Analysis
-
max time kernel
338s -
max time network
592s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
yfga_game.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
yfga_game.exe
Resource
win10v2004-20240709-en
General
-
Target
yfga_game.exe
-
Size
46.3MB
-
MD5
14b51172d4f9f29c2478c8316b4cc5dd
-
SHA1
fe9f4e65ffd203192859988e232407b62d2dfd61
-
SHA256
b504f25f7354744305e326bf74567fff4021bcdf54e30d69e4404b3fa4d2eaaf
-
SHA512
cff063623701d5d0e7f960f08da81731821a8427fa45c88affc6adc46828fabbb526fa41c58d180604b98f0e7d56f6bda6cc1eb30f2224106f44471e18537a16
-
SSDEEP
786432:G7Ud58tChs1g2uzRL7KPB8NUc3sXEPeEwkHYvgctIKpJZXnfsrQl92Z3tHDUOsj1:yt96576B0HkGUvgcaKpDPBl92HHDdsGy
Malware Config
Extracted
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WbVhxCIDDK.exe -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Drops file in Drivers directory 6 IoCs
description ioc Process File created C:\Windows\system32\drivers\360Box64.sys 360TS_Setup.exe File created C:\Windows\system32\drivers\360Camera64.sys 360TS_Setup.exe File created C:\Windows\system32\drivers\360AntiHacker64.sys 360TS_Setup.exe File created C:\Windows\system32\drivers\360AvFlt.sys 360TS_Setup.exe File created C:\Windows\system32\drivers\BAPIDRV64.SYS 360TS_Setup.exe File created C:\Windows\system32\drivers\360netmon.sys 360TS_Setup.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4956 netsh.exe 4868 netsh.exe -
Possible privilege escalation attempt 7 IoCs
pid Process 2756 icacls.exe 2916 takeown.exe 2420 icacls.exe 3744 icacls.exe 2936 takeown.exe 2644 icacls.exe 2660 takeown.exe -
Sets service image path in registry 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360AntiHacker\ImagePath = "System32\\Drivers\\360AntiHacker64.sys" 360TS_Setup.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360AvFlt\ImagePath = "system32\\DRIVERS\\360AvFlt.sys" 360TS_Setup.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\BAPIDRV\ImagePath = "system32\\DRIVERS\\BAPIDRV64.sys" 360TS_Setup.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360Box64\ImagePath = "system32\\DRIVERS\\360Box64.sys" 360TS_Setup.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\ImagePath = "\"C:\\Program Files (x86)\\360\\Total Security\\safemon\\QHActiveDefense.exe\"" 360TS_Setup.exe -
resource yara_rule behavioral1/files/0x0005000000018fe4-38.dat aspack_v212_v242 behavioral1/files/0x0007000000018b62-44.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\International\Geo\Nation luminati-m-controller.exe Key value queried \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\International\Geo\Nation luminati-m-controller.exe Key value queried \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\International\Geo\Nation 360TS_Setup.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD1FC.tmp wannacryptor.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD210.tmp wannacryptor.exe -
Executes dropped EXE 55 IoCs
pid Process 2896 screenscrew.exe 2336 flasher.exe 1876 walliant.exe 2052 jokewarehydra.exe 2852 walliant.tmp 1008 YouAreAnIdiot.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 1540 useroverflow.exe 2488 programoverflow.exe 660 OperaSetup.exe 2432 bewidgets.exe 2708 pixelsee.exe 1852 setup.exe 1280 qtranslate.exe 1856 iconchanger.exe 2264 fontcreator.exe 828 fontcreator.tmp 3372 wannacryptor.exe 3208 taskdl.exe 3508 @[email protected] 3960 @[email protected] 3320 taskhsvc.exe 4604 taskdl.exe 4616 taskse.exe 4636 @[email protected] 1496 @[email protected] 5076 lum_inst.exe 4264 lum_inst.tmp 2980 luminati-m-controller.exe 4284 test_wpf.exe 1188 walliant.exe 3296 net_updater32.exe 3444 net_updater32.exe 4008 test_wpf.exe 2204 pixelsee.exe 4584 FontCreator.exe 1872 opera_binst.exe 3704 setup.exe 960 idle_report.exe 4064 @[email protected] 4276 pixelsee_crashpad_handler.exe 4732 QTranslate.exe 4960 antivirus360.exe 2116 Install.exe 2100 luminati-m-controller.exe 4292 brightdata.exe 2516 @[email protected] 3712 idle_report.exe 4040 @[email protected] 3204 360TS_Setup.exe 4212 360TS_Setup.exe 3660 @[email protected] 6300 PowerSaver.exe 6416 QHActiveDefense.exe -
Loads dropped DLL 64 IoCs
pid Process 2776 cmd.exe 2776 cmd.exe 2776 cmd.exe 2776 cmd.exe 2776 cmd.exe 1228 cmd.exe 1876 walliant.exe 2776 cmd.exe 1008 YouAreAnIdiot.exe 1008 YouAreAnIdiot.exe 2028 WerFault.exe 2028 WerFault.exe 2028 WerFault.exe 2028 WerFault.exe 2028 WerFault.exe 2776 cmd.exe 2776 cmd.exe 1192 win7recovery.exe 1192 win7recovery.exe 2776 cmd.exe 2776 cmd.exe 2316 cmd.exe 2316 cmd.exe 2316 cmd.exe 2316 cmd.exe 2316 cmd.exe 2316 cmd.exe 2316 cmd.exe 1856 iconchanger.exe 1280 qtranslate.exe 2264 fontcreator.exe 828 fontcreator.tmp 828 fontcreator.tmp 4088 regsvr32.exe 2776 cmd.exe 3372 wannacryptor.exe 3372 wannacryptor.exe 3832 cscript.exe 3372 wannacryptor.exe 3372 wannacryptor.exe 3868 cmd.exe 3508 @[email protected] 3508 @[email protected] 3320 taskhsvc.exe 3320 taskhsvc.exe 3320 taskhsvc.exe 3320 taskhsvc.exe 3320 taskhsvc.exe 3320 taskhsvc.exe 3372 wannacryptor.exe 3372 wannacryptor.exe 3372 wannacryptor.exe 3372 wannacryptor.exe 2708 pixelsee.exe 2708 pixelsee.exe 2708 pixelsee.exe 3372 wannacryptor.exe 2708 pixelsee.exe 5076 lum_inst.exe 4264 lum_inst.tmp 2980 luminati-m-controller.exe 2980 luminati-m-controller.exe 2980 luminati-m-controller.exe 2980 luminati-m-controller.exe -
Modifies file permissions 1 TTPs 7 IoCs
pid Process 2936 takeown.exe 2644 icacls.exe 2660 takeown.exe 2756 icacls.exe 2916 takeown.exe 2420 icacls.exe 3744 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1192-952-0x0000000000600000-0x0000000000678000-memory.dmp upx -
Unexpected DNS network traffic destination 9 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 52.209.27.170 Destination IP 54.76.137.169 Destination IP 54.76.137.232 Destination IP 54.76.137.169 Destination IP 54.76.137.169 Destination IP 54.76.137.232 Destination IP 54.76.137.169 Destination IP 54.76.137.169 Destination IP 54.76.137.169 -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wkffropqfmufbj088 = "\"C:\\Users\\Admin\\Desktop\\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\\tasksche.exe\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Walliant = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Walliant\\walliant.exe" walliant.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\PixelSee = "C:\\Users\\Admin\\PixelSee\\pixelsee.exe --minimized" pixelsee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" iconchanger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QHSafeTray = "\"C:\\Program Files (x86)\\360\\Total Security\\safemon\\QHSafeTray.exe\" /start" 360TS_Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\WbVhxCIDDK = "C:\\ProgramData\\WbVhxCIDDK.exe" win7recovery.exe -
Checks for any installed AV software in registry 1 TTPs 30 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast 360TS_Setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Eset\NOD\CurrentVersion\Info 360TS_Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense 360TS_Setup.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense 360TS_Setup.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\Group = "TDI" 360TS_Setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira 360TS_Setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents 360TS_Setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\ErrorControl 360TS_Setup.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\ImagePath = "\"C:\\Program Files (x86)\\360\\Total Security\\safemon\\QHActiveDefense.exe\"" 360TS_Setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\Start 360TS_Setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast\Version pixelsee.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense 360TS_Setup.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\DisplayName = "360 Total Security" 360TS_Setup.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\Start = "2" 360TS_Setup.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\Type = "16" 360TS_Setup.exe Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\AVAST Software\Avast pixelsee.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira 360TS_Setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast 360TS_Setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents 360TS_Setup.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira pixelsee.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Eset\NOD\CurrentVersion\Info 360TS_Setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\ImagePath 360TS_Setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\Type 360TS_Setup.exe Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Avira pixelsee.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\Group 360TS_Setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\ObjectName 360TS_Setup.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\ObjectName = "LocalSystem" 360TS_Setup.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\ErrorControl = "1" 360TS_Setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QHActiveDefense\DisplayName 360TS_Setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast\Version pixelsee.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 360TS_Setup.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI attrib.exe File opened for modification C:\Windows\Fonts\desktop.ini attrib.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 antivirus360.exe File opened for modification \??\PhysicalDrive0 360TS_Setup.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientExtensions-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Shell-InboxGames-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SUA-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\GDIPFONTCACHEV1.DAT net_updater32.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-EnterpriseEdition~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MSMQ-Client-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Telnet-Server-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MediaCenter-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MediaPlayback-OC-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-LocationBasic-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PeerToPeer-Full-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PhotoPremiumPackage~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-BusinessScanning-Feature-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Editions-Client-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PeerDist-Client-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-ParentalControls-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\SysWOW64\ar-SA\fms.dll.mui attrib.exe File opened for modification C:\Windows\SysWOW64\ar-SA\msprivs.dll.mui attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Wired-Network-Drivers-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-ShareMedia-ControlPanel-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PhotoPremiumPackage~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Printing-Foundation-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SampleContent-Music-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SNMP-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\SysWOW64\FontInstaller2.dll fontcreator.tmp File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-LocationBasic-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-NFS-ClientSKU-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Shell-InboxGames-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GPUPipeline-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-NFS-ClientSKU-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Links-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Security-SPP-Component-SKU-Starter-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\SysWOW64\ar-SA\comdlg32.dll.mui attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Help-CoreClientUAUE-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-IIS-WebServer-AddOn-2-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 net_updater32.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MediaPlayer-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Shell-HomeGroup-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PhotoBasicPackage~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Help-CoreClientUASE-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-ICM-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MediaCenter-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Branding-Enterprise-Client-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Branding-HomeBasic-Client-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Help-CoreClientUAPS-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB net_updater32.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-BLB-Client-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Basic-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-StorageService-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Anytime-Upgrade-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Branding-HomePremium-Client-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-Basic-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Help-CoreClientUAPS-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-Premium-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SnippingTool-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Media-Format-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PeerToPeer-Full-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SystemRestore-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 net_updater32.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Media-Foundation-Package~31bf3856ad364e35~amd64~en-US~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Help-Customization-Package~31bf3856ad364e35~amd64~~6.1.7600.16385.cat attrib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB net_updater32.exe -
Sets desktop wallpaper using registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\WallPaper = "C:\\Windows\\System32\\FeatureToastBulldogImg.png" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" wannacryptor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbynet.jar attrib.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libwingdi_plugin.dll attrib.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\SETUP.XML attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue.css attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Dialog.accdt attrib.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Warsaw attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OCRVC.DAT attrib.exe File created C:\Program Files (x86)\360\Total Security\i18n\es\ipc\filemgr.dll.locale 360TS_Setup.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_hover.png attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GR8GALRY.GRA attrib.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationRight_SelectionSubpicture.png attrib.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.win32.nl_zh_4.4.0.v20140623020002.jar attrib.exe File opened for modification C:\Program Files\Windows Journal\en-US\JNTFiltr.dll.mui attrib.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\slideshow_glass_frame.png attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Slipstream.xml attrib.exe File opened for modification C:\Program Files (x86)\QTranslate\Locales\Slovak attrib.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryResume.dotx attrib.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.service.exsd attrib.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0281243.WMF attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\EmptyDatabase.zip attrib.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.jarprocessor.nl_ja_4.4.0.v20140623020002.jar attrib.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\UTC attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0232797.WMF attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00231_.WMF attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15034_.GIF attrib.exe File created C:\Program Files (x86)\High-Logic FontCreator\WOFFTest\is-IDHSK.tmp fontcreator.tmp File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.nl_ja_4.4.0.v20140623020002.jar attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FiveRules.potx attrib.exe File opened for modification C:\Program Files (x86)\Google attrib.exe File opened for modification C:\Program Files\Internet Explorer\F12Resources.dll attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143746.GIF attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14997_.GIF attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME26.CSS attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR23F.GIF attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\SUBMIT.JS attrib.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator attrib.