Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe
Resource
win10v2004-20240802-en
General
-
Target
Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe
-
Size
4.1MB
-
MD5
9d0c5936d9ceeec933ffd2c1db6c9f01
-
SHA1
45d4b313aa04723b0ec1dd430345e526ce6b53e9
-
SHA256
bc7427f7b53f7a399f6215537fe97cacc1b76eefb6817faf0954a4d4352facc9
-
SHA512
ecd887b9fdeb42c4f6c09fd6affc34f8c68d891de91b8e75cefd18e82aac61ad68d132ce89abd07ac1f82771fab840fe78b85168a1f88bfad7a217d49caa7df4
-
SSDEEP
98304:00wy+TFo2/dmj89hjQ1DLNZuvUpayPFrQ5qTaSLYgQV:7kTFXdRhkNNZuv2dFPaOLQV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2676 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe -
Loads dropped DLL 4 IoCs
pid Process 1900 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2676 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\syswow64\GDI32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\SHELL32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\ole32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\SETUPAPI.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\DUI70.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\psapi.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\winmm.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\CRYPTBASE.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\opengl32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\DCIMAN32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\CFGMGR32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\explorerframe.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\shfolder.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\imm32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\hhctrl.ocx Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\MSCTF.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\DEVOBJ.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\NSI.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\SHLWAPI.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\LPK.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\imagehlp.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\GLU32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\USER32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\advapi32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\sechost.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\SspiCli.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\OLEAUT32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\CLBCatQ.DLL Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\DUser.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\ntdll.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\version.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\msimg32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\msvcrt.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\RPCRT4.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\comdlg32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\dwmapi.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\ws2_32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\wsock32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\profapi.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\KERNELBASE.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\USP10.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\DDRAW.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\uxtheme.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\SysWOW64\propsys.