Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    66s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/12/2024, 18:24

General

  • Target

    fca24879dc6cff884cf7791fcc35f38e_JaffaCakes118.exe

  • Size

    964KB

  • MD5

    fca24879dc6cff884cf7791fcc35f38e

  • SHA1

    669266f85613f69b52457d4a642b7c2614424b4e

  • SHA256

    11418537179c5ca817791471b4532bc734c02d8a71c5155fae3f6068d5f1ec28

  • SHA512

    568223b4a36d54396af6e4a5f8f09f542c540f6b796a1c4daaa01ec6f15263c275ec3351b57b62cf40838ce50f59191a3cef433fdb1d8b30f8b9439cb5e7a47e

  • SSDEEP

    24576:SNDtgSt8ux/FI5QhM5BtON/X5aP/SdqJyybYfxk/5GFaidS0:IjImitOWXSdSrbjz

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies firewall policy service 3 TTPs 4 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 9 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 47 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 18 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fca24879dc6cff884cf7791fcc35f38e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fca24879dc6cff884cf7791fcc35f38e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Users\Admin\u2AzQ8M2.exe
      C:\Users\Admin\u2AzQ8M2.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3752
      • C:\Users\Admin\vwweor.exe
        "C:\Users\Admin\vwweor.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1052
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del u2AzQ8M2.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:908
    • C:\Users\Admin\2eod.exe
      C:\Users\Admin\2eod.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\2eod.exe
        "C:\Users\Admin\2eod.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1656
      • C:\Users\Admin\2eod.exe
        "C:\Users\Admin\2eod.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3988
      • C:\Users\Admin\2eod.exe
        "C:\Users\Admin\2eod.exe"
        3⤵
        • Executes dropped EXE
        • Maps connected drives based on registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4088
      • C:\Users\Admin\2eod.exe
        "C:\Users\Admin\2eod.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2976
      • C:\Users\Admin\2eod.exe
        "C:\Users\Admin\2eod.exe"
        3⤵
        • Executes dropped EXE
        PID:5076
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 80
          4⤵
          • Program crash
          PID:5032
    • C:\Users\Admin\3eod.exe
      C:\Users\Admin\3eod.exe
      2⤵
      • Modifies security service
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4148
      • C:\Users\Admin\3eod.exe
        C:\Users\Admin\3eod.exe startC:\Users\Admin\AppData\Roaming\2DD6A\DD159.exe%C:\Users\Admin\AppData\Roaming\2DD6A
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3516
      • C:\Users\Admin\3eod.exe
        C:\Users\Admin\3eod.exe startC:\Program Files (x86)\6AFB6\lvvm.exe%C:\Program Files (x86)\6AFB6
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4644
      • C:\Program Files (x86)\LP\5992\2277.tmp
        "C:\Program Files (x86)\LP\5992\2277.tmp"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3708
    • C:\Users\Admin\4eod.exe
      C:\Users\Admin\4eod.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Users\Admin\AppData\Local\759467af\X
        *0*bc*65923113*31.193.3.240:53
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3836
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          4⤵
            PID:3984
      • C:\Users\Admin\5eod.exe
        C:\Users\Admin\5eod.exe
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:908
        • C:\Users\Admin\AppData\Roaming\x1vgc1mnaspxqtkfklmvortohrmst3dr2\svcnost.exe
          "C:\Users\Admin\AppData\Roaming\x1vgc1mnaspxqtkfklmvortohrmst3dr2\svcnost.exe"
          3⤵
          • Modifies firewall policy service
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops desktop.ini file(s)
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:4684
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del fca24879dc6cff884cf7791fcc35f38e_JaffaCakes118.exe
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2400
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3128
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5076 -ip 5076
      1⤵
        PID:2428
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1120
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:512
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:380
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3096
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3180
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:972
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SendNotifyMessage
        PID:4580
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4336
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:2216
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4320
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4220
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:3776
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4696
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:468
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:3176
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2852
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2484
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:5072
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1600
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4644
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4792
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4144
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2404
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:3272
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3560
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:4344
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:3496
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:2296
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:512
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:3288
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:1504
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:2868
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:3720
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:1892
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:4232
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:756
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:3944
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:4680
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  1⤵
                                    PID:4368
                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                    1⤵
                                      PID:4356
                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                      1⤵
                                        PID:2216
                                      • C:\Windows\explorer.exe
                                        explorer.exe
                                        1⤵
                                          PID:5056
                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                          1⤵
                                            PID:4844
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                              PID:1868
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:1764
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:1092
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:2180
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:1744
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:3664
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:3204
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:2560
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:1012
                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                              1⤵
                                                                PID:4568
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                1⤵
                                                                  PID:2156
                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                  1⤵
                                                                    PID:792
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                      PID:5032
                                                                    • C:\Windows\explorer.exe
                                                                      explorer.exe
                                                                      1⤵
                                                                        PID:2180
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                        1⤵
                                                                          PID:1128
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                          1⤵
                                                                            PID:3804
                                                                          • C:\Windows\explorer.exe
                                                                            explorer.exe
                                                                            1⤵
                                                                              PID:4920
                                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                              1⤵
                                                                                PID:4436
                                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                1⤵
                                                                                  PID:3132
                                                                                • C:\Windows\explorer.exe
                                                                                  explorer.exe
                                                                                  1⤵
                                                                                    PID:1812
                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                    1⤵
                                                                                      PID:3548
                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                      1⤵
                                                                                        PID:3852
                                                                                      • C:\Windows\explorer.exe
                                                                                        explorer.exe
                                                                                        1⤵
                                                                                          PID:3704
                                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                          1⤵
                                                                                            PID:3428
                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                            1⤵
                                                                                              PID:4812
                                                                                            • C:\Windows\explorer.exe
                                                                                              explorer.exe
                                                                                              1⤵
                                                                                                PID:2440
                                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                1⤵
                                                                                                  PID:5032
                                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                  1⤵
                                                                                                    PID:4792
                                                                                                  • C:\Windows\explorer.exe
                                                                                                    explorer.exe
                                                                                                    1⤵
                                                                                                      PID:3552
                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                      1⤵
                                                                                                        PID:2316
                                                                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                        1⤵
                                                                                                          PID:4540
                                                                                                        • C:\Windows\explorer.exe
                                                                                                          explorer.exe
                                                                                                          1⤵
                                                                                                            PID:5116