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\gadget.xml attrib.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_SelectionSubpicture.png attrib.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FPLACE.DLL attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB.DEV_COL.HXT attrib.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-previous-static.png attrib.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js attrib.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\cpu.css attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCHKBRD.XML attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101862.BMP attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\CAGCAT10.DLL attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsFormTemplate.html attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL090.XML attrib.exe File created C:\Program Files (x86)\360\Total Security\filemon\DataDriv.dat 360TS_Setup.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\2.png attrib.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT attrib.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\picturePuzzle.css attrib.exe File created C:\Program Files (x86)\360\Total Security\safemon\urlproc.dll 360TS_Setup.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21336_.GIF attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\tab_off.gif attrib.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libpva_plugin.dll attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02470U.BMP attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Default.dotx attrib.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\24.png attrib.exe File opened for modification C:\Program Files (x86)\360\Total Security\i18n\i18n.ini 360TS_Setup.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-MSMQ-Client-Package~31bf3856ad364e35~amd64~~6.1.7601.17514.mum attrib.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.Protocols.resources\2.0.0.0_it_b03f5f7f11d50a3a attrib.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Dired13b18a9#\f3e56ef4494d5d7845ad4070fd599860\System.DirectoryServices.ni.dll attrib.exe File opened for modification C:\Windows\Fonts\FREESCPT.TTF attrib.exe File opened for modification C:\Windows\Fonts\sserife.fon attrib.exe File opened for modification C:\Windows\Help\mui\040C\reliab.CHM attrib.exe File opened for modification C:\Windows\inf\PNRPSvc\0409 attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\SQL\fr attrib.exe File opened for modification C:\Windows\inf\ph3xibc11.inf attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\it\Regasm.resources.dll attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Wizard\wizardAddUser.ascx attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\PerfCounters.h attrib.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-PlatformUpdate-Win7-SRV08R2-Package-MiniLP~31bf3856ad364e35~amd64~zh-HK~7.1.7601.16492.cat attrib.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-PlatformUpdate-Win7-SRV08R2-Package~31bf3856ad364e35~amd64~ar-SA~7.1.7601.16492.cat attrib.exe File opened for modification C:\Windows\servicing\Packages\Package_for_KB2731771~31bf3856ad364e35~amd64~~6.1.1.1.cat attrib.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.Access attrib.exe File opened for modification C:\Windows\diagnostics\scheduled\Maintenance\RS_AdminDiagnosticHistory.ps1 attrib.exe File opened for modification C:\Windows\inf\prnca00i.PNF attrib.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.DataVisualization.Design\v4.0_4.0.0.0__31bf3856ad364e35 attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.5\es\Microsoft.Build.Tasks.v3.5.resources.dll attrib.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-Shell-HomeGroup-Package~31bf3856ad364e35~amd64~es-ES~6.1.7601.17514.cat attrib.exe File opened for modification C:\Windows\Help\Windows\es-ES\Windows_SubjectTerm.H1K attrib.exe File opened for modification C:\Windows\inf\netloop.inf attrib.exe File opened for modification C:\Windows\inf\prnlx003.PNF attrib.exe File opened for modification C:\Windows\inf\rawsilo.PNF attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\AppConfig\App_LocalResources\AppSetting.ascx.ja.resx attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Roles\manageAllRoles.aspx attrib.exe File opened for modification C:\Windows\PLA\Rules\it-IT\Rules.System.CPU.xml attrib.exe File opened for modification C:\Windows\inf\prnhp004.PNF attrib.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Collections.Specialized attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\1036\cscompui.dll attrib.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Data.Linq attrib.exe File opened for modification C:\Windows\inf\averhbh826_noaverir_x64.PNF attrib.exe File opened for modification C:\Windows\inf\aspnet_state\0008\aspnet_state_perf.ini attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ShFusRes.dll attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\fr\System.Web.Resources.dll attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\DefineErrorPage.aspx attrib.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-Printer-Drivers-Package~31bf3856ad364e35~amd64~es-ES~6.1.7601.17514.mum attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Build.dll attrib.exe File opened for modification C:\Windows\Media\Characters\Windows Ding.wav attrib.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-DownlevelApisets-Shell-WinIP-Package~31bf3856ad364e35~amd64~lv-LV~7.1.7601.16492.mum attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe attrib.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-IIS-WebServer-AddOn-2-Package~31bf3856ad364e35~amd64~ja-JP~6.1.7601.17514.cat attrib.exe File opened for modification C:\Windows\assembly\GAC_MSIL\napinit.resources attrib.exe File opened for modification C:\Windows\PolicyDefinitions\en-US\Explorer.adml attrib.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-DownlevelApisets-WinIP-Package~31bf3856ad364e35~amd64~da-DK~7.1.7601.16492.mum attrib.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationCore.resources\3.0.0.0_fr_31bf3856ad364e35 attrib.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.SqlServerCe\3.5.1.0__89845dcd8080cc91 attrib.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Fra# attrib.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Wind412bbddf#\dac48ed7852587d900eb9e2eb8fdf32b attrib.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Wind0de890be#\5bf4243eccd10a06c3d5086c8a884165\System.Windows.Forms.DataVisualization.ni.dll attrib.exe File opened for modification C:\Windows\inf\prnky009.inf attrib.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio84a6349c#\d7f5c5b7ad6ae9510514a279c1cb5665\PresentationFramework-SystemCore.ni.dll attrib.exe File opened for modification C:\Windows\inf\Windows Workflow Foundation 4.0.0.0\0007\PerfCounters.ini attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.5\AddInUtil.exe attrib.exe File opened for modification C:\Windows\PolicyDefinitions\es-ES\RPC.adml attrib.exe File opened for modification C:\Windows\Prefetch\SETUPUGC.EXE-E3C49C28.pf attrib.exe File opened for modification C:\Windows\assembly\GAC_64\Microsoft.Interop.Security.AzRoles\2.0.0.0__31bf3856ad364e35\Microsoft.Interop.Security.AzRoles.dll attrib.exe File opened for modification C:\Windows\Help\Windows\fr-FR\pwrmgm.h1s attrib.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.InteropServices.WindowsRuntime\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Runtime.InteropServices.WindowsRuntime.dll attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\Security\App_LocalResources\setUpAuthentication.aspx.it.resx attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Workflow Foundation\SQL\ja attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\ComSvcConfig.exe attrib.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.WorkflowServices.resources\3.5.0.0_ja_31bf3856ad364e35 attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2028 1008 WerFault.exe 51 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360TS_Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 360TS_Setup.exe -
Delays execution with timeout.exe 9 IoCs
pid Process 804 timeout.exe 548 timeout.exe 2080 timeout.exe 3380 timeout.exe 2840 timeout.exe 2244 timeout.exe 2064 timeout.exe 2620 timeout.exe 1668 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3272 vssadmin.exe -
Kills process with taskkill 64 IoCs
pid Process 2176 taskkill.exe 2516 taskkill.exe 1748 taskkill.exe 1132 taskkill.exe 2452 taskkill.exe 2256 taskkill.exe 1924 taskkill.exe 2064 taskkill.exe 2144 taskkill.exe 2536 taskkill.exe 2688 taskkill.exe 1736 taskkill.exe 3516 taskkill.exe 3980 taskkill.exe 3716 taskkill.exe 2184 taskkill.exe 2144 taskkill.exe 2812 taskkill.exe 1572 taskkill.exe 2392 taskkill.exe 1992 taskkill.exe 2668 taskkill.exe 3660 taskkill.exe 2516 taskkill.exe 1424 taskkill.exe 2764 taskkill.exe 904 taskkill.exe 1772 taskkill.exe 2332 taskkill.exe 3292 taskkill.exe 4504 taskkill.exe 2276 taskkill.exe 1756 taskkill.exe 752 taskkill.exe 2996 taskkill.exe 3304 taskkill.exe 800 taskkill.exe 2536 taskkill.exe 1840 taskkill.exe 2904 taskkill.exe 1844 taskkill.exe 2188 taskkill.exe 1992 taskkill.exe 684 taskkill.exe 3208 taskkill.exe 4080 taskkill.exe 2140 taskkill.exe 2936 taskkill.exe 1884 taskkill.exe 1920 taskkill.exe 3800 taskkill.exe 1640 taskkill.exe 2364 taskkill.exe 2908 taskkill.exe 2240 taskkill.exe 2212 taskkill.exe 3244 taskkill.exe 2960 taskkill.exe 1776 taskkill.exe 3984 taskkill.exe 3024 taskkill.exe 956 taskkill.exe 1640 taskkill.exe 2744 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main pixelsee.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch pixelsee.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" pixelsee.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Download win7recovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" win7recovery.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\GDIPlus net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing net_updater32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates net_updater32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\GDIPlus\FontCachePath = "C:\\Windows\\system32\\config\\systemprofile\\AppData\\Local" net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs net_updater32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs net_updater32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{00FC221C-108B-4A53-884F-3AC1B036FA65}\ = "MyFontInstallerObject" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\GroupByKey:PID = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac04000000c8000000354b179bff40d211a27e00c04fc308710300000080000000354b179bff40d211a27e00c04fc308710200000080000000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{00FA5C55-FD1B-404C-BF09-2191508D2A65}\2.2\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00FC221C-108B-4A53-884F-3AC1B036FA65}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.m2v\ pixelsee.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.vob\ pixelsee.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.flv pixelsee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HighLogic.FontCreator.Font\shell\open\command\ = "\"C:\\Program Files (x86)\\High-Logic FontCreator\\FontCreator.exe\" \"%1\"" fontcreator.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.woff\OpenWithProgids\HighLogic.FontCreator.Font fontcreator.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00FC221C-108B-4A53-884F-3AC1B036FA65}\Version\ = "2.2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00FC221C-108B-4A53-884F-3AC1B036FA65}\TypeLib regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.m2ts\ pixelsee.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.m2v pixelsee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.fcp\OpenWithProgids\HighLogic.FontCreator.Project fontcreator.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.woff2 fontcreator.tmp Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\Cleanup\Icon = "\"C:\\Program Files (x86)\\360\\Total Security\\QHSafeMain.exe\",0" 360TS_Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{00FA5C55-FD1B-404C-BF09-2191508D2A65} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{00FC221C-108B-4A53-884F-3AC1B036FA65}\DllSurrogate regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.ogv\ pixelsee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00FB9B33-BA33-498E-AE8A-6AAE0BF22865}\ = "IMyFontInstallerObject" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00FC221C-108B-4A53-884F-3AC1B036FA65}\InprocServer32\ = "C:\\Windows\\SysWOW64\\FontInstaller2.dll" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.3g2 pixelsee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{00FA5C55-FD1B-404C-BF09-2191508D2A65}\2.2\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00FC221C-108B-4A53-884F-3AC1B036FA65}\LocalizedString = "@C:\\Windows\\SysWOW64\\FontInstaller2.dll,-101" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FontInstaller2.MyFontInstallerObject\ = "MyFontInstallerObject" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.m1v\ pixelsee.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.3gp pixelsee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\FontInstaller2.dll\AppID = "{00FC221C-108B-4A53-884F-3AC1B036FA65}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00FC221C-108B-4A53-884F-3AC1B036FA65}\AppID = "{00FC221C-108B-4A53-884F-3AC1B036FA65}" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.mkv\ pixelsee.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.3g2\ pixelsee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{00FA5C55-FD1B-404C-BF09-2191508D2A65}\2.2\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00FB9B33-BA33-498E-AE8A-6AAE0BF22865}\TypeLib regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00FC221C-108B-4A53-884F-3AC1B036FA65}\Elevation\Enabled = "1" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.mpg\ pixelsee.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.mov pixelsee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HighLogic.FontCreator.Project\shell\open\command fontcreator.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HighLogic.FontCreator.Font fontcreator.tmp Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.wmv pixelsee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00FC221C-108B-4A53-884F-3AC1B036FA65}\ = "MyFontInstallerObject" regsvr32.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4752 reg.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 walliant.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 0f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47420000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 net_updater32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 QHActiveDefense.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 luminati-m-controller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 walliant.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 walliant.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F8DB7E1C16F1FFD4AAAD4AAD8DFF0F2445184AEB\Blob = 5c000000010000000400000000100000030000000100000014000000f8db7e1c16f1ffd4aaad4aad8dff0f2445184aeb190000000100000010000000fdf830131f605511d717ae8f24143eea1400000001000000140000008570009f77591e8cac3c9f77262819cc9ac18f320f0000000100000020000000ed55f82e1444f79ca9dce826846fdc4e0ea3859e3d26efef412d2fff0c7c8e6c040000000100000010000000e0e22b8b045e62f1b233ee948b8f091520000000010000000906000030820605308203eda0030201020210078f0a9d03df119e434e4fec1bf0235a300d06092a864886f70d01010b0500308194310b3009060355040613025553311330110603550408130a57617368696e67746f6e3110300e060355040713075265646d6f6e64311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e313e303c060355040313354d6963726f736f667420446576656c6f706d656e7420526f6f7420436572746966696361746520417574686f726974792032303134301e170d3134303532383136343334365a170d3339303532383136353134385a308194310b3009060355040613025553311330110603550408130a57617368696e67746f6e3110300e060355040713075265646d6f6e64311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e313e303c060355040313354d6963726f736f667420446576656c6f706d656e7420526f6f7420436572746966696361746520417574686f72697479203230313430820222300d06092a864886f70d01010105000382020f003082020a0282020100c20f7f6d49bb39f04d943fe8fb4dc5eb3be1285ab9892a467ea5c333271d82893feb33a1876aeae882b9dac39d77d135c0cb833672a6571912bc15e2c83c7b83623414d5abb6de368ba15a71a65196a70633b3221d146253c2a5af9a40cabe2c485499e72a9368a769190b99693bc1b2acae94dc5fab7e02cade3ca774a68c10a0e5aeb69c35ef838b10e5972aba916b9a6a4595d9d054718e653fc48a53ca1e38470ae9d04184a5da1e66016504e6505b7735f5b42e29320cc6bf5f61ee3220b77c39f911faff605efec669f46f1e1ded1d06e7651e9a112e6344065f31431733e9a32682d44b83124fd2a126032548e13abd84f58ad5b46e1ae871200e45530167ade31e6be8b2e4abfdf53b8eba67af5984cc5c75d09daa5c72c42636a2ac324c6ab1f8331744d2a77d70eeeb70949abceaba1c104b635b38ddd2254504b2f0b35a7c0b0a8e21406437114d96694533e493839ef9b3b51c2b0571ea6dcce748b6b6de805010ca4938b35905704ebd9e880222586489eb40dab12d2d6a40885d23c33ed0f5d5b7908a28543962a2c5c6b1bf74cd8695f9456bccf207eaac5cd336f7a27ab5b472532a063ec337945858b14a71bb5ccd9cb2af109ad943363e528519e7422891118c8ce7bbdfe6c855087375f3960d86b7d2e506b2c08a54a86177207d6cd1feba68f3454aaf1184eb867d2f04f354ea20ffd5db3d250270870203010001a351304f300b0603551d0f040403020186300f0603551d130101ff040530030101ff301d0603551d0e041604148570009f77591e8cac3c9f77262819cc9ac18f32301006092b06010401823715010403020100300d06092a864886f70d01010b050003820201004f2574bd1f624f5f0ff74222d7d1d65304232ec5d5d7072b6b793b5f6d90ed1355d382f1f5028f3ef996267e0d421876fc6055825a86bd113339690fcee0b02bf15d19dfd8d2fa86a4cccdacf0d0ae9a8b2b248f03c1350d20b3dfc742ea77292e0a12fc0b1a458dd931840d8d02c0acfad212bf1e6a343eea8300a348754e72662da1a5129f37a85d4a7759cfd63afc30c5a609a5bfb108e3fb2c9f76c4fb4e611d6d23f3766985eb49bb0df73dd0aa05bcdd3d6e80445ed99a68ecc989c7e61a18f860a0e78cf6e6516f0ee025b863f9f9c20b8c3c9cb2f042cdbec3f5fe4929559c5e8696fba1ed6d2686e8b8208b5cc6e72d31c5aaca7d4b7da059a41efb5071e9afcfd6aa0d99de8e95269731a5f47f6df46815b8e3f7add8efd13875025ffd6d4efcb6fc2f451ba9cad11e7aff75181536c120e45f483a95eb7be4f5f6f4fec94b21a2a9ea8a9925cbe8444090d539b46b239b52bcc0c17e17666e650bf5741596a866ed856854b224e87588644589853c7a656b96e0f259ea4725660f6a1b0c3fd44ae64b26174709fed4d7b8e0cee72f94ad808b6770ccb77bcf1b2bb9d15bbdb8035cb1f01b412ce6535516e74a0e41089937e2a9d76d0e6a45e5ece388a9fdb69bc32820ceabc2936b516553bfa05e7b9d26349a514c8ca638d5865b3c55ee50ec000bcaacdcca10abdf189bd2ac0c8d084515af8535355ae526bc PowerSaver.