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe File opened for modification C:\Windows\syswow64\kernel32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\mrantifun.net\Total = "349" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "225" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\mrantifun.net\Total = "225" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\mrantifun.net\ = "349" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\mrantifun.net\Total = "245" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\mrantifun.net\ = "245" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\mrantifun.net\ = "225" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c312970b05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003aab0d4bcea4c9aacd358b201218ffbefed07c5acfe6bfd569ceb6584326421b000000000e8000000002000020000000b485ab436d32d1f4aa7baa201fbe587ad6d6adfa0b040e592aad1e51b177640f2000000014753432247d79dd0ea0a07d71bd95872c86814cb19f1887074d3b8aa38a2df140000000662630db5767dbf865bffe58c93afe6d668d7223d26ad67467f4696c7c03f8e922a78f002f35e7b76d7366e088e76d46af24ce21657e06c3c84a17d3e9ae4af7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\mrantifun.net IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432304349" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9C1F151-70FE-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "245" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "349" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\mrantifun.net\NumberOfSubdomains = "1" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: SeLoadDriverPrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: SeCreateGlobalPrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: 33 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: SeSecurityPrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: SeTakeOwnershipPrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: SeManageVolumePrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: SeBackupPrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: SeCreatePagefilePrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: SeShutdownPrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: SeRestorePrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: 33 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe Token: SeIncBasePriorityPrivilege 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 1816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1816 iexplore.exe 1816 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2676 1900 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 30 PID 1900 wrote to memory of 2676 1900 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 30 PID 1900 wrote to memory of 2676 1900 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 30 PID 1900 wrote to memory of 2676 1900 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 30 PID 2676 wrote to memory of 2684 2676 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 31 PID 2676 wrote to memory of 2684 2676 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 31 PID 2676 wrote to memory of 2684 2676 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 31 PID 2676 wrote to memory of 2684 2676 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 31 PID 2684 wrote to memory of 2908 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 32 PID 2684 wrote to memory of 2908 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 32 PID 2684 wrote to memory of 2908 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 32 PID 2684 wrote to memory of 2908 2684 Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe 32 PID 2908 wrote to memory of 1816 2908 cmd.exe 34 PID 2908 wrote to memory of 1816 2908 cmd.exe 34 PID 2908 wrote to memory of 1816 2908 cmd.exe 34 PID 2908 wrote to memory of 1816 2908 cmd.exe 34 PID 1816 wrote to memory of 2052 1816 iexplore.exe 35 PID 1816 wrote to memory of 2052 1816 iexplore.exe 35 PID 1816 wrote to memory of 2052 1816 iexplore.exe 35 PID 1816 wrote to memory of 2052 1816 