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\Program Files (x86)\LP\5992\2277.tmp

                                                                                                            Filesize

                                                                                                            100KB

                                                                                                            MD5

                                                                                                            340f18faddf54d738f6e56fe3d8b1d54

                                                                                                            SHA1

                                                                                                            bb247a2f8db305906d558c0c665cc7fd7f86ff67

                                                                                                            SHA256

                                                                                                            4613dcf13e53312b483bfebb7866b9e1111c434beabd1b19a03721ab7a2ec572

                                                                                                            SHA512

                                                                                                            e47e375ec6c8cd07411da44cec52c35c1c28e3fce9d09acf390371ea6b1c456e1d43f87d7b5de6f8ba9b233d11caf25cfd5b4890f356b510688286322d7cab74

                                                                                                          • C:\Users\Admin\2eod.exe

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                            MD5

                                                                                                            449cf714ddba0f68cb17bc7f9698949b

                                                                                                            SHA1

                                                                                                            3639bfa3d1563f9a4e2caad9a21074e87b3bfa73

                                                                                                            SHA256

                                                                                                            3c3c398934492f2073aa3a725bff53909ef1bd1a7df82a7467a66d712df12010

                                                                                                            SHA512

                                                                                                            8a08aef0b537395f2503790c7eee4c28986c4fd76670d05018004b3c77011fa4b9d8d3d791ec65ccf6a638f47f007666ea708957776772d5ab6f6d5cae64c81f

                                                                                                          • C:\Users\Admin\3eod.exe

                                                                                                            Filesize

                                                                                                            282KB

                                                                                                            MD5

                                                                                                            2c24a5f9f31ac5a0d3830187617cf6dc

                                                                                                            SHA1

                                                                                                            e71116ab32e0dfa7495f0562c86f232df7202991

                                                                                                            SHA256

                                                                                                            007e9c74a2ee70d46460c91a3c36aa08602bb51a792e89f2d89a358ecbac94c6

                                                                                                            SHA512

                                                                                                            f59a98a728c0d923443d10b2419b6a9bb5ac613949f26fa923240cc2162c93bc462e65f46f46000a1120065bf344b32ddba0f674cfc8007dd1d7591f4cb19b04

                                                                                                          • C:\Users\Admin\4eod.exe

                                                                                                            Filesize

                                                                                                            277KB

                                                                                                            MD5

                                                                                                            00b72668c42555c6d9e3cee383730fc0

                                                                                                            SHA1

                                                                                                            509a7c39baf2b9a46813c641cca687b37e244d5a

                                                                                                            SHA256

                                                                                                            baaacce5c3f18154d4925ec6568ccf66f4ab9ee5477bd0faf44f08d9397641dd

                                                                                                            SHA512

                                                                                                            1bfa5cd6081a5e8556b452cf4741831da829fcc9e2b51c77c92a4fdacfa1b934d14bc049f8185be09b1447664f55956f69e7fd16a868c9655eb32f9b9ef02e78