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 net_updater32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates\F8DB7E1C16F1FFD4AAAD4AAD8DFF0F2445184AEB PowerSaver.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 QHActiveDefense.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F8F364FE1589744215987A52A9AD06995267FB5\Blob = 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 QHActiveDefense.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8F43288AD272F3103B6FB1428485EA3014C0BCFE QHActiveDefense.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 luminati-m-controller.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa20f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349040000000100000010000000497904b0eb8719ac47b0bc11519b74d0200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e luminati-m-controller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 QHActiveDefense.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 QHActiveDefense.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 walliant.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 QHActiveDefense.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 walliant.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 net_updater32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad190000000100000010000000d0fd3c9c380d7b65e26b9a3fedd39b8f1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc0f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab040000000100000010000000c5dfb849ca051355ee2dba1ac33eb0282000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f QHActiveDefense.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 net_updater32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 net_updater32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 walliant.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 QHActiveDefense.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD QHActiveDefense.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8F43288AD272F3103B6FB1428485EA3014C0BCFE\Blob = 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 QHActiveDefense.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 walliant.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 walliant.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 walliant.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F8F364FE1589744215987A52A9AD06995267FB5 QHActiveDefense.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 luminati-m-controller.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 walliant.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\lum_sdk_session_id:LUM:$DATA luminati-m-controller.exe -
Runs regedit.exe 2 IoCs
pid Process 1140 regedit.exe 5340 regedit.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 49 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2204 pixelsee.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 1192 win7recovery.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 1192 win7recovery.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 1192 win7recovery.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 1192 win7recovery.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 1192 win7recovery.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 1192 win7recovery.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 1192 win7recovery.exe 1192 win7recovery.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 1192 win7recovery.exe 1192 win7recovery.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 1192 win7recovery.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 2708 pixelsee.exe 1192 win7recovery.exe 1192 win7recovery.exe 2148 WbVhxCIDDK.exe 2148 WbVhxCIDDK.exe 2708 pixelsee.exe 2708 pixelsee.exe 1192 win7recovery.exe 1192 win7recovery.exe 2708 pixelsee.exe 2708 pixelsee.exe 2708 pixelsee.exe 2708 pixelsee.exe 2708 pixelsee.exe 2708 pixelsee.exe 2708 pixelsee.exe 2708 pixelsee.exe 2708 pixelsee.exe 2708 pixelsee.exe 2148 WbVhxCIDDK.exe -
Suspicious behavior: GetForegroundWindowSpam 9 IoCs
pid Process 672 cmd.exe 2852 walliant.tmp 3816 explorer.exe 4536 explorer.exe 1192 win7recovery.exe 1280 qtranslate.exe 2680 charmap.exe 828 fontcreator.tmp 2204 pixelsee.exe -
Suspicious behavior: LoadsDriver 7 IoCs
pid Process 464 Process not Found 464 Process not Found 4212 360TS_Setup.exe 4212 360TS_Setup.exe 464 Process not Found 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2984 taskmgr.exe Token: SeDebugPrivilege 2516 taskkill.exe Token: SeDebugPrivilege 1840 taskkill.exe Token: SeDebugPrivilege 1956 taskkill.exe Token: SeShutdownPrivilege 956 shutdown.exe Token: SeRemoteShutdownPrivilege 956 shutdown.exe Token: SeDebugPrivilege 2904 taskkill.exe Token: SeDebugPrivilege 2408 taskkill.exe Token: SeDebugPrivilege 2648 taskkill.exe Token: SeDebugPrivilege 2144 taskkill.exe Token: SeDebugPrivilege 2528 taskkill.exe Token: SeDebugPrivilege 1228 taskkill.exe Token: SeDebugPrivilege 2080 taskkill.exe Token: SeDebugPrivilege 2188 taskkill.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 2516 taskkill.exe Token: SeDebugPrivilege 1148 taskkill.exe Token: SeDebugPrivilege 1640 taskkill.exe Token: SeDebugPrivilege 2276 taskkill.exe Token: SeDebugPrivilege 2348 taskkill.exe Token: SeDebugPrivilege 1748 taskkill.exe Token: SeShutdownPrivilege 2732 shutdown.exe Token: SeRemoteShutdownPrivilege 2732 shutdown.exe Token: SeDebugPrivilege 2144 taskkill.exe Token: SeDebugPrivilege 2804 taskkill.exe Token: SeDebugPrivilege 684 taskkill.exe Token: SeDebugPrivilege 3000 taskkill.exe Token: SeDebugPrivilege 2368 taskkill.exe Token: SeDebugPrivilege 2284 taskkill.exe Token: SeDebugPrivilege 1924 taskkill.exe Token: SeDebugPrivilege 1040 taskkill.exe Token: SeDebugPrivilege 2140 taskkill.exe Token: SeDebugPrivilege 2936 taskkill.exe Token: SeDebugPrivilege 2072 taskkill.exe Token: SeDebugPrivilege 1132 taskkill.exe Token: SeDebugPrivilege 2968 taskkill.exe Token: SeDebugPrivilege 2352 taskkill.exe Token: SeDebugPrivilege 544 taskkill.exe Token: SeDebugPrivilege 2960 taskkill.exe Token: SeDebugPrivilege 2392 taskkill.exe Token: SeDebugPrivilege 932 taskkill.exe Token: SeDebugPrivilege 2388 taskkill.exe Token: SeDebugPrivilege 2928 taskkill.exe Token: SeDebugPrivilege 2364 taskkill.exe Token: SeDebugPrivilege 2936 taskkill.exe Token: SeDebugPrivilege 2096 taskkill.exe Token: SeDebugPrivilege 2452 taskkill.exe Token: SeDebugPrivilege 2520 taskkill.exe Token: SeDebugPrivilege 1992 taskkill.exe Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 1424 taskkill.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeDebugPrivilege 1756 taskkill.exe Token: SeDebugPrivilege 1772 taskkill.exe Token: SeDebugPrivilege 2256 taskkill.exe Token: SeDebugPrivilege 1076 taskkill.exe Token: SeDebugPrivilege 972 taskkill.exe Token: SeDebugPrivilege 1144 taskkill.exe Token: SeDebugPrivilege 2172 taskkill.exe Token: SeDebugPrivilege 1748 taskkill.exe Token: SeDebugPrivilege 2340 taskkill.exe Token: SeDebugPrivilege 3024 taskkill.exe Token: SeDebugPrivilege 1832 taskkill.exe Token: SeDebugPrivilege 1144 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2052 jokewarehydra.exe 2052 jokewarehydra.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 828 fontcreator.tmp 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4636 @[email protected] 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 2984 taskmgr.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe 4536 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2708 pixelsee.exe 2708 pixelsee.exe 2380 mspaint.exe 2380 mspaint.exe 2380 mspaint.exe 2380 mspaint.exe 3508 @[email protected] 3960 @[email protected] 3960 @[email protected] 3508 @[email protected] 3816 explorer.exe 3816 explorer.exe 3816 explorer.exe 3816 explorer.exe 3816 explorer.exe 3816 explorer.exe 4636 @[email protected] 4636 @[email protected] 1496 @[email protected] 2204 pixelsee.exe 4584 FontCreator.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 4064 @[email protected] 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 4584 FontCreator.exe 4584 FontCreator.exe 4584 FontCreator.exe 4584 FontCreator.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 4584 FontCreator.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe 2204 pixelsee.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2776 2400 yfga_game.exe 29 PID 2400 wrote to memory of 2776 2400 yfga_game.exe 29 PID 2400 wrote to memory of 2776 2400 yfga_game.exe 29 PID 2400 wrote to memory of 2776 2400 yfga_game.exe 29 PID 2776 wrote to memory of 2964 2776 cmd.exe 31 PID 2776 wrote to memory of 2964 2776 cmd.exe 31 PID 2776 wrote to memory of 2964 2776 cmd.exe 31 PID 2776 wrote to memory of 2964 2776 cmd.exe 31 PID 2776 wrote to memory of 2896 2776 cmd.exe 32 PID 2776 wrote to memory of 2896 2776 cmd.exe 32 PID 2776 wrote to memory of 2896 2776 cmd.exe 32 PID 2776 wrote to memory of 2896 2776 cmd.exe 32 PID 2776 wrote to memory of 2336 2776 cmd.exe 33 PID 2776 wrote to memory of 2336 2776 cmd.exe 33 PID 2776 wrote to memory of 2336 2776 cmd.exe 33 PID 2776 wrote to memory of 2336 2776 cmd.exe 33 PID 2776 wrote to memory of 2936 2776 cmd.exe 34 PID 2776 wrote to memory of 2936 2776 cmd.exe 34 PID 2776 wrote to memory of 2936 2776 cmd.exe 34 PID 2776 wrote to memory of 2936 2776 cmd.exe 34 PID 2776 wrote to memory of 2644 2776 cmd.exe 35 PID 2776 wrote to memory of 2644 2776 cmd.exe 35 PID 2776 wrote to memory of 2644 2776 cmd.exe 35 PID 2776 wrote to memory of 2644 2776 cmd.exe 35 PID 2776 wrote to memory of 2660 2776 cmd.exe 36 PID 2776 wrote to memory of 2660 2776 cmd.exe 36 PID 2776 wrote to memory of 2660 2776 cmd.exe 36 PID 2776 wrote to memory of 2660 2776 cmd.exe 36 PID 2776 wrote to memory of 2756 2776 cmd.exe 37 PID 2776 wrote to memory of 2756 2776 cmd.exe 37 PID 2776 wrote to memory of 2756 2776 cmd.exe 37 PID 2776 wrote to memory of 2756 2776 cmd.exe 37 PID 2776 wrote to memory of 2840 2776 cmd.exe 38 PID 2776 wrote to memory of 2840 2776 cmd.exe 38 PID 2776 wrote to memory of 2840 2776 cmd.exe 38 PID 2776 wrote to memory of 2840 2776 cmd.exe 38 PID 2776 wrote to memory of 1228 2776 cmd.exe 40 PID 2776 wrote to memory of 1228 2776 cmd.exe 40 PID 2776 wrote to memory of 1228 2776 cmd.exe 40 PID 2776 wrote to memory of 1228 2776 cmd.exe 40 PID 2776 wrote to memory of 2916 2776 cmd.exe 41 PID 2776 wrote to memory of 2916 2776 cmd.exe 41 PID 2776 wrote to memory of 2916 2776 cmd.exe 41 PID 2776 wrote to memory of 2916 2776 cmd.exe 41 PID 2776 wrote to memory of 1876 2776 cmd.exe 43 PID 2776 wrote to memory of 1876 2776 cmd.exe 43 PID 2776 wrote to memory of 1876 2776 cmd.exe 43 PID 2776 wrote to memory of 1876 2776 cmd.exe 43 PID 2776 wrote to memory of 1876 2776 cmd.exe 43 PID 2776 wrote to memory of 1876 2776 cmd.exe 43 PID 2776 wrote to memory of 1876 2776 cmd.exe 43 PID 2776 wrote to memory of 2420 2776 cmd.exe 44 PID 2776 wrote to memory of 2420 2776 cmd.exe 44 PID 2776 wrote to memory of 2420 2776 cmd.exe 44 PID 2776 wrote to memory of 2420 2776 cmd.exe 44 PID 1228 wrote to memory of 2052 1228 cmd.exe 45 PID 1228 wrote to memory of 2052 1228 cmd.exe 45 PID 1228 wrote to memory of 2052 1228 cmd.exe 45 PID 1228 wrote to memory of 2052 1228 cmd.exe 45 PID 2776 wrote to memory of 2292 2776 cmd.exe 46 PID 2776 wrote to memory of 2292 2776 cmd.exe 46 PID 2776 wrote to memory of 2292 2776 cmd.exe 46 PID 2776 wrote to memory of 2292 2776 cmd.exe 46 PID 1228 wrote to memory of 1324 1228 cmd.exe 47 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System win7recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" win7recovery.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 10 IoCs
pid Process 3748 attrib.exe 3680 attrib.exe 3164 attrib.exe 5928 attrib.exe 5880 attrib.exe 4388 attrib.exe 4140 attrib.exe 4944 attrib.exe 5884 attrib.exe 5868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\yfga_game.exe"C:\Users\Admin\AppData\Local\Temp\yfga_game.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\YFGA.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskManager" /t REG_DWORD /d 13⤵PID:2964
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\screenscrew.exescreenscrew.exe3⤵
- Executes dropped EXE
PID:2896
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\flasher.exeflasher.exe3⤵
- Executes dropped EXE
PID:2336
-
-
C:\Windows\SysWOW64\takeown.exetakeown C:\Windows\System32\logonui.exe Admin3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2936
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\logonui.exe Grant:\Admin3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2644
-
-
C:\Windows\SysWOW64\takeown.exetakeown C:\Windows\System32\calc.exe Admin3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2660
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\calc.exe Grant:\Admin3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2756
-
-
C:\Windows\SysWOW64\xcopy.exexcopy calc.exe C:\Windows\System32\calc.exe /-y3⤵
- Enumerates system info in registry
PID:2840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K hydra.cmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\jokewarehydra.exejokewarehydra.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2052
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy3.vbs"4⤵PID:1324
-
-
-
C:\Windows\SysWOW64\takeown.exetakeown C:\Windows\Boot\Fonts\* Admin3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2916
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\walliant.exewalliant.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\is-TFNE9.tmp\walliant.tmp"C:\Users\Admin\AppData\Local\Temp\is-TFNE9.tmp\walliant.tmp" /SL5="$30176,4511977,830464,C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\walliant.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
PID:2852 -
C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe"C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1188
-
-
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\Boot\Fonts\* Grant:\Admin3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2420
-
-
C:\Windows\SysWOW64\xcopy.exexcopy C:\Windows\Fonts\seguisym.ttf C:\Windows\Boot\Fonts\segoe_slboot.ttf /-y3⤵
- Enumerates system info in registry
PID:2292
-
-
C:\Windows\SysWOW64\reg.exereg import reg.reg3⤵
- Sets desktop wallpaper using registry
PID:1844
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\YouAreAnIdiot.exeyouareanidiot.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 8684⤵
- Loads dropped DLL
- Program crash
PID:2028
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im fontdrvhost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TextInputhost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:804
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r /t 30000 /c "HAHA I HACKED YOU AYFGA ROCKS YOU"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K spam.bat "forkbomb" /min3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2768
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1596
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1264
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:904
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2540
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1636
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2184
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2592