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe"C:\Users\Admin\AppData\Local\Temp\Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET55AE.tmp\Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe"C:\Users\Admin\AppData\Local\Temp\cetrainers\CET55AE.tmp\Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe" -ORIGIN:"C:\Users\Admin\AppData\Local\Temp\"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET55AE.tmp\extracted\Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe"C:\Users\Admin\AppData\Local\Temp\cetrainers\CET55AE.tmp\extracted\Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe" "C:\Users\Admin\AppData\Local\Temp\cetrainers\CET55AE.tmp\extracted\CET_TRAINER.CETRAINER" "-ORIGIN:C:\Users\Admin\AppData\Local\Temp\"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start http://mrantifun.net4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://mrantifun.net/5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57488ce714b0b3f2b5b4131a8b53d4d73
SHA10fa5edea39c0315391bf1855341cd73c7f5f5c8f
SHA2563ac161d3680fad38d50a6d26969576849b734ba8bca523a249eeaa83f67bfcd0
SHA512094260f305fe0f2b35da243b460069b0622a0460079ac00eec770fa5151e46cb929ad4e6e15134216d7e0993998d9344009e7363ecc74fa6b0bb07e957065d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac580baa689fe8646924b811689f1cc0
SHA156b7418b2143a8b18e0be156d49a4758e06da9c0
SHA2563247ae24f8582256a3ad77804192f6b83da2e58449b3c7b6fcd2ec6e9e77a8b7
SHA5129c3441d8ad7af505abd583698aee62d2beaf016ab1dee720e643ebcbfdaa199510deb8d03eac820f00c64eca6f4ca0e22c97391050b8b9bd822fb218b1510ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529a70f2e86bfdf995d6c27175c3d524c
SHA1bb20ce31aa1797da42d70712c688ee9fd45507f6
SHA256f15a7c59ff4235aeef360d398cdfb822e851c65acf16760e21714ec2ddb44823
SHA512c134a20884ac8c690ba8de6b22235866dc2607992d683985d52f8577d4e494b8ec0f75ddc6a3f0e25919a47453b8259823dcfb86c4cae8cd73ecea1c948a1edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275b6c719e9ac5ff95f2667e7c0bd641
SHA12c6ef1f1344c3686ae5f43dd6392dcc761119ebd
SHA2560de57c917807b8544228b9dc595b9e2457b930efc22f188366c656a28480b99f
SHA512aec33abc25a02e3b8f5bceae5b806c002c864c875c9f7702fd594dada3f8a20b04a4ddacbac045fa2d906b1bd650099ac823f04a4c4cb94ce9a0fcf189e7566d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edeb2c66043cee452a005f390ddbb9f0
SHA1b81f5e3a9f92d4f354b7d1e6d5f88f18c46d8210
SHA2561593e9e3eb169aa1737671ae721d873447eae859238809262e2367b0e813c3ce
SHA5122640802bace2d10440a992b00af203e4781bbffd69c009130fe395ce6dc1994ba3680a1f2564d3c50b83154745aebcac4d358528a120288a80d5d8981d4c204d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7772d80cb7ca1c96dc1f8b6d5844d4
SHA1d0aea4779566321b3b7d87cca3dc8b6159871a3f
SHA2568393f9921ad474b95b86415a24a561a326a4449c9562928af896b21f02c26cde
SHA512a53d7a16c85e4dca5f8d4900aab443e492876e406554763d74fe81d5f1d254a3443bae967511af583f9832c3f29f4c5fd7264e2b0cecc85f4d2be1e07cedafa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b976992008bcd3437b0c1a4a40919db
SHA1c430840c13606bd99f98d8dbade0f1e1aadb1211
SHA256fa9eec3876aa717c274ff5f1aac33a47b4e4902b127f8054695685260fb554e7
SHA5120eee7e48c8cac9a1496827666230e8c84136a521da173a4073052e245f7a3f055996da4adc39128240627ed2dec068e1592f25303069eecb21fa4405e710388a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be14efcf0cc4a2c93133afcc06b11c4b
SHA11a7eb030e4fae08559fea5fdd5c434b6d228fc40
SHA25648fa3bc4d24975e019e9932d7638d997866dba72c784cf45ccd74c6c416e0bcc
SHA5124df26da09ad36fbe1e437acf74ea8b6de08a78ea6f5fa12e46e08a03e54695b24731bcc8b011d0a28e0c30d411565da6d5fed83474013e75b713fef34dce60fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b15d52e619edfa9a5d135bef43041355
SHA1175560b63019c61beaccf1f668b6acbbdbbf9fb9
SHA256e9dcee5e3ac74323b1d72de04e6e0c78b48b47e7192c5bb2b1003f6e0eefbd29
SHA5128d57c5e6504247bc0fde9870755407056a96bd23a2d299d0312c3d361ffd9bcf1016d1774cbafdb6fe7ccdbd954fc96ae55afe4e5586b3b96b7b1843c4ea39fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a62f5567ec5a7e33d5cba003a50b58