                                                                                                          • C:\Users\Admin\5eod.exe

                                                                                                            Filesize

                                                                                                            120KB

                                                                                                            MD5

                                                                                                            3fe209cb336f44a0719e53e3b9354aa8

                                                                                                            SHA1

                                                                                                            c37a59ba00521c78d81f0e7cf2713b41593e12a3

                                                                                                            SHA256

                                                                                                            19102a9ce99b067f69ec9b53844aa2e29fbed3d53efbb06e24501ee70af60db1

                                                                                                            SHA512

                                                                                                            6e872ee319e1900fa8ab9b257ec3ee62cc2578476bfc2770090255706f5ea685a5034a1c7b857a088547e130c5cc2b35d65aed54df6965a5274e019293065c09

                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                            Filesize

                                                                                                            471B

                                                                                                            MD5

                                                                                                            10ec52b9b1e970c1e69bfa98f7fda2d4

                                                                                                            SHA1

                                                                                                            8c809fb5a51ee7fe055f439fdd0dc5cfe5625838

                                                                                                            SHA256

                                                                                                            bc5cdf52e9ad2237c6523dd72d75db861f01e53eb640a160051bca438b4b31a2

                                                                                                            SHA512

                                                                                                            eef4d04bccb3bef3b619fe164236eddc1270ea71667fc05776c294a1869601098ee80b3c73a14a633d5527d808c613fa3eac6f506fdc8e690938ff3f3d026627

                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                            Filesize

                                                                                                            412B

                                                                                                            MD5

                                                                                                            5055f8afd39f9990179d106adcd41b0d

                                                                                                            SHA1

                                                                                                            090291db30cf37c3caeb8d25531b9fd670775bf0

                                                                                                            SHA256

                                                                                                            f631e49b4f50cf083a2614df213add12d49ea37ca18d7e2a2b64a39455103fd2

                                                                                                            SHA512

                                                                                                            17631293f6041ebf75e15aa070450bdbd29cf7539c9bd84bc674ec4a92796172c0bfbbb1884fa47671928b307e354196f0e4d046beaa49eccd5ce3fb7dbdeb6f

                                                                                                          • C:\Users\Admin\AppData\Local\759467af\X

                                                                                                            Filesize

                                                                                                            38KB

                                                                                                            MD5

                                                                                                            72de2dadaf875e2fd7614e100419033c

                                                                                                            SHA1

                                                                                                            5f17c5330e91a42daa9ff24c4aa602bd1a72bf6e

                                                                                                            SHA256

                                                                                                            c44993768a4dc5a58ddbfc9cb05ce2a7d3a0a56be45643d70a72bcf811b6c381

                                                                                                            SHA512

                                                                                                            e2520a53326a7d3b056e65d0cf60e9d823ffb34ca026cdddc7ea3a714f8396c53c37e13a887fc86a7dd7076c97fdfad53c3f5a68342ebc1bdec948c76bda8df3

                                                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            eedfbbad91cce660beeaa228d27f5036

                                                                                                            SHA1

                                                                                                            e38fd88d2fba5a2106e4a916a6085f139a63a5e6

                                                                                                            SHA256

                                                                                                            664642c638cd3a59ec89c59245a51fd3ecba6507de818d74628b1c584533df79

                                                                                                            SHA512

                                                                                                            f45664044e2d22a918f147956c3a8aaa2af92464e78bee4ad254d76c2d540d483f52cb114fe2ce93f07c9204d1239598d98742df139acd9df61c9b206903f63a

                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\FKEP33TV\microsoft.windows[1].xml

                                                                                                            Filesize

                                                                                                            96B

                                                                                                            MD5

                                                                                                            dcfd0f22889d8b3a982fbe019d01d543

                                                                                                            SHA1

                                                                                                            fe866022f3fdf8fba4d3bd366ff0e2683fe58e59

                                                                                                            SHA256

                                                                                                            2337927b5b24c83c8ab37dfc0fe7ddcd832ffb16d0cee5d50344478218893f5b

                                                                                                            SHA512

                                                                                                            11b59e18705c1d95508e298938525f931c12c9010cdc03fad15f5585bc503713670d93739668d886ed9446d528c3dc7ac8cbc8e52198eb85ea6557821a124cc8