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1796
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2124
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:768
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1836
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1264
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2332
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2768
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2024
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2712
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:892
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:636
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2644
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2748
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:548
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1384
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2664
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2568
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2188
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2892
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:1840
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1756
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:2688
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2096
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:584
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2976
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:2804
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2984
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:2184
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2112
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:2032
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:972
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:2144
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2032
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:2328
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2244
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:2536
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1228
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:1588
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:872
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:2840
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2412
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:1568
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2528
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:2224
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:876
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:1776
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:756
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:1844
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2820
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:1640
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2640
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:2064
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2236
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:2744
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:544
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:932
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1588
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:1736
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2728
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:2176
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1492
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:1036
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1520
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:2324
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2268
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:1684
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2892
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:2940
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1036
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:1920
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1576
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:2116
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1776
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:2056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:3244
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:3548
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:3660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:3800
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:3884
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:3984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:4028
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:1636
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:1604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:3208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:3292
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:3384
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:3516
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:3604
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:3728
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:3872
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:3980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:4080
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2996
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:3196
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:3328
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:3716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵PID:3960
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:2288
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:3304
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:3480
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
PID:1572
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy2.vbs"4⤵PID:3448
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\annoy.vbs"4⤵PID:3844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3764
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:548
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /a3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:2840
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\win7recovery.exewin7recovery.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:1192 -
C:\ProgramData\WbVhxCIDDK.exe"C:\ProgramData\WbVhxCIDDK.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\*.* " /s /d5⤵
- Views/modifies file attributes
PID:4388
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\ProgramData\Microsoft\Windows\Start Menu\*.* " /s /d5⤵
- Views/modifies file attributes
PID:4140
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\*.*" /s /d5⤵
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Views/modifies file attributes
PID:4944
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "F:\*.*" /s /d5⤵
- Views/modifies file attributes
PID:3164
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\*.* " /s /d5⤵
- Views/modifies file attributes
PID:5884
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\ProgramData\Microsoft\Windows\Start Menu\*.* " /s /d5⤵
- Views/modifies file attributes
PID:5868
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\*.*" /s /d5⤵
- Views/modifies file attributes
PID:5880
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "F:\*.*" /s /d5⤵
- Views/modifies file attributes
PID:5928
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WScript.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Windows\SysWOW64\timeout.exetimeout 123⤵
- Delays execution with timeout.exe
PID:2244
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
PID:752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵PID:824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WScript.exe3⤵PID:1568
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /a3⤵PID:552
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K bloatware.cmd3⤵
- Loads dropped DLL
PID:2316 -
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\bloatware\bewidgets.exebewidgets.exe4⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2432 -s 6325⤵PID:2504
-
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\bloatware\OperaSetup.exeoperasetup.exe4⤵
- Executes dropped EXE
PID:660 -
C:\Users\Admin\AppData\Local\Temp\7zS492816A9\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS492816A9\setup.exe --server-tracking-blob=OWZlZmU2ZDE2MTJkY2VkOTEwNWJjMDI1ZWYxYjdlMWExZTZmYTNkMGM4MDNlZTRhNjJmMzNjZDE2MmU2YmExODp7ImNvdW50cnkiOiJSVSIsImh0dHBfcmVmZXJyZXIiOiJodHRwczovL3F0cmFuc2xhdGUuc29mdG9uaWMucnUvIiwiaW5zdGFsbGVyX25hbWUiOiJPcGVyYVNldHVwLmV4ZSIsInByb2R1Y3QiOiJvcGVyYSIsInF1ZXJ5IjoiL29wZXJhL3N0YWJsZS93aW5kb3dzP3V0bV9zb3VyY2U9c29mdG9uaWMmdXRtX21lZGl1bT1hcGImdXRtX2NhbXBhaWduPUNQSV9XSU4iLCJ0aW1lc3RhbXAiOiIxNzIxMDM1NDc4Ljk3MTUiLCJ1c2VyYWdlbnQiOiJNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBXaW42NDsgeDY0KSBBcHBsZVdlYktpdC81MzcuMzYgKEtIVE1MLCBsaWtlIEdlY2tvKSBDaHJvbWUvMTI2LjAuMC4wIFNhZmFyaS81MzcuMzYiLCJ1dG0iOnsiY2FtcGFpZ24iOiJDUElfV0lOIiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoic29mdG9uaWMifSwidXVpZCI6IjhmZGNiNGU2LTgxMTQtNGJmOC1hYWMxLWZmNTFiMDRhYWU5YiJ95⤵
- Executes dropped EXE
PID:1852
-
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\bloatware\pixelsee.exepixelsee.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\luminati\lum_inst.exe"C:\Users\Admin\AppData\Local\Temp\luminati\lum_inst.exe" /verysilent5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\is-P6PN7.tmp\lum_inst.tmp"C:\Users\Admin\AppData\Local\Temp\is-P6PN7.tmp\lum_inst.tmp" /SL5="$408BE,5681168,832512,C:\Users\Admin\AppData\Local\Temp\luminati\lum_inst.exe" /verysilent6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4264 -
C:\Users\Admin\PixelSee\Luminati-m\luminati-m-controller.exe"C:\Users\Admin\PixelSee\Luminati-m\luminati-m-controller.exe" switch_on7⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- NTFS ADS
PID:2980 -
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\test_wpf.exeC:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\test_wpf.exe8⤵
- Executes dropped EXE
PID:4284
-
-
C:\Users\Admin\PixelSee\Luminati-m\net_updater32.exe"C:\Users\Admin\PixelSee\Luminati-m\net_updater32.exe" --install win_pixelsee.app --no-cleanup8⤵
- Executes dropped EXE
PID:3296
-
-
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="PixelSee" dir=in action=allow program="C:\Users\Admin\pixelsee\pixelsee.exe"5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4956
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="PixelSee" dir=in action=allow program="C:\Users\Admin\pixelsee\qtwebengineprocess.exe"5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4868
-
-
C:\Users\Admin\PixelSee\pixelsee.exe"C:\Users\Admin\PixelSee\pixelsee.exe" --installer5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Users\Admin\PixelSee\pixelsee_crashpad_handler.exeC:\Users\Admin\PixelSee\pixelsee_crashpad_handler.exe --no-rate-limit "--database=C:\Users\Admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps" "--metrics-dir=C:\Users\Admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps" --url=https://o612922.ingest.sentry.io:443/api/6420364/minidump/?sentry_client=sentry.native/0.4.6&sentry_key=297ce3230e5f4bcf957dbf23e9597dc9 "--attachment=C:/Users/Admin/AppData/Local/PixelSee LLC/PixelSee/crashdumps/logs/log" "--attachment=C:\Users\Admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\e2b2601a-b16a-4ec1-3d4a-1e201d00c9eb.run\__sentry-event" "--attachment=C:\Users\Admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\e2b2601a-b16a-4ec1-3d4a-1e201d00c9eb.run\__sentry-breadcrumb1" "--attachment=C:\Users\Admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\e2b2601a-b16a-4ec1-3d4a-1e201d00c9eb.run\__sentry-breadcrumb2" --initial-client-data=0x3e8,0x3ec,0x3f0,0x3bc,0x3f4,0x6b597b7c,0x6b597b90,0x6b597ba06⤵
- Executes dropped EXE
PID:4276
-
-
C:\Users\Admin\PixelSee\Luminati-m\luminati-m-controller.exeC:\Users\Admin\PixelSee\Luminati-m\luminati-m-controller.exe is_switch_on6⤵
- Checks computer location settings
- Executes dropped EXE
PID:2100 -
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\test_wpf.exeC:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\test_wpf.exe7⤵PID:2928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\opera\opera_binst.exe"C:\Users\Admin\AppData\Local\Temp\opera\opera_binst.exe" --silent --allusers=05⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\7zS0571DC6B\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS0571DC6B\setup.exe --silent --allusers=0 --server-tracking-blob=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6⤵
- Executes dropped EXE
PID:3704
-
-
-
C:\Users\Admin\AppData\Local\Temp\antivirus360\antivirus360.exe"C:\Users\Admin\AppData\Local\Temp\antivirus360\antivirus360.exe" /s5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\antivirus360\360TS_Setup.exe"C:\Users\Admin\AppData\Local\Temp\antivirus360\360TS_Setup.exe" /c:WW.Mediaget.CPI202309 /pmode:2 /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo= /s6⤵
- Executes dropped EXE
PID:3204 -
C:\Program Files (x86)\1721037684_0\360TS_Setup.exe"C:\Program Files (x86)\1721037684_0\360TS_Setup.exe" /c:WW.Mediaget.CPI202309 /pmode:2 /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo= /s /TSinstall7⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks for any installed AV software in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: LoadsDriver
PID:4212 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\Total Security\MenuEx64.dll"8⤵PID:1704
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\360\Total Security\MenuEx64.dll"9⤵PID:6448
-
-
-
C:\Program Files (x86)\360\Total Security\Utils\PowerSaver.exe"C:\Program Files (x86)\360\Total Security\Utils\PowerSaver.exe" /flightsigning8⤵
- Executes dropped EXE
- Modifies system certificate store
PID:6300
-
-
C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe"C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe" /install8⤵
- Executes dropped EXE
- Modifies system certificate store
PID:6416
-
-
C:\Program Files (x86)\360\Total Security\modules\KB931125-rootsupd.exe"C:\Program Files (x86)\360\Total Security\modules\KB931125-rootsupd.exe"8⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe authroots.sst9⤵PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe updroots.sst9⤵PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe -l roots.sst9⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe -d delroots.sst9⤵PID:1968
-
-
-
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1668
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\bloatware\qtranslate.exeqtranslate.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1280 -
C:\Program Files (x86)\QTranslate\QTranslate.exe"C:\Program Files (x86)\QTranslate\QTranslate.exe"5⤵
- Executes dropped EXE
PID:4732
-
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\bloatware\iconchanger.exeiconchanger.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Install.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Install.exe5⤵
- Executes dropped EXE
PID:2116
-
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\bloatware\fontcreator.exefontcreator.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\is-M314E.tmp\fontcreator.tmp"C:\Users\Admin\AppData\Local\Temp\is-M314E.tmp\fontcreator.tmp" /SL5="$203DE,25472296,840192,C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\bloatware\fontcreator.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:828 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\FontInstaller2.dll"6⤵
- Loads dropped DLL
- Modifies registry class
PID:4088
-
-
C:\Program Files (x86)\High-Logic FontCreator\FontCreator.exe"C:\Program Files (x86)\High-Logic FontCreator\FontCreator.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
-
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\useroverflow.exeuseroverflow.exe3⤵
- Executes dropped EXE
PID:1540
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\programoverflow.exeprogramoverflow.exe3⤵
- Executes dropped EXE
PID:2488
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:2196
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe3⤵
- Runs regedit.exe
PID:1140
-
-
C:\Windows\SysWOW64\mspaint.exemspaint.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:2380
-
-
C:\Windows\SysWOW64\charmap.execharmap.exe3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2680
-
-
C:\Windows\SysWOW64\timeout.exetimeout 213⤵
- Delays execution with timeout.exe
PID:2080
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3360
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\wannacryptor.exewannacryptor.exe3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
PID:3372 -
C:\Windows\SysWOW64\attrib.exeattrib +h .4⤵
- Views/modifies file attributes
PID:3748
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3744