SHA166785052e440e867953c36c3dcb1a16b9899c4f1
SHA256c4c12332cd06f891876211a177d26d05ceb19ee5c95ac0bfdb29e902732d51a3
SHA5122d8e763cc50eb8b8d745c260c8dfc7882c048c9323a5ecf55d9c79bd65c6c13587d7975a7a24667df3d93f66b4eba8e52247055f1a0cb06701f153668a069630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a3f8a8ad37f63fe1f209627d80fa4c
SHA1101d8adf1969ce68cb928b07e6365ba737c0d0c2
SHA2562f251a04636119e573e835a2d8fd09e4f5a3443489a4fe2526a82b16d79ed192
SHA512a6fce6835f9a7711e409129d9d37a30f8e690b0d3c3a5b01acba6b72170879bdc7ee72b37fdabb64673b68d5b3a97f62d48307069e9057793f7f701719585a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54263e94fea8988fbef22f1d0d539facf
SHA1c34f83ce030461d00a59aece396eed5fb583e4bc
SHA25625a88fabb2cc5abbc9d454fa1c25480a60ad7fc9081938ddba0c80e4d32b58ac
SHA512d15266f45a466a440759acd47d9c5b7b4d1de3682f1458139e98c3765c38de4c2a38ad82ba73bb07b15c227ad03d327642d8aaece6cfc91999ce440b73a64b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2945cda3a9f583ea2a4e9cefa6a973
SHA188880273de44fb42ad69a16b350b1c125a081167
SHA2567a28e25b1bcd205eb8e1e679836bef55be4e264970061bd424f1c0f091769bb5
SHA51201d3cc298a1d2a6cd22d34dcce08123dc92da8c06a9514b0103e37603306330189aeca24457b9ffcbf2f524f861ee2c932ef195f1f77ea0dead09099713d5b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501abdaf9ba0326fb748f56338b2cb5a4
SHA19bd73a01c0a2a764eedbafc7efa0bca57af92faa
SHA25622d14abda1f2b885b340198593db890dc140bb9aaf86b7cf5add215e6e36a3b5
SHA51290f5dc2a4f61d3ac22a84101c2aa71e3777377983b9e0f24598fad0c492e6ec8c521fcc049adf044dfbbe64fec724b8189ba37a373196dcb7b641fb3295d0d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc43421218c62ae972d26b2981036eb3
SHA1d571427a370a7907430d7d0f4fb8a85d0333f514
SHA25628501bf985abb2a24d2e63334ae0642a1bea81f9e5f019cfdec28ecc5f291291
SHA512933efdd489bcf0f4a52d519f61e793bff5fc065aeeb9838dca8a0302fbdef6b6a847e29ddde353f6327c5045b1317373e2c74b202e0aa72c4e35c2acd153e8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9d4439134b2e1124c77db68f9e7adc
SHA1595723d91fd2480da13635a3f06f4c0f030c0483
SHA25626ba9ad76b0c566fa1683e259209871527e9960e11d8f87b1bf38e3cf5ea3e7b
SHA5121e6f6b9a7e923b876114ea89aa40e60f4e2e61b10cca22bc07572a170d59b0802ab2c178364aa4189ef6650408cb71abf2fa209281ca9206f522e437d68e1aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59314e5386422b115162f02c682114bfd
SHA17ef640452c9f3e92616b9f6fe06a4982e81f9f03
SHA2561ae05071082fee4b8af198678968ca32190cb710f5ffb4005c67ffc2cc0c0390
SHA512c8197a0afb18a7553dcd800f7d821b781a5cfa0785b008bc19cc6bd3a345db79500ec609aa9f53223cf682256c10402d234b5907c00857927440a9a3626a5f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bacd29a2f4c884e18eb77ac0069f92c6
SHA11e610b75d6956fd145519195adcc3119f3e757b6
SHA256a0811ac5a4bf58cfb8db2e9b001ebfaeb13a45d303a91e692fa6d5454ea849e6
SHA5120c09154e306976b098c6356be183577cc7f28b36f20ee373745d53cb1ee09dfc42b8d78c0876c0280fdf5017edb4219d54ef548556e5cea415cdece230356433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5153f6cfaf474600509caf05dc176a3fd
SHA1c0eddece49b2560a2382d3d2e370b5cdb7bdeb8b
SHA2564576ca6f045f2f29c75b1ae685397476cb4e8a9beb532a9f660c8f75c3783c33
SHA5120cd45b3a4cda1e6ff659522cf0b8cabcf4474dc03bd42b1c1b5b0405ca94d82fc8a6394ee7135f0923285a0f5c1147f0234c1422b88b2118789235b1264f495f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b6bdd5a55a28be98ccf9e3fd0d6bf5
SHA1dca2e98cb44d73bb2b9700b707551d27748b187e
SHA25689fe096a069b8cf7072bd1189149800d9aff6aafc17326df919197f49bf444b1
SHA5129c2ac235d9d051105de47bf5d8db6dd1b79b871784e0b761d52407cb40c8d05c93c8641f69a6da2e0f6f434e6353a728109ac8d019c29f882d39d198fa12b484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58359fce23129df76c51b2075a1e77cf8
SHA155ebddb7c9a51ec862c0cb30f44fb82e25ceeacd
SHA256e477a86491c002cb9c909a3a75103c20cb88262dac1fa266af33792dcc892617