                                                                                                          • C:\Users\Admin\AppData\Roaming\2DD6A\AFB6.DD6

                                                                                                            Filesize

                                                                                                            600B

                                                                                                            MD5

                                                                                                            7182f50b02ec5239eef00c89ba4455c6

                                                                                                            SHA1

                                                                                                            1364aa679922cc2d09b7b66c38af73ee8dd5579f

                                                                                                            SHA256

                                                                                                            ca30b6cd1d84f117a7d8f97898a0c0c64d438dab6fc7e17cf0928ad70d32b6e2

                                                                                                            SHA512

                                                                                                            2c80de3b0c9c3c3caa1ffd3126308a4357227dd27bf6b2339083340de223cd5c62183a28d2b8ff89a0ca59838052b8494db93455f83563088a5643fa858dbad0

                                                                                                          • C:\Users\Admin\AppData\Roaming\2DD6A\AFB6.DD6

                                                                                                            Filesize

                                                                                                            996B

                                                                                                            MD5

                                                                                                            1d2ee31cc390b922aed38efb59a43518

                                                                                                            SHA1

                                                                                                            f918a0bd8d7b3e4af7d5d8c038c088bee3a27314

                                                                                                            SHA256

                                                                                                            6b3058a7d68960beb12b4bed90b49a206c6fcd1a431ab15db1e7cd91964b67f4

                                                                                                            SHA512

                                                                                                            d04042db0cb96e08d72dcfdc8c3f1893337439b786144ba3e259a100a73c5c3b7d6154d28f03dafab378b7ca2fdc094531f8cae8bb43d8f9e4a43f1238921109

                                                                                                          • C:\Users\Admin\AppData\Roaming\2DD6A\AFB6.DD6

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            ba4bc52a2337520768ecf838873f9118

                                                                                                            SHA1

                                                                                                            ec8fc427fc453b184f375dce67d6db400a2068f8

                                                                                                            SHA256

                                                                                                            81471583408557cf713d3d1a1bb16e47a32345a9c9aeb52686fefefaeff118b2

                                                                                                            SHA512

                                                                                                            4af5f4fc67a7169da981502b9ce64f8cca0d382b38fe29ee958d66885cf2a4672b4dcc122be56ef030cfad48c68257f29d2fdfca95dc55aef6b6cb88fe88c682

                                                                                                          • C:\Users\Admin\AppData\Roaming\desktop.ini

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            4a27242b307c6a836993353035fafc16

                                                                                                            SHA1

                                                                                                            5fea7a41b8f9071848108015d8a952e6f944eea0

                                                                                                            SHA256

                                                                                                            02fd93f64bda51e1e2991184cac13f077d509712e462c9e44be9cf8e22c06de1

                                                                                                            SHA512

                                                                                                            35e9c87642b82df2bf0a9312bb0e9abfb98282db1e34032a4d0150d82c5e2f2e13150ddc896f1e954f02288a1e696a4306ee595b94b1e404c6ec17bac64c44be

                                                                                                          • C:\Users\Admin\AppData\Roaming\ntuser.dat

                                                                                                            Filesize

                                                                                                            54KB

                                                                                                            MD5

                                                                                                            7e8e966927e04a35aec644602b8a9e05

                                                                                                            SHA1

                                                                                                            d201b0b41e8701818d60ddbf9f334332a512c4da

                                                                                                            SHA256

                                                                                                            46f18d9fbf63f378d86962cbf24f5ce57ce257555acd4effdcc41c1e2f1adf5c

                                                                                                            SHA512

                                                                                                            246777c79129a5076b71ca5d3f7e59b06d344f6b5e771892ae8ee68c0b5af9207cd1868b1336b49e6a84665309ad379a33ec6c8e72d7ce41de72153637921a51

                                                                                                          • C:\Users\Admin\u2AzQ8M2.exe

                                                                                                            Filesize

                                                                                                            320KB

                                                                                                            MD5

                                                                                                            ca2acc28a24d14c7e282bd1c689229d0

                                                                                                            SHA1

                                                                                                            c253b9ce5fa1db5bd8a02a49af44a751331e624c

                                                                                                            SHA256

                                                                                                            bd67e3974c9108c7f2bd1cb266f6c3aad420fc63860fd653d0198e26927e2c25

                                                                                                            SHA512

                                                                                                            007c6df499080b538deeffa552d09e0cddba64c6494fe98d6eaf883bd39180d4d9fba0bf08f7d650b256bd54fa52deafc415865dd69b00426452470a173ab2d2