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:3208
-
-
C:\Windows\SysWOW64\cmd.execmd /c 68311721037521.bat4⤵PID:3596
-
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs5⤵
- Loads dropped DLL
PID:3832
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE4⤵
- Views/modifies file attributes
PID:3680
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3508 -
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3320
-
-
-
C:\Windows\SysWOW64\cmd.exePID:3868
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:3960
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet6⤵PID:1748
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:3272
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete7⤵PID:4136
-
-
-
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:4604
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\taskse.exetaskse.exe C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]4⤵
- Executes dropped EXE
PID:4616
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]4⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4636
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "wkffropqfmufbj088" /t REG_SZ /d "\"C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\tasksche.exe\"" /f4⤵PID:4668
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "wkffropqfmufbj088" /t REG_SZ /d "\"C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\tasksche.exe\"" /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:4752
-
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:1496
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:4064
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:2516
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:4040
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:3660
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:7144
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:660
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:4412
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:2680
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:6136
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:1036
-
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]PID:6248
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 723⤵
- Delays execution with timeout.exe
PID:3380
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2984
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-7825356516438926651117896645-3511750731847642594-1168982529-743366455-1286396473"1⤵PID:3800
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3816 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4536 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe"3⤵
- Runs regedit.exe
PID:5340
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe"3⤵PID:1828
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:1616
-
C:\Windows\system32\taskkill.exetaskkill /f /im screenscrew.exe4⤵
- Kills process with taskkill
PID:4504
-
-
C:\Windows\system32\shutdown.exeshutdown /r /o4⤵PID:6232
-
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "698432295-280490116-2237906871301882197-254686075-40644114165158815-1298258507"1⤵PID:4080
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x45c1⤵PID:3288
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4092
-
C:\Users\Admin\PixelSee\Luminati-m\net_updater32.exe"C:/Users/Admin/PixelSee/Luminati-m/net_updater32.exe" --updater win_pixelsee.app1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
PID:3444 -
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\test_wpf.exeC:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\test_wpf.exe2⤵
- Executes dropped EXE
PID:4008
-
-
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exeC:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exe --id 86165 --screen2⤵
- Executes dropped EXE
PID:960
-
-
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\brightdata.exeC:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\brightdata.exe --appid win_pixelsee.app2⤵
- Executes dropped EXE
PID:4292
-
-
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exeC:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exe --id 476522⤵
- Executes dropped EXE
PID:3712
-
-
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exeC:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exe --id 724482⤵PID:6944
-
-
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exeC:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exe --id 919392⤵PID:2044
-
-
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exeC:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exe --id 970022⤵PID:6040
-
-
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exeC:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\idle_report.exe --id 992232⤵PID:6244
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "16254537701918275688-1405507314-398551761-239084388297890412121986026-1077950778"1⤵PID:1036
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1364
-
C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe"C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe"1⤵PID:6544
-
C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe/showtrayicon2⤵PID:6864
-
C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe"C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe" /install3⤵PID:7072
-
-
C:\Program Files (x86)\360\Total Security\safemon\PopWndLog.exe"C:\Program Files (x86)\360\Total Security\safemon\PopWndLog.exe" /cleantip=13⤵PID:5612
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\360\Total Security\safemon\safemon.dll"3⤵PID:5332
-
-
-
C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe"C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe" /watch2⤵PID:2128
-
-
C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe"C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe"2⤵PID:4088
-
-
C:\Program Files (x86)\360\Total Security\safemon\WscReg.exe"C:\Program Files (x86)\360\Total Security\safemon\WscReg.exe" /regav:0_1 /regas:0_12⤵PID:6680
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:6416
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:5664
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
9Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
Filesize
1.2MB
MD5115ba98b5abe21c4a9124dda8995d834
SHA15dd5cae213a9dbe5ea7729c1d2acd080f75cfa39
SHA25680765adb886050b0f87e30fa62336985db67c09b25f4d1760194a28ff78899d7
SHA5121c415c07dd59ef00c7bdcef35ac8fdeea88b6f482d266cc12bab3d4d3005a76eebbe97d06e5282e1dbe940ab2971ffdcbd0db2cd1d700c33805cf1831efe1a3d
-
Filesize
1.4MB
MD514c6b4bbd31f6fd13530bc941cc71d1a
SHA1ce4e38ac82a54f64d318507ddc28f9ffbb378f0f
SHA256401d8529a84f1d80a439be8cd4e869202162458e5afb5e5bac97c4859bfe8eb5
SHA512c16d525f1d3fc098b4d6c8b8a872a9013ef2f945f27af73ed7826f61a2b80d756ae5348105432909eccc71f03834cd1301f87fa5a0107e0c7137f5c8e3a3cc95
-
Filesize
2.2MB
MD5869470ff4d2d3dffc2ef004a208fa4ac
SHA198b2e5b7240567b046b47021e98c84702a39347a
SHA256ab52fff1840b010a1e6be5e432c44ca0aa2857d5da3df6574fc0fbc0004edc7a
SHA512f7994f656fc52d5c9ff24d7746d7b36da6a749bdfeb06a24b17cb762e50bff1fbc9f4ae3e4ec884b81776905c870e70cd8fe326b2f3d21a3d1a866b274f369e2
-
Filesize
8KB
MD573dbac7777b3ce3ec0c499c96f4352e0
SHA1f8f74e5e131bb90a3124537a073ce1d59f44d70b
SHA25628de9452c51d2a1ae83bd6a8d90af4ffe3b8996b3c1c9091e1ee0cee6d7d02b6
SHA512f636ecaf38dccfce02fa65958c835833dd6e07fec989db2842c734528d4db33531bbd0d831703940a5ad4104522c725eda2a94555aae8d71cfdac3081ff47152
-
Filesize
1.4MB
MD5bf7d946721599d16e0fa7ef49a4e0ee4
SHA174c6404d63ab52aad2e549b8d9061ee2c350ac5a
SHA2565f21575642ecf7d38be30aef50be623f74dc3644603e0cb48d1b297ae2066614
SHA512dd8b5e8233033a3ddb30278b2b82c60925bbca63edb68aa1e23c0a6a8f0dd8da21f60846c747fea83be7ed1e99ed86379ffff7b6aefde5ffbb85e3f98732725f
-
Filesize
95KB
MD57e181b91215ae31b6717926501093bc4
SHA18fcf05c9ac64c46c87acc1ec67631e7b66363d9e
SHA256239824a487ae786daadc9e556c185561378f47ec7ba6b216c17242aea3a78ff9
SHA5120df684bdd9c0a5cce81db692e336dcf3e8c8aec80d5d6fb8620227e2f31d5bfd1d63f9cb7f808cb9511fe483e7798fa6d5a51c0bb1ec3c3c86400767a17a155f
-
Filesize
5.0MB
MD50ed4c60f2ea47be13cc50194ccd8c378
SHA1208f059de55ffa672211cb9633b772b923bdb264
SHA2560bef714134f1f56c776c98b049bb6813ebd51b83df7e0d4bf13f3b28ca5e8631
SHA512c41d6db9d19b00bb6c466d1b54e5e73a91fea6e0c29b00eef95dcbd19db42f5a374a7421f6669764d72a68c601b51c3752dc5bf11e45c98949442646b3118f68
-
Filesize
14KB
MD5ec20af7aa08bf786c8a3a7a99f8b0591
SHA16958536945c8249273d730feae9eb15075626e3f
SHA2565d835a6305aa2fea68dea01f5689c2c5346d9db91fcc140d20667175a27d0bbc
SHA5127be88c43ad979ce2cee2ca18c93ecd15b86c8f1258f83fb7c4bb9eb77c0bd41f6b41d783577166d09f04bd655ec085d4f7a610f3b37ee9f5ff330c7307bc2081
-
Filesize
2.1MB
MD54bd489f48461de0098f046eeb0fcfb1e
SHA1047c39f1b52602eb19655c4ce42d67e8aaabeb9a
SHA256e751410539c790554ef7e3f198689b61ed06955a608dc1fcb392bb4b7fe522c6
SHA512a97929d19b9fba341bc52bb96eea0c97a952f3ed2e6cf233cef9b38b3fd678f0b85c1703fe4c0d6f9c6ca3e6577716e564f92e9b36f7806ae0f5dc3c15f9caa8
-
Filesize
2.6MB
MD57186838bec4478b234b432d264658f10
SHA15ce0f57d2d176e89fd345caa30e1f0de0f63e24f
SHA256e2fa4a52ffbec327e8678fb584cd6573c7966737251e6aa3cad113d63c3ca0e3
SHA5126f1ba31675177c0aae4bc9cc65690b9f52abe2292173d7a12bf8816ada6593b9546dcb7e27ccec4b592ed42cad785e0572a8b4dbff2978c1d7d0dc0f5cdd9d3b
-
Filesize
3.6MB
MD5addb69f9a976b47243ed7c621c7e5c10
SHA16f0d78c32984b7dc764df183b76802f2c2203a11
SHA25640920438eb1b105449b565d669cbc7f74a7c8499a1ebdc683bbf62499c222a5f
SHA5124aba4c7ff23371d667506da3a2d0c9bbc165070f7e2a66341b27eece3301c3c1723f96850d8266859c144932232ca1b4de1057883ca0cfd9de026a492344c953
-
Filesize
145KB
MD5a99cc896f427963a7b7545a85a09b743
SHA1360dec0169904782cfe871ba32d0ed3563c8fa62
SHA256192b065887382e2755b2223b6a956ff1670b78d561012e0b1cbf862d90b46559
SHA5125d745f0e9f10c24382948df7363424c6baa0dde6fb6a446bc6490bcfe4167d40acbfa1e2b1ebb0ca60595e59ad309def6ff3a4e8c8f23ac38fd6190f9b9a3285
-
Filesize
182B
MD566d707879ffa9cc896fb531d1f5515d5
SHA1317b0ca0084cac0ef7a7229dc6e8696cf6d0780a
SHA25690ee8fa562f77297ed3f919bcfabe8eab7081ede1647e1074a88d88b955de987
SHA5127944df97c75f91eb26538f6e69577000f6a58adfe1f0159bc516444daecd8ebfaa2ddd4f089cb06b401cd548e9b7265132027b1672f221ffeb35b8469081a8a6
-
C:\Program Files (x86)\360\Total Security\config\newui\themes\default\DesktopPlus\DesktopPlus_theme.ui
Filesize2.6MB
MD5e20b0d486caa3911ce0c425b5c8746f5
SHA159c181d2dfacc07fee7001adbe0f6301db18f553
SHA256ddcad9ae427569f62da3215069239578f34efda606c0a175a1801a91d92b987a
SHA512d992b1d908a8ec4140c7430e1f0d82ddcb53ae21113df797e19afa7f515c9c074385997471a6d0a0293db916592e705bc7c56a89e557f3d87a5b4425f5588941
-
Filesize
1.2MB
MD5dba070908030debe69fae6e3c3eec036
SHA1bae96347299d945bc691f1a4da26961971eff1fb
SHA256e12832c7a39f43d2f64c75dff5fff092e3511671361a5efeb037aa3b101820c3
SHA5120349e93cd3e1f1d42e92b72578f13311a5ade87eb3628a57670002dbe0d48ba30b617c7bb093306977d7b3d49cc8275f9fc0a89cf29890583440e9d2136a8961
-
Filesize
518KB
MD5cd20d1dd4eab42c47d1ded235f97329f
SHA1a4a21345c840854e3798a008d244db53217e42d7
SHA2564df4e20bd4062e8971d85e8145b0b91b60922ec9f007702ba2b81d08029ba8e3
SHA51267ca599dda7c69fb1220265e913b5b6456c36a67f148e7d58fb7c78e20afad92ca4e628ee9e484de91235c898e855d96edb93ad186099753317585fc20e3c01e
-
Filesize
245KB
MD542e36cea45fe07a9e7f9bbd1b60511de
SHA17fa1e6bd83a606349e159cbf523ba0bbf47db20a
SHA256e6243a7741708b911cc0c5233fbf1572309f372575c337116878a430740264df
SHA5120ed13f6310d7bb337f8184069baf0800a5ccf8b4dcfbd7800873ec641c0de71e129d45d66fd47115b2d1c2ea56995b155a1d08d9b9bd0aad33d1ddd97f35bde1
-
Filesize
223KB
MD592250774eb2f9dd1316fc5dca5a1d375
SHA1df62deaf0a9eacdd74b6ab1c03767a4cb7af9221
SHA2566edb05bc886e30adba4164cc852eb089630d936f106a5a29f4d30727f1a6535a
SHA512bf68a4955cc09d20380736bb78b16f15ac85a6beb6af5065a640d7545707f573a17a5aa0f6664a2b8f2cd7bf0cceb186f885210c8a07fc5d185c030d01793fd1
-
Filesize
194KB
MD598ee79b8e82c1da453c71a6f9380d128
SHA17e9178bab13a14b4b5567994ada35d13fdb2b1be
SHA256dc346a2acb7a340a3ebfec2ac684254defb66f5485726d0ef32b51a3247fab83
SHA51260b4b163a4579af0e39f594b1fafdfca09cd7cb99c598cc708e841be3ac13ca56d1c6c2a760119060f82191e26819e6028ca4bd76cc25008a476f6b24e11acfc
-
Filesize
175KB
MD5a4c68afa8fca59190ab429ae631399fd
SHA12a4e3d62661e564468e4dfb99761de099434e3e5
SHA25611be27f2ba0af548e2fd5ad7baaa5ac3e10b928b0742680ab9f673d1ebf31521
SHA5122e3d5381649b8cb97179751963b572ff4f828d581b1e87df0cedf5ed51f76235db0ba4e78087562ac6f9f02f805b9ecafdba53a1b4572363829211643d4f8fef
-
Filesize
109KB
MD56a384987e2556e8b16e267c49ffd00b2
SHA1ef9defb215f271ba08f50f646b11a6a025d9d5c9
SHA2560839fd7158ab508cb51135221a573044a4a5f86d21d2654b2bfcb4cb4443577e
SHA5126aa59434a192fb1b62e85d4ff8b16819dcf4927b31cd78175dfaefef452d8c32866a4fca97fbec51c05de24280efcce005ad3a39e276776e27a6313d66b37c79
-
Filesize
53KB
MD5da5e35c6395a34acaa5a0eb9b71ff85a
SHA15da7e723aaa5859ab8f227455d80d8afa7696e22
SHA2565e11c25e4d6e146c5e10fcbc21b2cdb5e97ec47f25c416e5d263985f3d964172
SHA51249660339594abff9b0590bc3f401634a514834cf98fa8715b05a57a3cea575d74859681984d8c2c601d5fe947701f8f110450fac764a5d32096e24d7eadcdd2c
-
Filesize
84KB
MD5e855e9039f37523e6b01e05107cefeff
SHA1c0882da58826de9fb9bc95c929a73fb71735fd78
SHA2563b81711731e79ea45c3545b599f3ebc21ced95f608694332892c918e6b2faa17
SHA512c3c56ec6a31f9c0a49b195b2e503659c61b47cf556747ebaffe6fb9f8880a8bebae84ba12a749ad0191087bd3e843ed99c1ec74f51744a3743705dbf46c9c325
-
Filesize
98KB
MD5f14d2b6d2d2028ca0851a604cd69c408
SHA154fb598af2f9ec109973085322e5b79254856560
SHA256167b31798b2bec91bb60eb64f50300a0c5e1605203349817754c6be161a84539
SHA5129dda7ba6c320f7dec35bb118c792fa6c56ec5c32610f7d93776f4bbb0a031be5a7394cbe8931608faece0a855a26e927b2ffffcdb005be6751e07add4f19b49b
-
Filesize
321KB
MD50fc2f13d9e0cfbd4903a77051348d16a
SHA1c1df2fe56cbd15271020e48751c39ab482f6eaca
SHA2567b79ca1ec9ea05d6549218af8c646f8cb25c563e66d810ca8890340066cff72b
SHA5126977514116a2fa2c0a884b46975cfa048d966448e493c1415467d6be8719c6b40db0181a861f9e0ef53aa90a3b04012e02e6aecb70230745c487355170416efc
-
Filesize
359KB
MD5e3bcd970502ec0d7ebb03bfb2c4a3bab
SHA15da1058a0be57b048a2c1b3442de44c576a4c913
SHA2562265a0b291d07eed46ff162f10dda492aa62aed8ea8b5b6146cc995e15dcbab6
SHA512b5fabe8a300baf6b3535d19091438aa7ce647db286642c9e1a8635fc11ecf488eb6f2b5734a01a3072fe5fd7a16185d2272a51f657a4bd78c0ab8fff9516709b
-
Filesize
22KB
MD5627cbb9d1671cd7a553cb9e59e765bbf
SHA14a4916f14c4ca7d26dac88ff4a5884761d8c5a70
SHA256063e660b1e32cbaefb8b928f1fa638853bbcb6b996bb08496fc861fc5425a840
SHA512cfe0246353d9670ac7d77994633e8c55aca4a3ecc889c52d09949e427d5e5e06056678de15ecc3017af81ca6ca1333f624f8652a7488dd4e317c6a46c8719237
-
Filesize
246B
MD5dfc82f7a034959dac18c530c1200b62c
SHA19dd98389b8fd252124d7eaba9909652a1c164302
SHA256f421332fd132d8405cad34871425c9922e4a1b172d74f86b9e4e7ee750205919
SHA5120acb2a043303ab1c033313d62b9b4dad8ca240e345195c87776f99f129a93946036835872b336a8efd996657c37acf56da7c01d68add340408e8fce72fc66fe5
-
Filesize
186KB
MD50e93f09b4e51c6a8a66cd1c9ceeb8ff3
SHA1b868b7f8fd150cdd3b5d569738154e62350aef5c
SHA25666152d1316b674a95ee0bd63844e6acb5a709a177934814aede80166bf2bc204
SHA512c5b9f574d83f81b58147056f94ba82deca63195a2454db6f5196057e91d3e7fac15c94951c4e7bb14d3f2aeb2a2eec4230594646c27280abab58df3f9e4ef239
-
Filesize
50KB
MD5f398c9c333589ed57bb5a99eb2d32d13
SHA11fcac85e06506f332cae1d29451abe6808d8d39b
SHA2561587d34c58ff2376384a0f3b279248d080724809eaf5f251cc2dda7896f04602
SHA5120282f9ab1084fe093e097b6c33adfe2de59d4ed3a9eae12698df7295498ba56d4e8250a130af9f7284cd962691340246a15b3d32e9bf1df22ddd128f44d1205c
-
Filesize
342KB
MD569c04d5da61c59c89bbd36cbaa13e9ae
SHA10369967f432d623a1fad7c5c1a7405104faaba44
SHA25623283e2c2bd6ccb04436c90037282dd103bc8add9bc62e9f5d34842e2e336b11
SHA5123bfabad5b72eea44af705a3c482e7496e6a1547e0ddd429740a6d69e81895a651c87ea3ce6b53ad0ab6f2df331516ea80bf1ae47b02d6becb01e4d9f51ae4024
-
Filesize
216KB
MD5df38750f3f3e205e8795724d970189ea
SHA1442952863db2e6466ec9ca116b1ce85876100a89
SHA2565d90f8287ad1ccbc6e6c3c656b1a84467c50801590d8f730c10b0d106532294c
SHA5129311928c6193f11ba3778b546e0081062998b9da4356529a341971cb343af0adeaef8e4099adcf4dc8905b68dbe8cf86d43cbb2690d64d328c21631803540b4c
-
Filesize
48KB
MD5d85dac07f93d74f073729b89dc339251
SHA1e628f85f1365d9164140391cb93a2b22a4fb8ba4
SHA2565b64447141ffe714f04a4ae489dac020b5ca0c31011c8edcc22da8cbfe265256
SHA512896aeee641e5ad5df74c16ae8bed9c0f9ef53034c391b47e5c99540a3da58bbae9524f0bcebfa93f395b7b6e6a0ad1100e27f19d05c796abb1da6660a3b35da2
-
Filesize
923KB
MD5209ee3f2b59730ba6e1413c3e0c6ee09
SHA1de702e0f1571fdc0e9c31dd289572c6d5fd688ad
SHA2560352b4b7908255b9487e3581a521152b7a0ab62e428f13186d23bf41c3e3941f
SHA5129ee6d26909d620d4776355d5f6390a79b0420ebe5263322c294047b628410d8338407768ced6f6cdd0b7b38ca890f3c6315c3d659fdd8975a0cc3f0a279ff854
-
Filesize
23KB
MD5e540bc23b3f5934dee4d7b7b39fc3ac2
SHA1465f0b0e4fe49b81a43980dd0cf40e068e98abed
SHA256e794c636a50b5f51e0bd233c59c9144277a94792d3537460123a39c583d01421
SHA51239412ddea1f7b16ae1b6d89db7f7c24b92b1b310f3d9191ab82bfa01283044d3c4e991a5fd4efee98d00c1e65d76328bd396138e5dfc90f44ed49ed605f8e764
-
Filesize
330KB
MD5f93fa692aa3658422997643f51c1b7d8
SHA1d00ddf850a7f937d1a75c401227a70fd80718171