SHA512dec8f79c59303e174987a27683ee346c992e57ddc21d61338ae13ac2afa979f246ab8c1ca47c65f5ee68b71e23073f9c2b463e7ad9c6693310d946c8650f39b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD570dcff4f4d76d3778701484fa657e63f
SHA134c2ea6d1f5522861d30ef99c29325fa1ab026b7
SHA256d6116e6e7ae289336066f4db748180274795735942e3a215be522d2f099d4649
SHA512c9f14de84fccf8d99d534635601dbb9acb17f42887161962e081d91b97f908ba274734dd4819a2bd57ad9639315a802a761fbd4a8c1e49e0b7101bc7e9ad4743
-
Filesize
684B
MD5a39e77842dfffd777e4b71ce211fe7b9
SHA16aea6241a1294c90d00f0fb9342b4524911d6b02
SHA256fd11172983067f122c100d7f8bfc11317184a5f4d6bfacc3d24514645eca2c00
SHA5121acfeaa056b8159809cfb9926820716f5c3e97fe79f581f365a1dd5f92cde01536b6cb78524694aef32fecff4cf4b2f0284be2fb345a3eb59339f55bf3967e02
-
Filesize
31KB
MD5fc2dc10107f7e0fe548f7a5d8d418d5b
SHA1c3efbe6a8abba120bcc0c64c98efb3d8d0a7a3fa
SHA256912f3c2288d99b9b0886eabd170d7ccacdb825d44dff9aff432cdbda76c3c769
SHA512edcca506d038886badaaf053c5794f3b7c8401ebcbcdad37845475eb7185e3301974a0cf2619b9d403a637f247c75a715d15d2efa32c51e02522a49181da1340
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\favicon[1].ico
Filesize31KB
MD51573660a090deb4af54285c33ebc7a6b
SHA17a351add27ef63f60c1ddef847a98da7adfec814
SHA25610cd50f890ec0b3061d2df458ab5714cf3f6b454ccd751ad801e1de51d9589d7
SHA51297d7c0b82e08b3c4f59d28b6724b8b3ecf97daa9391aa7b2ad990537216b77657db5c111beb91e070d4268fe88872a9b71e4edc34e6ea5d09bd538f778db0666
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3.7MB
MD560a8a76dcf2a4230673551dc5d4a5009
SHA12b1fdc2db4c1a22be2612611d612d62418466356
SHA2565dc4a95dd0eb3c59e5f1d2eed14b5639a4bc5e86b4328146e993800496909469
SHA512e60c49af76d6e94f263df55923fc23345b2dc795a215439e9094963704c17c171deedce20200f411b0fdce0bcd94adc97a178e796444cfdf0e163a0cc1967496
-
Filesize
161KB
MD57f17312b57648f1c4957d8d80acca7d1
SHA19d940fd8f7bee1c23bcaaf709661e90649541132
SHA256442dc3b8b56efee2a952ce8cd31eb75ad21b0626115858541db4712d7a1da7d0
SHA512d5f10048b91b05715056600460b3a294ac29abd7da2c41d32a147d111e71f949ec21093302c0f312a78abde91947cbe1b982229dba7c8b2adb11cdda7d3e31bb
-
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET55AE.tmp\extracted\Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe
Filesize7.4MB
MD57be0f90c526a7dcbe40c2b6d5db884cc
SHA1afaf6106f912f9ca8703fe8be2114c1d47121fdb
SHA256c53cd508cdf0c218876e6ff23ffa496d51bd7a231e5a64f86ca3af46b0402fbb
SHA512698011935a3e5a83dd69689c48b0414e85625d4b1e502517854d435e3af81e84aca1112232a0943c123e7a81d0d141781ce30612f64ec90ffc7d93c75d6f93e9
-
Filesize
5KB
MD5d8f9b4a10a48ebd8936255f6215c8a43
SHA17d8ff0012fa9d9dcf189c6df963f1c627f2ccb76
SHA256d4347332b232622283e7dd3781f64966bd1097d06cca7052b467cf99e62898f2
SHA51267db5dc65fef66fe3a1920c5f406091d17eeae27266039af392a166d63686b8fc61b94684f2b97762995aefa42d2d15148213ecef64cc0df04de19320abba97a
-
Filesize
1.2MB
MD59139604740814e53298a5e8428ba29d7
SHA1c7bf8947e9276a311c4807ea4a57b504f95703c9
SHA256150782fca5e188762a41603e2d5c7aad6b6419926bcadf350ebf84328e50948f
SHA5120b99259e9c0ee566d55cc53c4a7eabf025ed95973edc80ded594023a33f8273cd5d3f3053993f771f9db8a9d234e988cba73845c19ddc6e629e15a243c54cd5d
-
\Users\Admin\AppData\Local\Temp\cetrainers\CET55AE.tmp\Total War Attila V1.00 Build 4514 Trainer +17 MrAntiFun.exe
Filesize196KB
MD5808de473370ef6b5d98ab752f245a3ca
SHA1800bd4ad10c17471829693fac3cee4502b14f029
SHA25665cbed2e8db313b8966638e40eb27f94156c294eb060b28a02c130d146518c39
SHA512fafaff03ad502523b3627e59e1026b8af4217a80215782a90667bc4f4c330871d8c3d890f2601b68ec9a42c0171d12b9e5b87067c95dcad1132b0a8979c56a4c
-
Filesize
329KB
MD52730ff589ae86ef10d94952769f9404f
SHA18010834297a6aa488e6bf90eceaaf9e60bb60c6e
SHA256faf0850051ba175347e40481da9e2cc3a122a09d428925042932be555db06e6b
SHA5125fb35eb364603568b67ce0d19371016a382bc62500de807a12492ceacd5d2b765e0908e2e7e9798446b6c005c0e48c0da74c1a0f9d55c49a8ef4eb3c3d1307e0