                                                                                                          • C:\Users\Admin\vwweor.exe

                                                                                                            Filesize

                                                                                                            320KB

                                                                                                            MD5

                                                                                                            2ea94fde8130d78e3e0210df26985ddb

                                                                                                            SHA1

                                                                                                            d59e120801e17898d4fecca9c1ff08f4a949d90f

                                                                                                            SHA256

                                                                                                            aa90c156cd25e06628ee137cbf9157a88683db241a45410392c4aa48ab1e5e1e

                                                                                                            SHA512

                                                                                                            99c6d460d059ec00a188511a03be03dfd661dccb6a409a233d7bfd6a7d6ea9fb6ad3f89a2fed4f8934e07c4e77a42c671fa022d078037f51663b26bdb0e41648

                                                                                                          • memory/468-746-0x000001C330200000-0x000001C330300000-memory.dmp

                                                                                                            Filesize

                                                                                                            1024KB

                                                                                                          • memory/908-120-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.1MB

                                                                                                          • memory/908-109-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.1MB

                                                                                                          • memory/972-442-0x0000025283B00000-0x0000025283B20000-memory.dmp

                                                                                                            Filesize

                                                                                                            128KB

                                                                                                          • memory/972-420-0x0000025282C20000-0x0000025282D20000-memory.dmp

                                                                                                            Filesize

                                                                                                            1024KB

                                                                                                          • memory/972-459-0x0000025283F00000-0x0000025283F20000-memory.dmp

                                                                                                            Filesize

                                                                                                            128KB

                                                                                                          • memory/972-428-0x0000025283B40000-0x0000025283B60000-memory.dmp

                                                                                                            Filesize

                                                                                                            128KB

                                                                                                          • memory/1656-75-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                            Filesize

                                                                                                            28KB

                                                                                                          • memory/1656-49-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                            Filesize

                                                                                                            28KB

                                                                                                          • memory/1656-51-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                            Filesize

                                                                                                            28KB

                                                                                                          • memory/1656-47-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                            Filesize

                                                                                                            28KB

                                                                                                          • memory/2216-586-0x0000000003400000-0x0000000003401000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/2976-69-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                            Filesize

                                                                                                            28KB

                                                                                                          • memory/2976-107-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                            Filesize

                                                                                                            28KB

                                                                                                          • memory/2976-65-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                            Filesize

                                                                                                            28KB

                                                                                                          • memory/2976-67-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                            Filesize

                                                                                                            28KB

                                                                                                          • memory/2988-93-0x0000000030670000-0x00000000306C3000-memory.dmp

                                                                                                            Filesize

                                                                                                            332KB

                                                                                                          • memory/3096-418-0x00000000040D0000-0x00000000040D1000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/3516-116-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                            Filesize

                                                                                                            428KB

                                                                                                          • memory/3708-743-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                            Filesize

                                                                                                            112KB

                                                                                                          • memory/3776-744-0x0000000004AF0000-0x0000000004AF1000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/3988-56-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                          • memory/3988-57-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                          • memory/3988-59-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                          • memory/3988-54-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                          • memory/4088-60-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                                            Filesize

                                                                                                            156KB

                                                                                                          • memory/4088-63-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                                            Filesize

                                                                                                            156KB

                                                                                                          • memory/4088-62-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                                            Filesize

                                                                                                            156KB

                                                                                                          • memory/4088-64-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                                            Filesize

                                                                                                            156KB

                                                                                                          • memory/4148-113-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                            Filesize

                                                                                                            428KB

                                                                                                          • memory/4148-239-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                            Filesize

                                                                                                            428KB

                                                                                                          • memory/4220-588-0x0000023068000000-0x0000023068100000-memory.dmp

                                                                                                            Filesize

                                                                                                            1024KB

                                                                                                          • memory/4220-594-0x0000023068F00000-0x0000023068F20000-memory.dmp

                                                                                                            Filesize

                                                                                                            128KB

                                                                                                          • memory/4220-615-0x00000230694E0000-0x0000023069500000-memory.dmp

                                                                                                            Filesize

                                                                                                            128KB

                                                                                                          • memory/4220-602-0x0000023068EC0000-0x0000023068EE0000-memory.dmp

                                                                                                            Filesize

                                                                                                            128KB

                                                                                                          • memory/4220-589-0x0000023068000000-0x0000023068100000-memory.dmp

                                                                                                            Filesize

                                                                                                            1024KB

                                                                                                          • memory/4644-241-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                                            Filesize

                                                                                                            428KB

                                                                                                          • memory/4684-243-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.1MB

                                                                                                          • memory/4684-121-0x0000000000BE0000-0x0000000000BFD000-memory.dmp

                                                                                                            Filesize

                                                                                                            116KB