SHA2563c9da5ab28427405bf1099c1e7c3e77683c658c0c7c5fc458f606f368e7c6fc6
SHA512b30b87b49f0155f2e310730a71e39de041b74d2aab53215089fc61be700854d5576c540eca34da774c358fd89e516204be14519576e2946a05b1f90318659745
-
Filesize
171KB
MD5bc8917f469a0e356c015ad6a31acc134
SHA1a2e0fbcff53018ed92754065beb0a16e35339cf3
SHA2564f798cf1e27dd355709c4ebe11a24b17ee832b4051f8952d9ae12942e0ccc5a9
SHA512f9039ea609c18174dd76f5a89b6af4908573fe194cfaf412430c755da0626dce7b92f668e5cac6b195c91f17cc4eaf4ddb963b95bc6de7483c05436f7f4f59c8
-
Filesize
59KB
MD5bdce31fc701c9aa16ca392a561ba102d
SHA158bbdeb96e7819b00d60f0e6580dfc455774a9f7
SHA2563305ad2718c9bb9bd1db19cde17a184e0d7e497ff3930050c74875bc50f9690b
SHA5122a16cc0a0bf718f661a3abe8f36b87c8b13716d5bdaa4c2768840734321f879de3d60255b67b2b858eabd627cf4302d7be0a29648bb65bedbfb5f838c9b96863
-
Filesize
2KB
MD5fb489fae61ced725a87338699227fe91
SHA16f52e4f08a67cfd67696f9fc47fb518966809b66
SHA256287a47dba7cbcb4c7688f82f17e2020280bd0ee0670abe3c91413bdd26aa9e34
SHA5120b33fb81d64487feea9c587c8c5bc73067e6b0580ca2ba733a52e11a2aa1b6d8b1e36eff4f1403d4f7250bbcf2a202cbfd68bcb655d544e6509363a3f59041ad
-
Filesize
366KB
MD5c0805da6b17d760418fd2fd031880934
SHA1f9cf240f7bd4dbd31bc57913ab6517f0dc17d7a5
SHA256edf443a3751d042fe16b8b11b484357a1b4702310bb50fb7aba9d68725803612
SHA512f1c458ac3c1eb6ec67b4b0c54aaef09258e41ad4fbd3cd429da3bde278dba09c2419a79625aa39bb231ef277f803cf5ea568c82eaf028cd7a23a6a2fe74306ae
-
Filesize
448KB
MD59909aa216b30b502f677bfff05000b0e
SHA101a26e5c75ff5b3e34fb6b763ace486fe6836aac
SHA2562bff74b83dc66fc74df2f527071c1ca80a992ba2b887f6043b09564d1b814213
SHA512d46d00aa05c1fb08232ea7281d18254edc55de5e7d1e681ca5c1c18324f724565a89ded04507de4f725971301762b91f4aa90a357bb3b09dad2ea26a676c1c3f
-
Filesize
382KB
MD530c9d5470142edf4d69b00aff040f822
SHA17c21ed33749b58c10ad7e1d95c922244eec62fcf
SHA256b76103ff3d6faa46537d3db213270a086ae3b5b58fe6841b03cd5f9f73c54247
SHA512c385b70414823107903fc1eec608b064360337114dc8a6d307f2caad9ec5ec7e53a2850f26b5374deaa97b2c727206f08a0a2037d12550e6449632d165b03b7f
-
Filesize
85KB
MD5b1e1e8c5420ca5d39a3868b4cf0251b8
SHA1b70587c35379206fcdcc9b368567425bebd3b171
SHA2564f622357bb25b9d0c211fa2472b1d2abce42c2fcb763bce6cbd89f7afe42e83c
SHA512c3c5dfff25d0bf33850550c85177bad1c78fa5d6f5bf8c1adef5e7e89f5adcccca5e1410ed7741331f08ed63f53e2e28224aab9107ee5f482cc283b9ecab884e
-
Filesize
169KB
MD5b1f70f9be9df8bb186c5bc5159690a1f
SHA10c9347ac3245cdeb8dcea9b3edf01fe4cfd33fe2
SHA256ce993f7583b1f253c6d82027b89fd867390ea1563564da75684d293539edc6a2
SHA512188419d1cbc4f1b1bec99bf77f716bb004a0228d3d36eca9d2e479735efae8970dff62f5df42f01e8174173537f0d68ae37b9d5b70b0698b52f50ee0aacc5231
-
Filesize
1.1MB
MD57e0bce805d94db8b88971a0fe03ec52e
SHA1f4ce366ed9958d1f25426e5914b6806aa9790a33
SHA256e4c4fcf88132c1970ccb9ec8f43dc7d1ee193ad552ccdef8ab166959a25696c2
SHA512d631b6d22b057fc6f385a701eb9c8895fd59d692fbf14f6f87242837b1c9df745493fe35adebeee4c2099ac544800f9fd205d4e76dd2bbd85b601de80854908b
-
Filesize
1.4MB
MD5d43fa5904a62445893fe1db320ff2e7b
SHA12f888949e9c3ce0f647b97ebc8289ae3f2f2eaae
SHA256074f19878542b07060bcf7a10238aac2571eda75f6596fed6a0a1f7e884f2305
SHA5121589551e1b5f2c8794f56543eb472c1a801f6dd6b338ffe406bf91bf39061a9022fe13c9a460589a42f243f5329193ff2ae32b1112252fc78d0321c68313b34c
-
Filesize
7KB
MD528653ba00bba16eae29359069db6cafd
SHA130f2ba8331df3849141c7f7d1791aaaac65a4bce
SHA256e6baaa5e340285170b47b879e4ec9e137d8a1727f1a99668ebb1e82a462ef76e
SHA5124b242a76a57432127125da8dc7efe563c935bf869b16db9bc48b78e0e5aef3796a0f1184473cfa81607f23dffa5f9a2cece5ca3be59bebc7a9634e308e553b35
-
Filesize
2.9MB
MD5c7dbfd0d17929c83f12080eb4680595f
SHA1210f608a7929bf4085815522ffe2695063125e69
SHA256a628b37df526093026862a1180484beece436b5dfba83648551fe57ce9a5dd75
SHA5127d8d5b387cf65920e7a1f2aa7c0ce111eb5d600fe69ec48c66f3bf05c870dad0e34d9637b1852af0f379495bc3ebc277d130d14701e2b4114f8d50bab057c5f3
-
Filesize
31.4MB
MD56d2042fadf5d5e583b86ada8a7b9c754
SHA1c041f16199e9f98304d8972009e336846c17ed9e
SHA2566aa3ff3559c29e234741bbe99422b1e15d79857492fa4659c74e131c448098fd
SHA51226730cd774bd59526cd1fa3d5950c848b5ca2560ee1efb5dd5694bb3d49f7737572a9c3982dcecd947ba67a9da0aff04125a0ce5acd626e71812b313648c4325
-
Filesize
3.0MB
MD5e50d652f024983010fe4a29447fe9785
SHA18d1730b8bae215ff2e9ceda3b36f53e2985d5665
SHA2565ccffde20db3d41e12b7fc7195768c4364db2fddab71a5a4d8f33d0d217601fd
SHA5128bee30aee593a8d5d5c5f1db7036b1c9a54bda4eb59d6a7a8fcf881ceb612354744b8d03f8572162c66f211d15d919a922f0f3a71db103b489d3f5e03a5f2bbe
-
Filesize
1.4MB
MD5a7c1278d831b9dd8261b55b82eaaffc0
SHA1fe0be83f83c2b9b118b5232dc8d97b7524278a2d
SHA256f35a3bc8e09e217130ff97efe85ba02bd86573b2e0796b003526604454338227
SHA512a21d05b8b88bf4c8d789a88c01d8443e7f79306bf735ef5af8ad62de2f4ce00b15f5cf3995e1551215285a56465998c61d0b2a66e8bee88d2a2915a8003e4ca9
-
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\20240715_100006_once_07_service_stop_1.435.904.log
Filesize1B
MD568b329da9893e34099c7d8ad5cb9c940
SHA1adc83b19e793491b1c6ea0fd8b46cd9f32e592fc
SHA25601ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
SHA512be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09
-
C:\ProgramData\BrightData\537fe92663a1ddca21c19e8c696cb5c463365a5c\20240715_100027_perr_19_peer_connected.jslog
Filesize976B
MD53e03a705d95dbc947cdb9fb4c031b7aa
SHA1751ad746b5f55c5a841b57addb56c4fb2b391e41
SHA2563b430ea02dc2f40f216e737abf45cb758173b64ad5445c17eb8e271d5f3abe37
SHA51214e9497323a3be75453f992b1fb4137f359e04fbca91f192415190acec50d6d441ee4b8173c51431aec8a0655ba4ca3d3d63592911cd5103c4217ec5ad6cee34
-
Filesize
5.5MB
MD5b9142b1e9907aed2bb96b554466310cf
SHA12633cf3fcaf18072592efa4ea39b56ae25a4d022
SHA256a6bae2d81237e0e65c03e326d03a4978eaeb844394825fa0bd1b3cef6878c625
SHA51299be3d79830548fa2c265e0a2f765c74d4acd5fe00f9ccb7ab6b71d1c3d35af56fe099f8e3885702a2904e49eec9619974e920333587eb160e5f611b939b4ce2
-
Filesize
1.5MB
MD5dee75704acbe514c6ad8727d550f79fa
SHA186cdf7d6ee950b62f4e88b2f8614231f713d848d
SHA256e65c40b86331ad24cccdcef0581e48e6212cd78a2a09bfdfd11ba15819881fb3
SHA512dfafedfd695a6e9cd9fbd6058d0da59521dfaef9636bb92e69244b5a24f6a1c582704a0dd3be8e49cb104b0717834acd2e8d14c3d21a464d34d7d9d849387969
-
Filesize
30KB
MD5c77677366a2e5ae6bff987cf1409a077
SHA1f28416863519092ec182c30eb1889a5ebfc2e2ac
SHA256bd94fdbe50b8369c2c7fabed65f60cdb73419ca61574d143fb9e41466f850341
SHA512b719c905beceb438c01fb584a1ee77d38ff65fe50540736c15231e03742aa19f271bb8980cbccc85a3f8d0b76857d18390422f3a56f5b94cc932a664f55e77b2
-
Filesize
33B
MD5b57ef57b2782d1fa43134acb775fe6b5
SHA1aaa8b26aff45c51e2a038c9325df11fff5209ac8
SHA2565592a2cb5a0d80b3912fe26563e3bb0bbc12c6ee2e93dfd4e53f6286ad6e66f0
SHA512e8781ae9b030047c94cc54f3550f1f6cd49b1fa0ff13a7bb39d65b6a381a52a7164b0b92f3fafc543be09264b8af71b55af74ba706c4cef8715f6d09c19e590c
-
Filesize
131B
MD5473baa4d885f4b0e31c9d65eec5650fa
SHA19e51d8cd89b9f0d7b0eaff0a469304ffa290b41a
SHA256541442d0bd8dd16678f338027776a73943d138a135631a651a10677024779d92
SHA512bd8a61bfaca46060b20cef9a9416e01efa456e79e556315f03f51181ff7f6b9efd893356a88bcf0464e5c91cecb2748d610c6e6f3a3754dd38a8a76821f1eb16
-
Filesize
216B
MD56f24c6beebc4f6f4a743a23558744458
SHA1c7d9c1f41f7a5af380c78333308593a683d600db
SHA256adb0c9372c63e794ca078054c84e89125ec74c8b507fc580febf02c0c0ee56f5
SHA51219521ffea10613aecc09316f71d8f37e590e0093c0ff32d273dd5975480c03b9fc1e2c25252e8c6e59c177fb29f5c812e78d8406ac981476b435230bef1b52bb
-
Filesize
30KB
MD5d6d6ddc6f5d18806e4b68745f4f72980
SHA1c7f20c868d40cf557c27c084dea63910ca54466d
SHA256e83cdf912e8d89e311738cf6d511d48e7846331c7f8135ee2786502af428f7be
SHA51237fdb02440517f44db01b6b17bea93a9637ed5f929c36194dbc2ec860b62f7cea3767066dc2d826d4abc75147685e8766bd6bb8adf1d236b2a86f065314a5571
-
C:\ProgramData\Microsoft\User Account Pictures\@[email protected]
Filesize681B
MD5859c100a2ca1d7abf73f06aca419970e
SHA1c6e35ccfede6bfb46d53cc106a2467ba285c49d0
SHA256439a6c5155cf08ded77a4688b180f937150e113bc95cf99e8caca05fab52ad60
SHA512a4d6339999d46d8d1a76f7f4fa2a04d99d80712f305b554e36e5769cb1f2b0db800f1b54a9cf6bb0f6513548cfe1f01c6391b892c993282d55feadc8ef6a3c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32dbc526c38c2a0fea36748215c5c59
SHA159d6783a4bf94ead1b79904bb9c9bb76451aff89
SHA256fc53975ca2fbcc9819d5e8fbe9c15d4d18c55c74c099b04e13c2a1df1d7400c7
SHA5123863d0897114fd1255f25566fbb66f9ea19a5cc902776d334097b1f0d99057d29c0e34c50e733e707fe395d3e6a904d2c52546b0ec3bdcf45393546ed14fe147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf9b4e0ecf2060b68510e58e07c58a8f
SHA181177ccd8545184136ae49becd4f5a17fe173306
SHA2566d9fe74fb524494844282ebdb47ab1af961e9e39feee915ccebaed5aa2016a65
SHA512dcef2914b53736aa341cccfa62275e9cce70985fc8c84b00452c09f00b114a7fb5ecc2d0ff30e7220229d0764f28559c7af107e9a770db45df8d9699307176ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686fe1e9b3066d863248f26112b6420e
SHA11921f1eb082ce62beeebe8d434b93d02e3becd28
SHA256dc8b5bf763d2e0a659437f2cebda85599da159048cb2a0087b0a7112cde71270
SHA512589388352e4088a414f6831ec9331cadea4c53ae7ca8bb41a5bdb7a7b47ae34820de4b0ae1931fb913bb1f20a3b1d7ffe1e2f0332c1717fe75bc7d50e6c859bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543c5da500ad3f7f92077c7a77fb41f1a
SHA15ba7a309f4a6c8f97b1b8169e10c193416f92fe9
SHA256a3b882abb6a183928294c8cd3424af7570766bb8645305be2f06622ace40953d
SHA51267a6971e6c1712fa14d2fece38189e335be81614e32149027ca1b6847031b7d999fd224e5cbf27aa6a725fbda3dd3f60747915c014a5e9e22b087244f9211a44
-
Filesize
3KB
MD59ccfda18c670eb434d5f63b43236218c
SHA1f8e6e936384e1f3ceb94cd5d95fdf1bdef685f3d
SHA2567c40bd500d9f47b3f062a632156cbcd2ae3a57c3988adf07104f34d5226da3d8
SHA51263713a57165deea0269d7aa20273b36b364a498fffc85ed886f3146ff675412822c55520a240cce02efe4ba0a4176da9e3b1ff30e8876e25fb4dd60ae7ceab6c
-
Filesize
5KB
MD558f90f4744c515774eb485904780f3d6
SHA1048aa5573b3a69e3c819c4039b857e3f47776f48
SHA25617c2832316af64bf23dd9027b8f35c001bc878c9ba3d0c54dee107d8adbbf7d7
SHA512218738b34146a177c549c976d0e6a0c85dab1f469600bf93d38087b0a3e3797d2b54e7ff5ee8a922cab56fd0a45a5bea689560c0700da876264701c1c3f9090c
-
Filesize
257KB
MD560d3737a1f84758238483d865a3056dc
SHA117b13048c1db4e56120fed53abc4056ecb4c56ed
SHA2563436c29dec2c7f633f4766acaf334f6c395d70ea6180c0ea7c1610591d5d89b9
SHA512d34f42b59349f3be1ac39a57207f616a44f56a6c74157be8116fff5df75275928065065a89f10bd79849e58b14d1e5e0ea156be5996ff8ca4f5d854e107c96fe
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize654B
MD5df0245a8df2cb33ce6f3a835ab040fe9
SHA1521b113070561b621800dca26ea0e54598bdc80d
SHA256d9450f610b9f8aa9d7013b9e1a7abd38cd6f3e3440a4fecdcf1ec0e3e0f781b9
SHA512a15fe976db677a83a4feed99dc2c4024ed6d65c36de640573e75b5006b1739d5932a082a749d79d8c61ce1f91bce8bc91c5f0873c8a3ae8900c358baff3f03b8
-
C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.ini
Filesize830B
MD559f3348c9b330622912f0c6b6bd4b009
SHA1c1bd6e70c69f47974ff3318083e6bca3d8cabe5a
SHA256fac3db562c43351f670a48c50f7258c6edb852ccb4e0c434bc9af3f8ae28fa24
SHA5121525a779ae950502ac8c16eb197b8a3c5fb46a821e3a67189841cca2c561547f78c4e9d1ca5d6dacc99bf933038f52c0b0ca1e9ec56701d08fd97b4034c04d99
-
Filesize
1.0MB
MD5b192f34d99421dc3207f2328ffe62bd0
SHA1e4bbbba20d05515678922371ea787b39f064cd2c
SHA25658f13d919f44d194827b609b6b267246abc47134bb202472c0dfe033b9d7ed73
SHA51200d4c7a0a0097eb4b31a71a0eaf6ff0d44619f77a335c75688565e34e6d7f4fb6c258917457d560c6b0a5077603845ce012e01d9862e87fb5327d7f8da970f95
-
Filesize
223KB
MD59c914da5ba91ec1854effa03c4ef6b27
SHA1a2dfc7d70b5fedc961b0bc6126962139bc848ea3
SHA256f78eee64134aa2fca1d6eecaa8ad2c3bf9e54c232554525ac4783768daa677e1
SHA512266efe7361a4226a5fcf81fd11ae96f7131e8911adf6955423bf054d825c210b634bd1a2ac2f112c5b85fda9aa1b9ca07e3646179bf9977724bc5b4e9e7dca42
-
Filesize
217KB
MD54b26b4b4f38fee644baccefc81716c6c
SHA16036d5f882e7e189859e58fbbd4421a2b09b58dc
SHA25648b9596b3c7b1af2c0c5cd62a815f7e43deac03ae3e91da26e8dec2891c915be
SHA51276d2235e29a906c8973374d2ec3cb549222d431695daf6ceda2aaeee95fd5bb35dd57d53a73d9a7be04fe38d10f81eee398bb81bf3c104bd0fc17e871d081a60
-
Filesize
484KB
MD5e5ea576b85d53437a415ba6f583640b5
SHA17af8662445f37459835177248d74f43c944ac4cb
SHA25690963029eed69b4c47a39973ff1d67dcbc7ea07ba7f3ddde71a7d83f337edd77
SHA512aa976ace6be31b6c86fd5479f8269e95cbc0bc27a9374ec9cc70e4a71aff9737e0b1a38b5269b69459027ffd66fe216b1fd422772b91a189f17144279602dcff
-
Filesize
624KB
MD5001fabb43eb84947fe62b0b35539ef83
SHA1f5f43fab1a7ce7db58211e4b76ad5f6355f2b09d
SHA256e81e33684fdaf8ef7a9a15ee1b217681da9b1a4fb42d5883bd2489c26a2d39cb
SHA51251e335d49db28dea6b6fad7655a05368f504ad376611cb637ba836828d4e1294ebe80654259621428a5f86183adfd52685ab73c542c0158f12a8c5a33432be52
-
Filesize
675KB
MD5d9a8493f1ce7b60653f7fb2068514eff
SHA1c8c0da14efeb1a597c77566beed299146e6c6167
SHA25677cee2e41fad67986c6c6e1426bc6bdaa976b1dcd3b24f381376b201d201581c
SHA5120b500630e13aefba621c0f66aef5f2528c0fa0c91deaf19e92999c6377908f53f3a6b23fb90723b890155877ab7b8b40eacd851794b23ff213cc33013734415f
-
Filesize
842KB
MD58b14a80d926ffdab593b6bc0b002b9c4
SHA1c84c938543ef6d2c42ad0c61f970e3d1ccb3be44
SHA256669a13733ce62edac298f91f957ebc7c748918d07c7730e94fd930d6141f8078
SHA512d049f415db5dc5c38a968251e72930a8a90e126617f514b0566f203435ab8f1e96371c2c8f0f40cc60dbcd48b284bf46369d377eb4fa61e4fec6def054bbb744
-
Filesize
170KB
MD594a08d898c2029877e752203a477d22f
SHA1d8a4c261b94319b4707ee201878658424e554f36
SHA25607ed1d3443e7f9b2531aaa0b957a298ea6c5c81bcd321e7faf25a17a85063169
SHA51279a2e121665e403767e5278bdbac6c52f6ce048d0c3968a2fb5053229c5d98e9275acbc48806c45b8bc2e807f6e52ee4dad54924b758db8328fb262c6fd176b6
-
Filesize
199KB
MD5f0ec259bc74b69cac5789922187418b5
SHA199e738a12db4a60ee76316ad0a56604a5f426221
SHA25609eafeda04f79fd1faf273efe104e877b719fb31689838aa12a3e6d3384a3da4
SHA512630cf0a30961af6d41d24f2d2fc81e0c10c99e19241aff7e14aa38317eebbe01e5d85c1cb5848ecfd7b75e2fe762cf4a07fee781d052b48f0a3c15a37505dac4
-
Filesize
255B
MD52668ce9c7e8941ea875256edf1a8ab80
SHA15633587d5840fb2d4caaa583bbb3068bafbeb904
SHA2564e3cf28ef3ce5b806c632f99482560a5246de9f86aafb7a47cdc78e5b4b019a5
SHA512b92440a8b3dfc54c577a45cd132f07c525300de90297f89ace88b7395432ccdc08b3cc9cda4c523cf82b46d371eb4869a8ed8b3d0720977afd983634037c61b9
-
Filesize
315KB
MD5273c2d00588d203a9f1486cabacc7c57
SHA1cd7782e5836d645b2244bf30fe91c79fdcfc86d2
SHA256d14d7de52c5749549a17e7614bd3df8278e8595ffca4110e6289c56a21eea6dc
SHA5126cf37c151a21447ac35638af22f6324ed0c10df736e5e54be279b5db8f68da86d85ef6fdfa3b4a22b2ccecd98dd37abdc93b9e8f391a3a90deb1e4e4990c1779
-
Filesize
388KB
MD5d569954dc1054b6e7d3b495782634034
SHA1dfaf57da05704261aa54afaa658d4e61a64fa7f2
SHA25611294e063fe9a5d5b6019a39b48bebb75f536e27ff92008c85e9357c95805b80
SHA512b12e2a6cfe849b5df21295f4a538db0381f2fb8c63b8b4dfca9778af16c68d23336140874a64deb324e39da0ac52b1f2292812fd02967d415319ade1ee965b6e
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\Utils\DesktopPlus\360desktoplite_config.xml
Filesize2KB
MD5317389a32c0d48a482f8453e5bbde96b
SHA108c5d3524d5233ff9fcadd92f6277a0318cb1900
SHA256e4bc20cb89a35695f6a154adf9f2da9b9e6e548c49dd08cbc858995235f2503b
SHA51232a3c2afc24cdb4db49a103036a0c86f3ddfef2731e9e1af9863dbc70e79bdf0537b7a93523110ff77987bef09a2245e264f9af9eeb17bbbd46190f8ad0dde06
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\Utils\DesktopPlus\Utils\360ScreenCapture.exe
Filesize668KB
MD5050132ace215b38e8311e8f3fc11a6f2
SHA1ccaecaf99d9b8acafd1632e3735b89d567af5112
SHA256234184ee1c37f28ef75a950501e91d6b55c829f66b96696a1a8e83a09bdbe883
SHA51221b4d364a3ea965adf7a697f70f64ad6ca660bf0bc6a664dec00918d4529bf647b36e2f3268ec0f59d7b51f3b6c55d573d45ec2026849dc51b376dc59f59e736
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\Utils\DesktopPlus\Utils\360searchlite.exe
Filesize915KB
MD585f76a8481c642654ae58caf6d1b35a0
SHA15925a1f3a265311e8d818407062ddf5cefffac3f
SHA25681399a7379aebbbfbce8d8cbc2d482ca04c38ddc91919ae5c6ee3a0f8fb3ea9b
SHA5127da2f2550b4bcad5a5df5033c44635722724ed68fe97fa9e383032432283ac43e3dbeb0f4080368f86d2e2b54b91a166f5e6280c35f0ae7e8af3e31c478fb48d
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\Utils\DesktopPlus\Utils\search_file_type.json
Filesize1KB
MD528b79c423115a9f4c707c22b8fd33119
SHA161d190717506e84ece4bb870562e8b8885a2a9c3
SHA256d1b7bc9a125cf0ffc0996bdedec5e1fa724212fab340103ceb5bc1be3c25e686
SHA5124689fa3e9db913cc2f17488a110d6b56e434f686c830a42caed51e5a545ca15eed83436c4073e1fdc8cb9e4b88203e0f9278006c5c1376c22a6b2d2608930f41
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\Utils\DesktopPlus\bell.wav
Filesize156KB
MD5bcca16edddd1ac7c3bb3a5f5a0d35af7
SHA182ed94f58c6f894d517357f2361b78beab7a419d
SHA256effc1ca8846a39001e410b2d8351b76be093342d139b332aa6260db01ac820d3
SHA512e419b6be471f0c043aeb57074ebddb02392fdfd6d0bdbc65881e2711885ed15549f394eca571583090747a0ff0eb1f70c9d2539bc1ca8c20c1b0129d9d24ecf2
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\config\lang\de\SysSweeper.ui.dat
Filesize102KB
MD598a38dfe627050095890b8ed217aa0c5
SHA13da96a104940d0ef2862b38e65c64a739327e8f8
SHA256794331c530f22c2390dd44d18e449c39bb7246868b07bdf4ff0be65732718b13
SHA512fb417aa5de938aaf01bb9a07a3cd42c338292438f5a6b17ef1b8d800a5605c72df81d3bae582e17162f6b1c5008fd63035fa7a637e07e2697cb1b34f9197a0cd
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\config\newui\themes\default\360searchlite\360searchlite_theme.ui
Filesize146KB
MD563c5291258ff6e9ebab439096bd20936
SHA12dbac59459beeed1f8e409a628f04b92adf57124
SHA256d83d1bf6aa9a21b4c57973548450b3b2da43bdbcb2e1af04e3aeabdf9d3f5f92
SHA512a1823add3da1a516c56b5a4af54193e46d18dea47201cd3ed0db7aab91c03eb872074dfeb90f65cbce58bfd63ec94bf10f7504c3cd3eba9021d0fa69fcca4542
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\config\newui\themes\default\360searchlite_theme.xml
Filesize24KB
MD5bdc55a163963a6d2c5c1d1e7a450a3bc
SHA11f3b287d55d205648201fd61e950dbb9ce9c256c
SHA2568e5583274cbaca5d557bd095cf739a5b5f8786337a575d5c1d5df67545befacc
SHA512411a33de90a66f0aca35ab7d03b65d4a8a92612c96ddbd628886e4af5c1076bfe9258708c04cd85222326244399920866fa827ddc545034c5241513688f09e95
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\config\newui\themes\default\desktopplus_theme.xml
Filesize73KB
MD502477fe3f7f3cb351c045672a105bf13
SHA17af1f4b90cc20297a07b767c5f1cdbe5bb2661e7
SHA2560940f591cb25b4d8da7bb0651e66ea8ddc52810041bc91dd2da5723fc4367f38
SHA512f3e9b5f75acac05f272ce8e09e5fecf950cfcacf5305a57206920171309ae260f51dc8dde986ca1272f1858d7c17930d7897258e10591e0af04a78a41c34119f
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\config\newui\themes\default\theme.xml
Filesize272KB
MD55f2fbfb033881b7279acf85de2b0a85c
SHA1a7c5604c8599bda67e670159bfc3b767fdad73f5
SHA25683c7cf0c71f9e2f7c32fca19e17cf8b069fb03e4335466c352943212f9ec6dad
SHA512ed061e201725bcbdd15a36671cec886f497673de48dc04e45bcde7bb6f4a956f1e4f4bc804610c73201f195ccc87a581b3b94b1ab5731ce9a31a27e10deb26b2
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\deepscan\360FsFlt.sys
Filesize540KB
MD5b372e31c719a47b08fe4d377d5df4bde
SHA1ea936fa64b8d11fa41825f07c2ceeb886804956c
SHA2568d21a430b38d74157f5d73f8dfd4d508c2fff7f2945fa2987794f656b3acb58c
SHA512fc2962127bb84aff61239fefc060c002edb6560e11a5e7d2d0dd6d15a431200eb5ac988867988ddd84fd5da241f6bc4a1319ffa83cc9ce7d5691e7e5c4170625
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\deepscan\BAPIDRV.sys
Filesize193KB
MD5b7b91b32156973711fdba826e2fed780
SHA10caaa4c4b12801ea1dcfbc9bb46b5cc49cf74c2d
SHA2562d7fa3af97a50240dec7540e4171772912d1dbb82259ac4acf039818417cde5d
SHA5128ad87c80012fe9645514df956a22aee79749feac87b199c4a89f030544a49bd5c51148df02885a794d20056bef6091947c3bb61dfe60bcabad71e3969a249967
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\deepscan\BAPIDRV64.sys
Filesize222KB
MD5992de18c7b0d80d7b8531b90c3910888
SHA1173c5c2afa64ce8b8d2243b5baa5d4a77c996e17
SHA256edde2232716629c09ebbf6a5ddfe55fc8bc2edef91ccede9104b3186ffb170a0
SHA51298346c390d9b64360c70b7c5780efb62e856f03e19d58fff433461cf5a2d833fea847267db1b72cf4103e9270f56b11ec542b15fc46e4a01233b8327a6878936
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\deepscan\dsark64.sys
Filesize177KB
MD5b498f27ca312db96a0cbe6b7405b2027
SHA1d35c9e5bcb3df23855130b783ea80fea8653a097
SHA25634257623c1c563abf99085b4c483a672945bd6059009eb001266f003f315b356
SHA51242d6315047d76b43bd2187f45c2f68182fa2b0e803be8989417e8637c1172391d00c0b3a9b6227852bd4d31a72a661a19e074e163ef04ba2e031b2b4df942586
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\deepscan\qutmdrv.sys
Filesize404KB
MD5cb888ca434a350529a5714a941ccbc49
SHA1c5450d1d2fbf579edb7697f413f8ffe7deef224a
SHA25613c357d31eb6dd253e625c0ac1e94714260b75cf7a141408750b7e0124e94f23
SHA51276545013e16c66904686c8b672e374eac8080f9833852411b2bb21bca065682f93871d45ed279ace95ee702e4de48b205df802aa8c213ffbeb1394668eacb4f3
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\filemon\360AvFlt.sys
Filesize83KB
MD586d92ff1f211f9704d0a5ee744dc5c5e
SHA121120d96da72b7a592dfdbe918e2dd8656f0cd2d
SHA25679eb282821aa728f0fdfdb07a1fba273af83768614e026bc8e371655e398bd50
SHA512b547eaa0b43ccf1af913c94ac7831edaf45d15428fd017d8f41cb8942156a453c381d4526a0b51f343093f854b4c5fdb716bdaa366101ce652cdeeb83f5de2c9
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\filemon\360avflt64.sys
Filesize98KB
MD512426837392e278838d1501a5f324398
SHA13be22df43e2bce3690c92188a76fa33a8a581d69
SHA2564fb3cfbf91bc27e867d8f58081ffd3be361481e2270627825cdfd13eef50ec1d
SHA51228ced26c8acbe9177ff01fb24d7a8abb34f37a0748824508f86a75b162f17371f02318eeae4f27ed183143a22af01c57d074f3b444621209d573aa323071c7f3
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\AntiAdwa.dll.locale
Filesize126KB
MD53e5c2d008972836fc07e8a49b8bc237f
SHA193800eef4f391c97a6ea4bcee8603df850f8a02b
SHA256a03c604691154e436eb21a7eb865c98baf33b83af18570a000ea31ce4ba844df
SHA5126c6db8bbe7eafc2a063c77b8ba7eda2a2ae87dcc98a997e290462e987ea3ce2872613d589272b823825bfda87ea83251672fbd30e705289f74e13e0fcf99e3c3
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\Dumpuper.exe.locale
Filesize1KB
MD5880e5c62a78e5d11c9510f0a0482cb88
SHA1e3b8b36176063545f3ece610851c4418bca6a55a
SHA25687c1dc55f5cd035c6d880d14158e0dbcd193d69cc331001ec456b5b8dfc1753f
SHA51230ca326a95a37873dcab2f15edf69fd80cb6d35fac4501b23e3c8593634eabd0851ab33cf23bc16dfbeb83047db30d9cacf57465af564dbd97eb37e7aca181b1
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\LibSDI.dat
Filesize113KB
MD5552dbf3af7b5615f2c7f5a0c64e03ca3
SHA1a6773abc443d8ce49c88c1554bd7a4196189c614
SHA256f511a0eea52cb982c60ec2a8758007a8d83f8a36bb4b23b27e320cd9441862f2
SHA51264fbe41e296ef5d94cd76496623cfa4f49f0bcf1da4f1a172320b81dc344dc94112d3465fcf1b4df2166746cec8484f2d2f1b2d238dc11eb82014b70ee31ce83
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\ipc\appd.dll.locale
Filesize19KB
MD5f584efd5356e4a1be69209a6a90f8dca
SHA16af86c8fa9c4ea0f28eca735acad675cb32b7ec5
SHA256cde2a0834cb8b6e4fabda07f611567a392b2e4dc23f2fc7921f8b13e774da940
SHA51297c02d900a05dbb2f5ba7cd33f53d4b5c67655d0dd11d6b1c374867570dd7cd5114deb138db277480fb45e608cccf7542d76c4cce7fb5c98356a5105b309beba
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\ipc\filemgr.dll.locale
Filesize18KB
MD5507a7b4e028d292be4ededb6b3667e68
SHA1752121fc2f4c4814a4c50bd6964c6237fbc69cd9
SHA2563ebfed2b2a10b33af330aff197905437ef3970e8c944b7970c097ac0cbb99671
SHA5120b1fb10521512426c448a85976afe9e2e9c356768a5d2e941de022c2194a487055c3c724c08dd4abf1d115f24f80248ccd90a3655544dc17491f0373c603cfb1
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\ipc\yhregd.dll.locale
Filesize16KB
MD54f7febe3f590f61fba281d6d48063aec
SHA12a978cf218ee950728452e62a7e274f0f7b0f346
SHA256285b8717038589756ed43bbefec8d010fdfda1b9726606332c1e3601cf6e43ff
SHA51255193636f87924a75e2eeecbce50b19e7d1320698cdc58fef62dce807c0d462429d6a3034c2eb9e297012e67adfb236db91d05edc4e3514a33017cd379ac3e15
-
Filesize
1.0MB
MD5dde9f4e1fd3c706361cde23239baf8e6
SHA1646f69dec3656fd19579606789d258fef5a45e96
SHA2563d1b69b19a8510d6176ceb011b71d79859c13d4c61541ec7174f344d3a77bb24
SHA512536baf039072c6e6fd1ecbece3291c9b1c5ec01d8e41837bf285cf59015b1212a3283fe85b5d52d7a4bc16bade883b6cca3a94ce40788159a6545a6880ce7609
-
Filesize
790KB
MD5e799b79b1fe826868265dce4c8a6ac28
SHA144af1a3fe155b4ac2da06371a351d056441f409a
SHA256e00a185464266fdd988edb2f4bd130b4ebdce7e064fedb45806f577f1bb19291
SHA512b740eb8c8b4a0b1d5d09da0b3e4d65ab2611bfa83cc97a8b38e419fb9ae975e974738fbf4fb73406c8b3e473d2c092c46126aa6d9aa1525baf41d632d5ae3e77
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\safemon\CameraProtect\CameraGuard\bkg\pic_01.jpg
Filesize109KB
MD595ed89bd379faa29fbed6cbb21006d65
SHA19ada158d9691b9702d064cfdbd9f352e51fc6180
SHA256a66eb91ed6129682ad3b3a57f10a8abf45000062038abca73a78db34c6d66cae
SHA5124e6743dff36966592f07a214d15afaeade02b31b7257f5829882ec00ed91dcf3fb2735c5c1515ce1192994a46d0e58b4e4260a965ed8d225b3bd47034289fc27
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\safemon\UDiskScanEngine.dll.locale
Filesize17KB
MD5045e32511a0e333477ffc2361c3b589b
SHA147eeacaa6381ba81e90a78dcf67c327b9f17814f
SHA256649ca00ba71a5f725ce94baaa4996a8c202103b1821a3529e84c20a8d882d35f
SHA5123693769973d463664d5486a22ec42d8ea722abd3998ab5c6dec4a7656411bc90fa3b58a0c01e5117840c2e8025ad2ad9f81bc86b58635ef22cc267bb3781624e
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\safemon\udisk.locale
Filesize444B
MD52e58b2b687db6fb6cddd3bdf2a875ffa
SHA1f4d700de450bde53877b824a1021dfd9b52f045a
SHA256254161d567ed1ae96756809932715790f4bcc5851eba123bfa6942b2b2d1eb1f
SHA512258f10fb5f61ad672edbf2d719e365e1dadd3854f8ae8abf4005b70324ddcc9cf2c5aa9156bbd9204326d72bdc1b203d2caf06970b177964fe248c2d90859154
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\safemon\wd.ini
Filesize8KB
MD547383c910beff66e8aef8a596359e068
SHA18ee1d273eca30e3fa84b8a39837e3a396d1b8289
SHA256b0a2dd51d75609b452a16fb26138fb95545212eb6efa274f2751eb74ccc5633f
SHA5123d307569452ec6d80056a3a2e0225d559606deab9a6c3913c1fef7ed6aca476d7a00190b1bbfa3d032411c2f52427f3096fce7b7952479ad9b75aa3cef59d7b0
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\en\safemon\wdk.ini
Filesize2KB
MD53997a6acd6764b3940c593b45bb45120
SHA116bd731772fef240ec000c38602c8fcc1b90dff7
SHA256a7883c05518f9d1d2af9773f19f470b25ea94a865fb4d43b9e16518c3434424b
SHA512fcdc2f450f2771174a71acb49663f2de8cd02eb131c1a95dc83ed59d0dcbe676129e960d3fde5d1cbd9d45ff3f7299028827c8806d867fb51925e41a2c24a2d7
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\es\deepscan\dsurls.dat
Filesize1KB
MD569d457234e76bc479f8cc854ccadc21e
SHA17f129438445bb1bde6b5489ec518cc8f6c80281b
SHA256b0355da8317155646eba806991c248185cb830fe5817562c50af71d297f269ee
SHA512200de0ffce7294266491811c6c29c870a5bc21cdf29aa626fc7a41d24faf1bfe054920bd8862784feaba75ba866b8ab5fd65df4df1e3968f78795ab1f4ad0d23
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\es\ipc\360ipc.dat
Filesize1KB
MD5ea5fdb65ac0c5623205da135de97bc2a
SHA19ca553ad347c29b6bf909256046dd7ee0ecdfe37
SHA2560ba4355035fb69665598886cb35359ab4b07260032ba6651a9c1fcea2285726d
SHA512bb9123069670ac10d478ba3aed6b6587af0f077d38ca1e2f341742eaf642a6605862d3d4dbf687eb7cb261643cf8c95be3fba1bfa0ee691e8e1ed17cc487b11e
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\es\ipc\360netd.dat
Filesize43KB
MD5d89ff5c92b29c77500f96b9490ea8367
SHA108dd1a3231f2d6396ba73c2c4438390d748ac098
SHA2563b5837689b4339077ed90cfeb937d3765dda9bc8a6371d25c640dfcee296090a
SHA51288206a195cd3098b46eec2c8368ddc1f90c86998d7f6a8d8ec1e57ae201bc5939b6fe6551b205647e20e9a2d144abd68f64b75edd721342861acb3e12450060d
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\es\ipc\360netr.dat
Filesize1KB
MD5db5227079d3ca5b34f11649805faae4f
SHA1de042c40919e4ae3ac905db6f105e1c3f352fb92
SHA256912102c07fcabe6d8a018de20b2ad97ea5f775dcb383cd3376168b7ebf8f9238
SHA512519ab81d0c3391f88050e5d7a2e839913c45c68f26dabad34c06c461ddb84c781bf7224e4d093462c475700e706eef562d1210cee3dba00a985d8dadbf165c5c
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\es\libdefa.dat
Filesize319KB
MD5aeb5fab98799915b7e8a7ff244545ac9
SHA149df429015a7086b3fb6bb4a16c72531b13db45f
SHA25619fa3cbec353223c9e376b7e06f050cc27b3c12d255fdcb5c36342fa3febbec4
SHA5122d98ed2e9c26a61eb2f1a7beb8bd005eb4d3d0dac297c93faaf61928a05fb1c6343bb7a6b2c073c6520c81befdb51c87383eab8e7ca49bb060b344f2cf08f4d9
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\es\safemon\drvmon.dat
Filesize5KB
MD5c2a0ebc24b6df35aed305f680e48021f
SHA17542a9d0d47908636d893788f1e592e23bb23f47
SHA2565ee31b5ada283f63ac19f79b3c3efc9f9e351182fcabf47ffccdd96060bfa2cf
SHA512ea83e770ad03b8f9925654770c5fd7baf2592d6d0dd5b22970f38b0a690dfd7cb135988548547e62cca5f09cb737224bbb8f2c15fe3b9b02b996c319f6e271ed
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\fr\deepscan\art.dat
Filesize38KB
MD50297d7f82403de0bb5cef53c35a1eba1
SHA1e94e31dcd5c4b1ff78df86dbef7cd4e992b5d8a8
SHA25681adb709eec2dfb3e7b261e3e279adf33de00e4d9729f217662142f591657374
SHA512ce8983e3af798f336e34343168a14dc04e4be933542254ce14ff755d5eb2bcb6e745eda488bc24be2b323119006cf0bdb392c7b48558ca30f7f2e170a061a75e
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\fr\deepscan\dsr.dat
Filesize58KB
MD5504461531300efd4f029c41a83f8df1d
SHA12466e76730121d154c913f76941b7f42ee73c7ae
SHA2564649eedc3bafd98c562d4d1710f44de19e8e93e3638bc1566e1da63d90cb04ad
SHA512f7dd16173120dbfe2dabeab0c171d7d5868fd3107f13c2967183582fd23fd96c7eeca8107463a4084ad9f8560cd6447c35dc18b331fd3f748521518ac8e46632
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\hi\deepscan\dsconz.dat
Filesize18KB
MD5a426e61b47a4cd3fd8283819afd2cc7e
SHA11e192ba3e63d24c03cee30fc63af19965b5fb5e2
SHA256bbabbf0df0d9b09cf348c83f8926fef859474e5c728936e75c88cd0ac15d9060
SHA5128cc7ff3d5a0841174f5852ba37dbc31a2041cdcba400a30a51d3af9caf4595af3ffe4db7f6fe9502008eb8c2c186fe8fa3afd633aac38c3d6b0ad9bc9bc11eec
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\it\safemon\bp.dat
Filesize2KB
MD51b5647c53eadf0a73580d8a74d2c0cb7
SHA192fb45ae87f0c0965125bf124a5564e3c54e7adb
SHA256d81e7765dacef70a07c2d77e3ab1c953abd4c8b0c74f53df04c3ee4adf192106
SHA512439738f2cdd0024e4d4f0da9668714fd369fb939424e865a29fc78725459b98c3f8ac746c65e7d338073374ab695c58d52b86aea72865496cd4b20fcd1aa9295
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\deepscan\DsRes64.dll
Filesize66KB
MD5b101afdb6a10a8408347207a95ea827a
SHA1bf9cdb457e2c3e6604c35bd93c6d819ac8034d55
SHA25641fc1d658e3d6795b701495d45e8d7bef7d8ce770138044b34fbacad08a617be
SHA512ce24418045352557b5d0ed9ec71db00d016938cd0fc2308e3ba0a61cd40ec0df3a9b620e55d28724b509bab3f801b7a88548b0b08b7d868a6046f85a49aae910
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\deepscan\ssr.dat
Filesize47KB
MD536f40d4765175a30a023652ec250c028
SHA12d210bcc0999fce743e11144cdb477435a4f2cf9
SHA256656c1ec3308eec42f541e0bf1b719dab057b11b3f549060cb059ca70d525274a
SHA512825d1607a70ab455089792b62b656d8cc2b8c732f1f79d90ff648f6ed98199fab5acc279978eb1070ded88ed36c108726897678cdbf29ccce2aa9475c0d93308
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\ipc\NetDefender.dll.locale
Filesize24KB
MD5cd37f1dbeef509b8b716794a8381b4f3
SHA13c343b99ec5af396f3127d1c9d55fd5cfa099dcf
SHA2564d1a978e09c6dafdcf8d1d315191a9fb8c0d2695e75c7b8650817d027008d1c1
SHA512178b73ed00bfd8241cc9191dbdd631ae28b5c7e76661863b326efde2dc2cb438716c0b70896ee313436ccd90f61db5226a3484169176f5a4b79ead1fb4451419
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\ipc\Sxin.dll.locale
Filesize48KB
MD53e88c42c6e9fa317102c1f875f73d549
SHA1156820d9f3bf6b24c7d24330eb6ef73fe33c7f72
SHA2567e885136a20c3ab48cdead810381dccb10761336a62908ce78fe7f7d397cde0e
SHA51258341734fb0cf666dfe9032a52674a645306a93430ebb2c6e5ad987e66ce19c8a91f3feebf9bba54b981d62127613dec3c939ef4168054d124b855a511b6d59c
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\ipc\Sxin64.dll.locale
Filesize46KB
MD5dc4a1c5b62580028a908f63d712c4a99
SHA15856c971ad3febe92df52db7aadaad1438994671
SHA256ee05002e64e561777ea43ac5b9857141dabb7c9eed007a0d57c30924f61af91e
SHA51245da43ac5b0321ddc5ec599818287bd87b7b6822c8dd6d790b5bbf1232000092afa695774cd3d9c787919ad02ca9846f7200970e273a99bfbe2aa6bebfe7e8ed
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\safemon\360SPTool.exe.locale
Filesize31KB
MD59259b466481a1ad9feed18f6564a210b
SHA1ceaaa84daeab6b488aad65112e0c07b58ab21c4c
SHA25615164d3600abd6b8f36ac9f686e965cfb2868025a01cded4f7707b1ae5008964
SHA512b7b06367ba9aa0c52ac5cfc49d66e220232d5482b085287c43de2ef8131f5ee703ffeb4d7bef0e5d9a430c0146bb2ab69c36174982184a0c06e6beda14e808b5
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\safemon\360procmon.dll.locale
Filesize106KB
MD57bdac7623fb140e69d7a572859a06457
SHA1e094b2fe3418d43179a475e948a4712b63dec75b
SHA25651475f2fa4cf26dfc0b6b27a42b324a109f95f33156618172544db97cbf4dddd
SHA512fbed994a360ecff425728b1a465c14ffe056c9b227c2eb33f221e0614984fd21670eddb3681c20e31234a57bfe26bcf02c6a3b5e335d18610d09b4ed14aa5fb2
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\safemon\Safemon64.dll.locale
Filesize52KB
MD5a891bba335ebd828ff40942007fef970
SHA139350b39b74e3884f5d1a64f1c747936ad053d57
SHA256129a7ba4915d44a475ed953d62627726b9aa4048ffcc316c47f7f533b68af58b
SHA51291d1b04d550eda698b92d64f222ec59c29b5842115b3c3f1159313b620975bc8475b27151c23f21a78f60abd6c7fa9ce5cb1ea45f9349942338f9bf0c8cfc99f
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\safemon\SelfProtectAPI2.dll.locale
Filesize21KB
MD59d8db959ff46a655a3cd9ccada611926
SHA199324fdc3e26e58e4f89c1c517bf3c3d3ec308e9
SHA256a71e57cafb118f29740cd80527b094813798e880de682eca33bfe97aaa20b509
SHA5129a2f2d88968470b49d9d13569263050b463570c3cce1b9821909e910a8a358e64ad428b86095a18f596d2b3ed77e0e21d40f9c24543e4a0872e6b35c5103bede
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\safemon\safemon.dll.locale
Filesize53KB
MD5770107232cb5200df2cf58cf278aa424
SHA12340135eef24d2d1c88f8ac2d9a2c2f5519fcb86
SHA256110914328d4bf85058efa99db13bfec2c73e3b175b91dfd6b41c6fa72ebaa103
SHA5120f8b98ded900d9421eb90cffd527d8218b14354d90b172d592c4945c482191d5e512f2678217c6214addb38da0b9bb9287f84963a50447cf232962bd99b0c3e8
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\safemon\spsafe.dll.locale
Filesize9KB
MD522a6711f3196ae889c93bd3ba9ad25a9
SHA190c701d24f9426f551fd3e93988c4a55a1af92c4
SHA25661c130d1436efba0a4975bc3f1c5f9fdf094a097d8182119193b44150344940e
SHA51233db4f9474df53ce434f6e22f6883da100473d1b819984171356eeef523ba534c4abaf2536596b8758358e755e5d9f3793d85be12d2d8d5284fc7d13f6c005cd
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\safemon\spsafe64.dll.locale
