2abc01cc9e25eda22478e2fed07
SHA5129228a03c9c9f842cdeb6b4f9291b0c224f83f17302acc4769bddbcfdc65cbc117dc6b080f88deb83724b06bc31119604279468696e4ff60496e0d1ecc0fa04d1
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\DrvmgrCore.dllFilesize
1.2MB
MD5d05a967e7f6ba5c4bcb4e8bd7f148061
SHA1241c246153885a419f1fe4dab0639ac144e57c32
SHA25676d6e20231be330caf4be260ec0071f4183241a20ae58521086fe4de81bb409b
SHA512541ab45df6b4706214bca0b3099aea0b49b7630ad8bbe7454ea7a0216b7d8bb379f2263edecbd3d563898457a4d33ab9365a46a62f3d1f944403e2a7c39ca4ca
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\MiniUI.dllFilesize
901KB
MD5043365f793b1672fc80aaebde3b22929
SHA1be526a544e7af66b573b29ee7100374e9deb9a1f
SHA2562bf36c7813e8410e2ef442158e4089f5c5fa512684848f421cd4b08f1eca1d23
SHA512efb94e1447842254992f67ad2bcc8ebd1862894019e612d680a3b69a4ec9aaef787bddd155775842baf225b9dea05feaef37db26808fc8516851f995a0b62530
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\PDown.dllFilesize
230KB
MD548a849ff04150b2ec0836ab6bb32590a
SHA11f52bbcd5d124de15c27cf5ea84e14cb9a87f6a3
SHA256ded09df700ef458322b6160edd39adb103c03cef3c6ffbce2ee096ce1fd33d62
SHA512b0b23e540102b16c4ed9ac05f1ac353bf0d19e0c2b0880cec1fa2e9292030e1c5a75694176ac428c7de55588cf503ab36643d2db8c1fec3543daf3aeeb53a680
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\ScriptExecute.exeFilesize
520KB
MD5eea4fbb86da8e1081d0d70f02c632f1f
SHA10d92de64f4749843136aaf00b35528096d4cdfeb
SHA256516da8a4a7aeee54231386f6695559046e5d48c7ccb101bd0af14f2f8f5b0e80
SHA51243b3b7e36701bcdbb3d7ee89c84ee2a38e7e157f19ea5257cebb626c6321db15d59ddb4f42de61e6d9658fa3771689253c2c435b423f91d9695cb71fa6302e8d
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\config\config.xmlFilesize
978B
MD5583e167ba709fec11044409c6b09d04f
SHA127b363d8b5dee2df351a5d41e6f14b6156db190f
SHA256ea5f4faf853767718beef85023fcd9e13cca2127ebb3c17331903779db2916a0
SHA512bebb16e99340d9264b7ae4cfd1562243a8cef688d3585968046c68020f19de587668485017f74368c20b686f5543bb319cc02665a3cdbb890eb47ffa4ce2a20e
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\config\defaultskin\defaultskin.uiFilesize
156KB
MD50cc06e728803d0cdeedda92e04313e6c
SHA162e897041bdbf18ca65f6c452abcb557e17c0ded
SHA2563fb6414e92be15821c674a6e72295e75747e9734c827ac14e85479d4720f2b33
SHA51272afb68bf2078e459cf2e37481c61ff172dd224f5b089bf9903b0c55660aecfdcb98622c0b04fe88edae0e2e25c0eb640cffafc7343bbe5d67ef137397678936
-
C:\Users\Admin\AppData\Local\Temp\360DrvMgr\config\defaultskin\miniui.xmlFilesize
8KB
MD51c7fad425e4dc4787174876b6725c5de
SHA16bf7f9afb666636bea1cef7eca6ebc32f4b344a2
SHA256ee451d9f3d84226bcd456f193e1e79ebfbd1f24b961b25770c40df93ee7ca494
SHA512ab02ca7851e6a859244edea31b3cf931a14937ec9ad2274c49a1aedb5a258360f653d7d5e76b9c6166633c4c284db9be277ae584d89641a99da3c77564f8b57d
-
C:\Users\Admin\AppData\Local\Temp\HD_25bf6bc8d1a3489242813a068f296dfe95b1c15d63327c9e9acc416e95ba7fc9.exeFilesize
7.2MB
MD51d71fe1242556467246df4ff2a936df5
SHA183efb5f95c4d0f01cd24454dbd217faf2663ba7b
SHA2564ca410ee206c0d94ba3483501626e87843d38811967cf080dbf1af64c8206291
SHA512f5114f61070b195542c20149a0c5ec070a7db45a0c603a7b6723a9b07d2df6cba025a84fdb4457fdf31c46eef6e34cae1f7679838f3e4739c6aceff7eee91ecb
-
C:\Users\Admin\AppData\Local\Temp\HD_X.datFilesize
1.2MB
MD5940c92183c07ef54f9d7e7f484c61009
SHA18a396b4753a4bdb57ad205f626f43a5b252623a6
SHA2569901f5b25e05cf692590795f405a8e06c4012e64c2ddd8b60a4889571346f35b