Filesize9KB
MD55823e8466b97939f4e883a1c6bc7153a
SHA1eb39e7c0134d4e58a3c5b437f493c70eae5ec284
SHA2569327e539134100aa8f61947da7415750f131c4e03bbb7edb61b0fab53ea34075
SHA512e4ea824314151115592b3b2ad8cd423dc2a7183292aa165f74f8e35da4f142d84d296d34506f503d448c7bd423be6bf04da2412b7daf474fbf4ef6a2af142bfc
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pl\safemon\webprotection_firefox\plugins\nptswp.dll.locale
Filesize10KB
MD55efd82b0e517230c5fcbbb4f02936ed0
SHA19f3ea7c0778fedf87a6ed5345e6f45fb1bd173fb
SHA25609d58a2f0656a777a66288ac4068aa94a2d58d0534328862b8371709eab2003b
SHA51212775c718f24daa20ec8e4f3bdede4199c478900b12addcb068ae7b20806850fdc903e01c82e6b54e94363725dcff343aeac39c3512f5ea58d1ba8d46712ad33
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pt\ipc\appmon.dat
Filesize30KB
MD5ddda5be2e45d1c5229cd561a03825908
SHA1d9207564dc229c9a05d9a7baf8c7e2d17c62072b
SHA256c308ee41e48cc498c396a2ccbc57b7d29d058dd145f9867887544cb74112d63f
SHA512b16a67086a9d435ca17e35c7effdb639cf934a8671cf9f99f4e8f6846ad7e71be71aed3bde77a63f3189c155391efe5287589cf6332dc8be02e52c90c924efb3
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pt\ipc\filemon.dat
Filesize17KB
MD5bd29091ba65b3fc08c79654997b4c82b
SHA13b353ec41dcc96d898715f6474656f13931c1b61
SHA256a3cfc3c8f95f0ed56306d28ac87408f10875c43bca7778c6e1cc18c7a3441183
SHA512ae64dae0e4025968bfb14e57c2faab0c9da39943dae9c884cbbd940433b29613c090b98899db847c94b265f969a6ed3cfebff35af284ca9619e6e25937067650
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pt\ipc\regmon.dat
Filesize32KB
MD5f507c8db8f8ec9361f36608408c9939e
SHA1f3915edb67fc281dde5657b383e3a5aedfe96bb8
SHA256dab50e3c2787808beeb0b377ad7c3de2c518578b9f7a4ec4ac29063d59c00b3d
SHA512cb09e4f033b873211bfa8b8b82fa207ea5c176d8d686487c2253214f5f965734d2a16a04ae41b849ffa20b3b03814714274b749f07dbc28a0a5676a86630feef
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\i18n\pt\safemon\wd.ini
Filesize8KB
MD5a134096bc6f63448b64cf48c6463b141
SHA17b4ef26f68ba2cd35365c4a158fc842445ce0874
SHA256de1d0fa92911957aeb41a68403b53e96d2b8294a4bc6c3daca4cc2876fac1d8b
SHA512ad46ba27f8438ef225e0613b7defcd6faaaee0e734d7364b37ee3712e5f12429abd6012a9ff870b6943db744b06a5e4379ccfe1cab50d40eb0729688c8cd72f7
-
Filesize
218KB
MD5feb5d9ad5a6965849756344f9947a772
SHA15e24761e4e5b7d6c116c0146ded4851db55c8f7e
SHA256f3f3faa4a6ba4e81271e25e99badf4318b84637784d563a84a017c5f46ce291e
SHA5123110f5a76e5967942348bb13a669ff03c21beb9c62405c552b530eec8060a9b304d76f990ff8c4cecf67a4d1f66e6a32a7388a951036fa641fa98679c302b9a0
-
Filesize
331KB
MD537ef2ad85bca66cf21af216ab4e35707
SHA11569cb84354ed47f97844833807ed5a07dc5df92
SHA25677faaf6c67ab95db1615275410d2dd611208fce0e80771bd009cf0f8f98cf74e
SHA512e2b85223b86b8c339a2794f3e30f601c877107c5a7555ea33c173e6a79c3626a623283249d8a62fb405fdfd54ec4ebc802977d74533d8fe3ef41fd97d231b035
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240715100128_259818495\temp_files\sweeper\360FastFind.dll
Filesize226KB
MD505a04412b0a86f848eb92a97e81f3821
SHA1a6495836bb9915eec2c559077a44861d2c5c8182
SHA25645a9d2180bc3a6c5716a5ccbf74b14d9e91fa706449aae4046c0835cc672f5e5
SHA5129074ac8882bcecafe4726ebe9625b57ec4410cc2f9a8293462287c76f0904b1b9d4ac181edd99a3e525a36b307497b3242390fe19d41ed2420b3d70682e67244
-
Filesize
5.2MB
MD59f1b088ecc5e2f36939797060e8f5956
SHA178adf95b81e539d1450c61a8d135f5f836bcd4a9
SHA2561caa0f7f2913218f5bcd069a52aad482396914780d89f77c6610b70b36dc1e13
SHA5126bd73db75e7c7493ac6e03e745385641c4eccaeb1d8e96a2b157e1d4043d42990a05edd6702f28e25d4a25d4e39295739f1a6a6ccf89e629f6010ee8ebd66212
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.4MB
MD516de0dd53fcb7ed02b58e5d3e9ab6d25
SHA17b87440c2ff30ad47ecd2a459e487ce3efec1877
SHA2562934cb7607c686e378b78f684ae3837abf2791b503a1165b28d915defd09b9c4
SHA512a07692835e6bc9058b82364a44e3619a96ab6cd11d881645e57e6f6a68d66831e9af1b68c39ecb6e3f08969c5caa71fef788fb8272fb1b0f15515eac246966ff
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
4KB
MD52f69afa9d17a5245ec9b5bb03d56f63c
SHA1e0a133222136b3d4783e965513a690c23826aec9
SHA256e54989d2b83e7282d0bec56b098635146aab5d5a283f1f89486816851ef885a0
SHA512bfd4af50e41ebc56e30355c722c2a55540a5bbddb68f1522ef7aabfe4f5f2a20e87fa9677ee3cdb3c0bf5bd3988b89d1224d32c9f23342a16e46c542d8dc0926
-
Filesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
Filesize
256KB
MD50f722e725ac50271f9d6db477e8c0d17
SHA1d34259cfe05b2ba9c9e5256a3ce513d4bc5afbe8
SHA2567615a4bb88a5680cfead49c1774013ce48c4c7343cb82d7585f7935c705400b0
SHA5129a58e7d1537f28f19dc6e63b36d422748d851b68a8b3eedf69f531d502d9163e41f4d9cc9d782fd6fc70fab269f04dc9907422bd80f5dd265edcc0ae6bddc77a
-
Filesize
314KB
MD52dd0a1de870af34d48d43b7cad82b8d9
SHA1440f4f1fdf17a5c8b426ac6bd4535b8fe5258c7e
SHA256057bc6c47c47aaccdf31adc48a6b401f6090a02c28e354099eff80907dc2af32
SHA51283df193ab984037b940876bf6371020b4bb13af74e988abb8ad6a30d48ab6cd9dc5c08937e58abab93278cc85c9d79c373688b2c51c035fdeffed639c933e8ff
-
Filesize
176KB
MD5b9077621ce786b55c176a61456bfc077
SHA15f164e1bc0b6573bac876e38ca1bb2e60ff0627e
SHA2566cedf381d59fa4caabfb836e9a3720420645cbcea32491a5ac5f07cf274ceac6
SHA512b1f2c599804a2d0ac51d3adfe7b2d0a21c5fa1e3d8d83d932f42d30bfd26aad5972d96555097a60f8fdc4d34ed24bad2876a89cf0b27b8cd01c72c0ba8f4d02a
-
Filesize
221KB
MD5be2b0736ea029fff398559fa7df4e646
SHA170fc16edf57e15567cd70f4d919c93dbbb072dbc
SHA256c05a79296d61e3b2a2ebaf5af476839b976d69a5acb6f581a667e60e681049a2
SHA512c6dd35579b664e37721d470b2e3c4d8ab681a1bc32c4994b1ca9e5e042fbc21a78f4a3ba775d01b919f8dbbaad08f9eecf6f8dbb7f0224fb72b819b615993011
-
Filesize
975B
MD50e5fea82cc4f4a8225532e5b2f45c6c8
SHA1b163d952a4a5b0c3ea40da2b47f95e624e344c96
SHA25681b5f50491579127d13e050847ef6d817265ab4b70d2796fb74021463b778bb9
SHA512051507296cd4d51ce4d34f0d1dd0a078f7598645ec42321335cec5719152c05dc611c663c67b3265e3baf14fd6e0c93788e2d0b04c6e5c16f4203dbd206b3f44
-
Filesize
33KB
MD510626eb43a0b5d515cff38b6ae4086d2
SHA11272a651ff81cf4e03c0489f74dabc275883d773
SHA25622d1cd282fc08a22d387202d21ce5803683b12d77ef693b3fb0bffc692feec31
SHA5121aa8f0f5cb2e3843237671dc4a22568432bf62637c0019c04345ffbcab2ae2bd40b7c85bff62527dd52e0d02a8b11b34316f9a70d45c043122b542e32a7dedfd
-
Filesize
202KB
MD5a4fdd77e182bd2fabe300a47b5617a35
SHA1e002b335c75b5edefcd251962f61f53a2ab8e0f2
SHA2568b59592d67eadc703af6cdd5ba8d077f9f9485d01fb6405555614335f89be99b
SHA512ddcccde1c129f8f71fb39685abc615c4202b8b3dfc12cedd7d9cca2f97b308fc14b64497826421fa9df3d1cf54bdae9c085051af0a8d393cd3d556a6578d4085
-
Filesize
89KB
MD5ea75b2a8f1b4241a872b1cbddbaed154
SHA118678dd78c1f5a3525127b442bc70375faf09c16
SHA2564a62927a380e201c4ee51321dcc1e6b1f7dfbf82049cf349df990629e01e9178
SHA512dc69cd4703dcba3c8f4a52058c44a34fa7c0b6096bed20f30ce3dab872461eb6dda9d0d381137b9cb022219ad92ca7f5f25d3964ed33d5f41e9fc05efa5330fd
-
Filesize
826B
MD537a05031bec9d3e093388407848af66f
SHA15b48a5b72097ad98eacf54e956e94d26710a0493
SHA256cf38f4f8663028beff3a7650a9d426b4116891e8547029b66b8d2a13fad63a48
SHA512db3af55b93e901778a74f462af1f80a3e4181b251b061f858a3a6dadc77f2eaf4760c30f4ef9ae5560418eadb6133d474289c3b84c0e89615670af722d8dab9f
-
Filesize
13.8MB
MD55b96eeb05f1ed9a060eaec9f09e8598f
SHA160fcb0b36235ce0e39c9005a36cc5cf406867422
SHA256064af152525bb86b04047233f4064905a3ba0025f2ec647c5eba953b651bf6e9
SHA512e80b5651c71ad6a85a2548ceecfe126f32f1ca96c7b0059dd02ea2f13d3ae25140dc8a71556944bb57a019189a0d4852301ee8baf214c225291cd8991329c882
-
Filesize
412B
MD5279859f0afffb20ffa0d7714916ad510
SHA19ed748737ef6a48950a28d5416925e51de4bc9c7
SHA256cf6ed1c0272f4ed2eb91e15d7ec4a945161d3b47eed524eca9d76778021ccad3
SHA512536efbb6495e571601597a8b6475c127993a668d10efbd5ee81fcaa72d279289806897363b8f8e9ccd2e2e5453010a4c092f6d39d3360d1939918f9400ee2040
-
C:\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\@[email protected]
Filesize933B
MD5f97d2e6f8d820dbd3b66f21137de4f09
SHA1596799b75b5d60aa9cd45646f68e9c0bd06df252
SHA2560e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a
SHA512efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0
-
Filesize
3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
Filesize
1KB
MD5811ef8f7697b43732afc1e72f608c7ff
SHA194d74eee87d85af865ac53380826f4bb38218866
SHA25605551370b7975f4007a165469981820be03376e0cc75b0144c0295b28a9326df
SHA51286d32ba942486ddb6b0ffe44dc2f6bae982367903459fb07bcce070cd624ec3c311a38b3ab0804011f162c22867a7615afe46e71780cd7c69adc6b12040d5310
-
Filesize
424KB
MD5e263c5b306480143855655233f76dc5a
SHA1e7dcd6c23c72209ee5aa0890372de1ce52045815
SHA2561f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69
SHA512e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113
-
Filesize
50B
MD53167d161336cbd296dc579d2295b0f22
SHA153253e5841e6a7a7a1b8bd08378af0a96b2f9a98
SHA256307879bf0d9bec07bab240b5010434801fbee520c99c5a617e8ac630f42dde80
SHA51262af8fa0c9a30ec6aa9b552fcac1879af1f00f5ceb48a77718b2a8e042e3524e2cd299f26fcde31ad8abf2dcb94d15cf45ecbce0bd5f9f93f44aca6327aa53ea
-
Filesize
44B
MD59a2ccbd3e2f1a2382fed7674c28dd086
SHA1b466bdd2079575c938de65285f02739143ecb170
SHA2564519cd5997afce27129ef943f121972f7b0b34aa018e4dd408892fc5c39bb59e
SHA5128929493211c17a8e99b908a8305dbebe2d96e1b54426e89ddba84c2010a86d7f6d0983080f29fa1ab7a0687d536c0546278b9fffe4560d84e4012f243f344d78
-
Filesize
56B
MD519cf22e8d63e787913b6617542211e19
SHA18c3d2f43025e5c4ef70e0c4d1f36692361f51b1f
SHA256dbec312d736f8a56f94ace99986d95d4355ef644a2fd908da1ff4c8b0a003979
SHA5128b9d192dd7f175e63aebcdfc8426876fa8bf3ae00d3cf10bb8fcf0d0c262b906de28784f5b97141f656e87bb548d343b8d5a127c06ecb407289e91f3fc199608
-
Filesize
2.0MB
MD52d183522f195d563fe2a732363b8f757
SHA18b4ba6716e8e635b2b35ee64134784c788fa1b0e
SHA2564b6d2615f53454076b996a91473287e5fc882ce266933cfbe815a63477ed8407
SHA5122c37e38214ed90d21345a8675424cfe3086cce34acd19972081479946c541b747b97cc722910189f9b5e7e8bcd56de0b2326407b3008de6763c40366ceffc67b
-
Filesize
843KB
MD5ff508ab78289efa35e67a05d6cc20717
SHA1174f616661b53371fe93fa5cc4ec4b6e233abb43
SHA256eca41ee73faaa7e85ecf4d4c6d4df0e078c36c6554f25142b5e68b2b6cf68272
SHA512f94fd558e34589c8b0f3da7d20bbb404c4dc6e560aabc5f7e702cdf6a6b8a7870d63d8fb667f6324461ed37c32f6ff8abb0cee65317c6ad745e61c1fc7c80811
-
Filesize
140B
MD585960c66edf9a8db4e5a17d9f15b6ae3
SHA1fb27f19a4e8f55dc2c77d7570d472e8df801531b
SHA25681a20f21135c05252a3dd2042ff39bf044624c79f6d9ec9fd412a8c9b38d83a3
SHA512c8b81cb4901039c5ac26bbf2e98b40db60bfd6ab37d7abbc030d1ba11f78485a148935539c09c2cb5c983f14d66b0fdd9d49c138a1340690b2aa69de35d4975f
-
Filesize
4.8MB
MD539490d6ae5b10a8cdffecd71d05141dd
SHA1450da6260c6817aca8d9444831a48439ba45785c
SHA256a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb
SHA5127ffb9cb6a53cf233b6ff396eeb6193e683aed75001b3f73a1bbadaeec3ff7dcbce9b7e215d1743a4374e488185b824b90dde4afe93a8d93608b6340af07c14fb
-
Filesize
908KB
MD5e23ffecb44c814aaa4708d56ab5b144b
SHA1202311d615685e7baaa41dc149b5a76a69c05a0e
SHA256d395af3c10e18c944cf8ade76a650623dc23e050eaf652ff31056c84077a013c
SHA5124ae915fb4cb00e30a215ddd439c6e254fb49ce15c4d53000fb12a0cbf5f68820bc7dca6b840a620351060101c6995fd9429ea91f9682503f01ec001f213cfdc3
-
Filesize
112KB
MD5829e4805b0e12b383ee09abdc9e2dc3c
SHA15a272b7441328e09704b6d7eabdbd51b8858fde4
SHA25637121ecb7c1e112b735bd21b0dfe3e526352ecb98c434c5f40e6a2a582380cdd
SHA512356fe701e6788c9e4988ee5338c09170311c2013d6b72d7756b7ada5cda44114945f964668feb440d262fb1c0f9ca180549aafd532d169ceeadf435b9899c8f6
-
Filesize
246KB
MD59254ca1da9ff8ad492ca5fa06ca181c6
SHA170fa62e6232eae52467d29cf1c1dacb8a7aeab90
SHA25630676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6
SHA512a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a
-
Filesize
47B
MD55e578014c7017a85ca32f0b7e5d7df7f
SHA1c88d8e7179fcc070d4419be9f4d8647354c2f6ed
SHA256a964a717e3c47cb7d274e98928ca1271377d0d76a8908448e1b70e63af4082ad
SHA5127eb206b0cbc2a9b744246d8a83b2fccc70204c6e777b0fcbb838e63d477fe047d8827f3c0de823d55b9ab5cba2ab572ff3f543f76a3451fa81b31584cc767106
-
Filesize
43KB
MD5b2eca909a91e1946457a0b36eaf90930
SHA13200c4e4d0d4ece2b2aadb6939be59b91954bcfa
SHA2560b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c
SHA512607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf
-
Filesize
37KB
MD54e57113a6bf6b88fdd32782a4a381274
SHA10fccbc91f0f94453d91670c6794f71348711061d
SHA2569bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc
SHA5124f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9
-
Filesize
566KB
MD5c4aab3b24b159148d6d47a9e5897e593
SHA17061c2e85de9f3fd51cccdecb8965f1e710d1fe5
SHA25603a4d3563a7519542c662b5fd5d61215f3d76a3902717efe11230292ea4bbafc
SHA5129bc522ff0d598a1f1425a09a2794584c4991a99bc382b0ee9135311950cdbf2f5331ae041a4b01052735b5fae3a2763ea1b5c01ce679b07fba73c6f75cb4c252
-
Filesize
25KB
MD5aebe09cd7095ec201dc8acc350443242
SHA1df7337e051bd02e1fdd4005b63ed45b8ca3d9726
SHA256405d47dca73a5d6180db42e90c35931047c666ed1f1d6fab5ead6110c2356cc7
SHA512ffc658faf04fee47c1284d439a4c5b3931d2f9bcac9b40e36f59ad0ed4917f0252e639284f817ca84a6da57552f8e0fdf96936987c3f5cf689a537e42b47288d
-
Filesize
111KB
MD5e87a04c270f98bb6b5677cc789d1ad1d
SHA18c14cb338e23d4a82f6310d13b36729e543ff0ca
SHA256e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338
SHA5128784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13
-
Filesize
158B
MD54af4ab45205580fecf659dd857522f6b
SHA178ec5ff7647ca56d8c8d72b4da551efa86e53675
SHA256b997f3a0d79493418f3e9da03dd95aea6b45b8a8c454e8e7d1f06de3ad3e1111
SHA512f77c7b4d034def85c363805fe625aefb4e461770418f9015d4d5241fb8d09707b9918d54e9b2cc35d06008097174cdda0bee9702466fe7e097014794fe4d77cb
-
Filesize
578KB
MD5533d78fdd538bbeee31fb0b72a8cfb7c
SHA1cb0e46804e784525f5bece40d51772bbdd9a5dc4
SHA256b7a4fcc7f474c091edc09349af5e53915d23f14071d78a3026c92c49d2467989
SHA51285e393cbdd2b20da8892173c7951ddf8e75dbfa29cf81fa725a2da56e606b848ea8a6636528d4fe26eca5e6b251406ec870242fe0d44e7863bf22c739d7759d5
-
Filesize
5.0MB
MD5929335d847f8265c0a8648dd6d593605
SHA10ff9acf1293ed8b313628269791d09e6413fca56
SHA2566613acb18cb8bf501fba619f04f8298e5e633cb220c450212bbc9dd2bef9538d
SHA5127c9a4d1bec430503cc355dc76955d341e001b06196d4b508cc35d64feb2e8ba30e824e7c3a11c27135d7d99801f45f62a5b558563b4c78f89f5d156a929063fd
-
Filesize
198KB
MD5e1c0207c368fe71324485f3dd84bd07d
SHA17c6c1744fdfe6290717cff7cc558d6a673a25c65
SHA2563014265a9d1f9c2e1f4354f759369f913b7c34a0319fe4f4d796453b4fb5b399
SHA51225c09a0f07a9161d8dd7fe348029ebd24ec5adb11da307bc01daeffe16609d241162fea4d03ce8ba480d0960ac33cd864ad5898055427686a06ae384983d910f
-
Filesize
3.6MB
MD539ac0b1da37f1c2b521e3da09e82ae28
SHA1a5d8b4968692e904858d89fe1d2af9010eabe168
SHA2561d75842198ab950daa78817c9e4cfffb2b5bf14ba415836df941852c154cb4d0
SHA5121aba4557ea56950befa9ded74b33f47af86bd161b4d03a94c608f3844850698a801957a2e3a2b8d7c5250cf8ae848222d2135700ec35ca2fbbbdea526cd99369
-
C:\Users\Default\Desktop\@[email protected]
Filesize1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
Filesize174B
MD57f1698bab066b764a314a589d338daae
SHA1524abe4db03afef220a2cc96bf0428fd1b704342
SHA256cdb11958506a5ba5478e22ed472fa3ae422fe9916d674f290207e1fc29ae5a76
SHA5124f94ad0fe3df00838b288a0ef4c12d37e175c37cbf306bdb1336ff44d0e4d126cd545c636642c0e88d8c6b8258dc138a495f4d025b662f40a9977d409d6b5719
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini
Filesize174B
MD517d5d0735deaa1fb4b41a7c406763c0a
SHA1584e4be752bb0f1f01e1088000fdb80f88c6cae0
SHA256768b6fde6149d9ebbed1e339a72e8cc8c535e5c61d7c82752f7dff50923b7aed
SHA512a521e578903f33f9f4c3ebb51b6baa52c69435cb1f9cb2ce9db315a23d53345de4a75668096b14af83a867abc79e0afa1b12f719294ebba94da6ad1effc8b0a3
-
Filesize
174B
MD5a2d31a04bc38eeac22fca3e30508ba47
SHA19b7c7a42c831fcd77e77ade6d3d6f033f76893d2
SHA2568e00a24ae458effe00a55344f7f34189b4594613284745ff7d406856a196c531
SHA512ed8233d515d44f79431bb61a4df7d09f44d33ac09279d4a0028d11319d1f82fc923ebbc6c2d76ca6f48c0a90b6080aa2ea91ff043690cc1e3a15576cf62a39a6
-
Filesize
2.5MB
MD562e5dbc52010c304c82ada0ac564eff9
SHA1d911cb02fdaf79e7c35b863699d21ee7a0514116
SHA256bd54ad7a25594dc823572d9b23a3490ff6b8b1742a75e368d110421ab08909b2
SHA512b5d863ea38816c18f7778ef12ea4168ceb0dae67704c0d1d4a60b0237ca6e758c1dfc5c28d4fc9679b0159de25e56d5dfff8addacd7a9c52572674d90c424946
-
\Users\Admin\Desktop\yfga_game_c37af872-6575-4044-8008-f6f77c773b3b\AxInterop.ShockwaveFlashObjects.dll
Filesize17KB
MD5451112d955af4fe3c0d00f303d811d20
SHA11619c35078ba891091de6444099a69ef364e0c10
SHA2560d57a706d4e10cca3aed49b341a651f29046f5ef1328878d616be93c3b4cbce9
SHA51235357d2c4b8229ef9927fa37d85e22f3ae26606f577c4c4655b2126f0ecea4c69dae03043927207ca426cc3cd54fc3e72124369418932e04733a368c9316cf87
-
Filesize
1.1MB
MD53b89914c7bfe5487af38f7bd8dc31bb5
SHA17204cce974e02495f58731e961e4cdc49a2f1ef3
SHA25614068d0948dfeedc5908573fcaa2704536faa8b0fbea8caac61b9fb264cc204d
SHA51273735b965a0c948a4126bad31ea54fb4aa31b2c8877ab772f7596a27e821be9f6bba17ddbb9f4e87c6c70bba93375277008e4fa354bf1504e1cd2b9b190d45f8
-
Filesize
467KB
MD5ab65e866abc51f841465d19aba35fb14
SHA1ec79f1f511a199291b0893bc866a788ceac19f6e
SHA2562ac0ca4ffda10b1861dd4ae0c2f0131a6400214cb4f5fa33951f3062b784a755
SHA5122474905f174635b236e5f6e8f8c497e44435c94edd02ec47d3440c9a216f6840d040e6acc5fe2ec301ada80467f6cf55225d6361c1e7c6c6c7edccb9e7b5a35e