SHA512b8e4acbbc9d2622a6a7883198302223aa2d92a35cf0b217047e9abb1adf5e6240db17e7963b5a29cd9bccd5377aa1eb5a94a98bf2aa13d7e08195646452b8ec9
-
C:\Users\Admin\AppData\Local\Temp\look2.exeFilesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
C:\Users\Admin\AppData\Roaming\360DrvMgr\360DrvMgr_20240525.datFilesize
4KB
MD528d65f51901121f40131156b0a5510c2
SHA1bb6f5b083c819808ddb78b34cd84e7160da7e482
SHA25668b0ddae2c02efbc69ca017f14aee646bfaa9123d56aa08b6dc1a7cc48c69fb3
SHA5123f0281212d2de32ebd916011669f5e1bcdbace89e52798f870b85abc4da19377faabf0a07120aae0a5ab5c7fb879f999d2eda6f699a09f0db850aa08daaf0f78
-
C:\Users\Admin\AppData\Roaming\360DrvMgr\Config.iniFilesize
44B
MD522ddd985079bdfec90ca89d2361589e4
SHA11a1ad8dfed3fc6814aa300d4a73a7a11671b88f5
SHA2564f266314cec728c0be66e8ab79932941259d897bb058d4b275bee7b57a41abdd
SHA512b4260e67e0a460d663d2f33ed2805c27c7628ccd1e2203c48cf46edbe9eacd769a966adb7ced025b88315e3489e85821e0002655ceb88766ca61484d69c744d0
-
C:\Windows\INF\c_diskdrive.PNFFilesize
6KB
MD5a1e853b928098256c4b7c3c1611b3fb5
SHA1dc92e7cf097792794d9b43bc7b338d2f6be2af17
SHA256a27d572350317400ad32486e4e4516006fb9532bbe4606d9e3ca7ef888a8c345
SHA512037eb31810032ce21c1ed8b7b401f665b05dc92ec5a20968cb9feb776c4f4f344c6e332ecb2b713b62f0c6ca1e13de2b4489055b97a9fde7981f82078de34c69
-
C:\Windows\INF\c_display.PNFFilesize
8KB
MD524fc238b2e65f129052f8c32eab81352
SHA17c0cb4a6d9ba40746fcc569c8fdaae71687095eb
SHA25635d70773dc47602654cfc711afa9ea3887ebe306706fe34d04e75b010aac5772
SHA512497cf5370b014499f9a5f22a39f6d15d507973d727f97e9581fa807a103bcde499149b2a6f549afa938d92ea8a5ffec15d023ba78de6722f8027274484aaa75f
-
C:\Windows\INF\c_media.PNFFilesize
12KB
MD5d6f787534eea52824abfef940379b071
SHA1b200fb5e314de41c743ac84fc973584dee668946
SHA256feedfdacbcff878dd0f877736f880b045941e25cd3c4013357d4e2a293a1e7d8
SHA5127ba2d3f0858a5aea61486ba8eb96fed621384258b5055e97a314d9cde71081545d881059d9bcd5bce4f5cb2d7cc341090d2cc419cac44302708b8bef17e4beca
-
C:\Windows\INF\c_monitor.PNFFilesize
6KB
MD529f6df5957016e418fbd0f2407e3575e
SHA10ffdc37e214ad11658b1732a8448eab853713b6b
SHA2568175f3000d31f9afadbbba3149b647da59b30712668751cd04216bbbbc9897ee
SHA512e5916dfd44a4456d0f8c7f42b993426c1196059c053a46ac324104edc674944f622b43c7ecb652e1904dd11932d98b87216e7860f5ce193bcd8899162dcbcc8a
-
C:\Windows\INF\c_processor.PNFFilesize
5KB
MD5b9fc29f586c7a0abdb7f33a173bd4518
SHA18a6386314e2b0dac9e57874164e865a6a94a0ba9
SHA2566040b942d0887f914a296e8ae0cc67300c479d4d0bb24bd07dde54ee142c4161
SHA512b44ea31a19c30c6b1fa4ee964284bc05e6d373d2c22a5012aec388465eb96b84a071804e49d2be577cf07ed24b535bd19e39c30b9a191a140f0c3875682cbfe3
-
C:\Windows\INF\c_volume.PNFFilesize
4KB
MD58b0c8f54383cef8ac91d3c21663b21fc
SHA10bc698df786a3396c58ecca34207a4c81985af10
SHA25641cef722ddac2159237cc6c4adc318e75d5b1159373d616e9bdd35f807d2280e
SHA51280a87ef617b5fb2e8ff1cc63b45d2f7f8a368da382bb9bf6d5863f83748f3ea1ade79c6ac7a0de8203d1d43eef01a603bfbc9d47a0d3b9fa56bd71b235c6c8b0
-
C:\Windows\SysWOW64\240606000.batFilesize
51KB
MD54c9aa178cb441deca1fbe7d0aede4609
SHA1bb969c267e6c92f7c31a81903d9261b8d6c36f7e
SHA2560855e2a61d926a8d3291659328d6c93bd5436bf2fcce80aba28ea6a42b0b16ed
SHA5124adb389b989e43dd8cbfac737fdd15c465d7b48f86bce65e0cbb8f70739a7e3312b6eef934cc38e6aa74ba8fc6a37c3b6d96a4636ea8d4f3b99dc319c228fbbd
-
C:\Windows\SysWOW64\svchcst.exeFilesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
memory/2244-266-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB