Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
544s -
max time network
561s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 21:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://temp.sh/ennfh/trash_malware.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
http://temp.sh/ennfh/trash_malware.zip
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
http://temp.sh/ennfh/trash_malware.zip
Resource
win11-20250217-en
Behavioral task
behavioral4
Sample
http://temp.sh/ennfh/trash_malware.zip
Resource
win7-20241010-en
General
-
Target
http://temp.sh/ennfh/trash_malware.zip
Malware Config
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
UAC bypass 3 TTPs 27 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" B71W07N8R46T0CO4X17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" S84R47C8A47L0SH6Y68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" X01H48Z4W86R3WZ0Z87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" U13T58D2E30D7AZ6H07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C37A87Y4F40I1JW5Z85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" R31S01Y5U56Q0MI2J10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" V23R18X5W24F7YM3U36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W47I82V1P04V2PA6K37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" G75H25V3I77U3OM1P46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" X75N43K7E64V2IV0W12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" O14U26L5P13Q5KX3O72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" J16L62D3S46L5DL3R11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W52B34B2Q01J7IB3O00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W64G07Q3V18O6YW0W88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Z34B03E1K40Q0OS6K15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Illerka.C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" S11M66P6S66T8PC1C61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" K80N56J1M43T1TP8G51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" E00V61G7W08G2ZT0Q83.exe -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Windows security bypass 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\software\Wow6432Node\microsoft\Active Setup\Installed Components INSTALLER.exe Key created \REGISTRY\MACHINE\software\Wow6432Node\microsoft\Active Setup\Installed Components INSTALLER.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" antivirus-platinum.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Possible privilege escalation attempt 3 IoCs
pid Process 2536 icacls.exe 1668 takeown.exe 2064 icacls.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDD4E9.tmp WannaCrypt0r.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDD4FC.tmp WannaCrypt0r.exe -
Executes dropped EXE 64 IoCs
pid Process 448 Zika.exe 2176 IconDance.exe 1312 FreeYoutubeDownloader.exe 3056 AntivirusPro2017.exe 896 Illerka.C.exe 768 XPAntivirus2008.exe 1240 AntivirusPlatinum.exe 3036 Bonzify.exe 2468 WannaCrypt0r.exe 2556 HappyAntivirus.exe 2084 icons.exe 1452 Jigsaw.exe 2112 gaben64.exe 1264 sweeney64.exe 1444 svchost.exe 1952 taskdl.exe 912 drpbx.exe 1800 302746537.exe 2124 taskhost.exe 2760 Free YouTube Downloader.exe 1268 svchost.exe 2940 @[email protected] 2460 antivirus-platinum.exe 1152 @[email protected] 2092 rhc51jj0e5aj.exe 2840 taskhost.exe 1312 svchost.exe 1304 S11M66P6S66T8PC1C61.exe 808 svchost.exe 324 O14U26L5P13Q5KX3O72.exe 3004 taskhost.exe 2820 svchost.exe 2572 INSTALLER.exe 1732 AgentSvr.exe 2224 INSTALLER.exe 936 taskdl.exe 2436 taskse.exe 1584 @[email protected] 2488 K80N56J1M43T1TP8G51.exe 2156 U13T58D2E30D7AZ6H07.exe 936 C37A87Y4F40I1JW5Z85.exe 2380 V23R18X5W24F7YM3U36.exe 2640 AgentSvr.exe 2104 taskse.exe 1716 @[email protected] 2040 taskdl.exe 1276 E00V61G7W08G2ZT0Q83.exe 1772 J16L62D3S46L5DL3R11.exe 1448 R31S01Y5U56Q0MI2J10.exe 1828 W47I82V1P04V2PA6K37.exe 1212 taskse.exe 780 @[email protected] 284 taskdl.exe 1588 W52B34B2Q01J7IB3O00.exe 2464 G75H25V3I77U3OM1P46.exe 2064 B71W07N8R46T0CO4X17.exe 2740 W64G07Q3V18O6YW0W88.exe 112 @[email protected] 2352 taskse.exe 1380 Z34B03E1K40Q0OS6K15.exe 612 X75N43K7E64V2IV0W12.exe 1732 taskdl.exe 1404 S84R47C8A47L0SH6Y68.exe 1440 X01H48Z4W86R3WZ0Z87.exe -
Loads dropped DLL 64 IoCs
pid Process 1108 cmd.exe 1108 cmd.exe 768 XPAntivirus2008.exe 768 XPAntivirus2008.exe 768 XPAntivirus2008.exe 448 Zika.exe 448 Zika.exe 768 XPAntivirus2008.exe 768 XPAntivirus2008.exe 2468 WannaCrypt0r.exe 2468 WannaCrypt0r.exe 2856 cscript.exe 448 Zika.exe 448 Zika.exe 1312 FreeYoutubeDownloader.exe 1312 FreeYoutubeDownloader.exe 448 Zika.exe 448 Zika.exe 2468 WannaCrypt0r.exe 2468 WannaCrypt0r.exe 2788 cmd.exe 768 XPAntivirus2008.exe 768 XPAntivirus2008.exe 768 XPAntivirus2008.exe 768 XPAntivirus2008.exe 2092 rhc51jj0e5aj.exe 2092 rhc51jj0e5aj.exe 2092 rhc51jj0e5aj.exe 768 XPAntivirus2008.exe 768 XPAntivirus2008.exe 768 XPAntivirus2008.exe 768 XPAntivirus2008.exe 768 XPAntivirus2008.exe 316 WerFault.exe 316 WerFault.exe 448 Zika.exe 448 Zika.exe 316 WerFault.exe 448 Zika.exe 448 Zika.exe 896 Illerka.C.exe 448 Zika.exe 448 Zika.exe 896 Illerka.C.exe 448 Zika.exe 448 Zika.exe 448 Zika.exe 448 Zika.exe 3036 Bonzify.exe 2572 INSTALLER.exe 2572 INSTALLER.exe 2572 INSTALLER.exe 2572 INSTALLER.exe 1904 regsvr32.exe 2088 regsvr32.exe 1196 regsvr32.exe 868 regsvr32.exe 2552 regsvr32.exe 1576 regsvr32.exe 2068 regsvr32.exe 2572 INSTALLER.exe 2572 INSTALLER.exe 1732 AgentSvr.exe 1732 AgentSvr.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2536 icacls.exe 1668 takeown.exe 2064 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SMrhc51jj0e5aj = "C:\\Program Files (x86)\\rhc51jj0e5aj\\rhc51jj0e5aj.exe" XPAntivirus2008.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" Jigsaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Free Youtube Downloader = "C:\\Windows\\Free Youtube Downloader\\Free Youtube Downloader\\Free YouTube Downloader.exe" FreeYoutubeDownloader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiVirus Pro 2017 = "C:\\Users\\Admin\\Downloads\\trash_malware\\trash malware\\AntivirusPro2017.exe" AntivirusPro2017.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tv_enua = "RunDll32 advpack.dll,LaunchINFSection C:\\Windows\\INF\\tv_enua.inf, RemoveCabinet" INSTALLER.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 54 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskdl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA W52B34B2Q01J7IB3O00.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA B71W07N8R46T0CO4X17.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA X75N43K7E64V2IV0W12.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Illerka.C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" S11M66P6S66T8PC1C61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" U13T58D2E30D7AZ6H07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" V23R18X5W24F7YM3U36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" G75H25V3I77U3OM1P46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" X75N43K7E64V2IV0W12.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskdl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA S11M66P6S66T8PC1C61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" O14U26L5P13Q5KX3O72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" K80N56J1M43T1TP8G51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" J16L62D3S46L5DL3R11.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA W47I82V1P04V2PA6K37.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA W64G07Q3V18O6YW0W88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W64G07Q3V18O6YW0W88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W47I82V1P04V2PA6K37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" E00V61G7W08G2ZT0Q83.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA O14U26L5P13Q5KX3O72.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA K80N56J1M43T1TP8G51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA E00V61G7W08G2ZT0Q83.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskse.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" B71W07N8R46T0CO4X17.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA V23R18X5W24F7YM3U36.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C37A87Y4F40I1JW5Z85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" R31S01Y5U56Q0MI2J10.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskse.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA S84R47C8A47L0SH6Y68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" S84R47C8A47L0SH6Y68.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA U13T58D2E30D7AZ6H07.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA R31S01Y5U56Q0MI2J10.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA G75H25V3I77U3OM1P46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C37A87Y4F40I1JW5Z85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W52B34B2Q01J7IB3O00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Z34B03E1K40Q0OS6K15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Z34B03E1K40Q0OS6K15.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA X01H48Z4W86R3WZ0Z87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" X01H48Z4W86R3WZ0Z87.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA J16L62D3S46L5DL3R11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Illerka.C.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskdl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskse.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: AntivirusPro2017.exe File opened (read-only) \??\X: AntivirusPro2017.exe File opened (read-only) \??\Y: AntivirusPro2017.exe File opened (read-only) \??\K: AntivirusPro2017.exe File opened (read-only) \??\L: AntivirusPro2017.exe File opened (read-only) \??\H: AntivirusPro2017.exe File opened (read-only) \??\J: AntivirusPro2017.exe File opened (read-only) \??\M: AntivirusPro2017.exe File opened (read-only) \??\O: AntivirusPro2017.exe File opened (read-only) \??\Z: AntivirusPro2017.exe File opened (read-only) \??\E: AntivirusPro2017.exe File opened (read-only) \??\G: AntivirusPro2017.exe File opened (read-only) \??\N: AntivirusPro2017.exe File opened (read-only) \??\P: AntivirusPro2017.exe File opened (read-only) \??\S: AntivirusPro2017.exe File opened (read-only) \??\T: AntivirusPro2017.exe File opened (read-only) \??\U: AntivirusPro2017.exe File opened (read-only) \??\V: AntivirusPro2017.exe File opened (read-only) \??\I: AntivirusPro2017.exe File opened (read-only) \??\Q: AntivirusPro2017.exe File opened (read-only) \??\R: AntivirusPro2017.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 AntivirusPro2017.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SET42C0.tmp INSTALLER.exe File created C:\Windows\SysWOW64\SET42C0.tmp INSTALLER.exe File opened for modification C:\Windows\SysWOW64\msvcp50.dll INSTALLER.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" WannaCrypt0r.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] -
resource yara_rule behavioral4/files/0x002400000001ceb4-1105.dat upx behavioral4/memory/1800-1118-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral4/memory/2460-1897-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral4/memory/1800-1914-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral4/memory/2460-1994-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\rhc51jj0e5aj\database.dat XPAntivirus2008.exe File created C:\Program Files (x86)\rhc51jj0e5aj\MFC71ENU.DLL XPAntivirus2008.exe File created C:\Program Files (x86)\rhc51jj0e5aj\rhc51jj0e5aj.exe.local XPAntivirus2008.exe File created C:\Program Files (x86)\rhc51jj0e5aj\Uninstall.exe XPAntivirus2008.exe File created C:\Program Files (x86)\rhc51jj0e5aj\rhc51jj0e5aj.exe XPAntivirus2008.exe File created C:\Program Files (x86)\rhc51jj0e5aj\msvcp71.dll XPAntivirus2008.exe File created C:\Program Files (x86)\rhc51jj0e5aj\MFC71.dll XPAntivirus2008.exe File created C:\Program Files (x86)\rhc51jj0e5aj\msvcr71.dll XPAntivirus2008.exe File created C:\Program Files (x86)\rhc51jj0e5aj\license.txt XPAntivirus2008.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32 wscript.exe File opened for modification C:\Windows\antivirus-platinum.exe AntivirusPlatinum.exe File opened for modification C:\windows\antivirus-platinum.exe attrib.exe File created C:\Windows\msagent\SET4012.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\mslwvtts.dll INSTALLER.exe File opened for modification C:\Windows\help\SET4017.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SET4019.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\help\SET42BD.tmp INSTALLER.exe File created C:\Windows\msagent\SET400F.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentSvr.exe INSTALLER.exe File created C:\Windows\msagent\SET4011.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SET4016.tmp INSTALLER.exe File created C:\Windows\fonts\SET42BE.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SET400D.tmp INSTALLER.exe File created C:\Windows\msagent\SET400D.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentAnm.dll INSTALLER.exe File opened for modification C:\Windows\fonts\andmoipa.ttf INSTALLER.exe File created C:\Windows\302746537.exe AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\SET400E.tmp INSTALLER.exe File created C:\Windows\msagent\SET4016.tmp INSTALLER.exe File opened for modification C:\Windows\INF\tv_enua.inf INSTALLER.exe File created C:\Windows\notepad.dll.sys.exe Zika.exe File opened for modification C:\Windows\COMCTL32.OCX AntivirusPlatinum.exe File opened for modification C:\Windows\INF\agtinst.inf INSTALLER.exe File created C:\Windows\help\SET4017.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgtCtl15.tlb INSTALLER.exe File created C:\Windows\COMCTL32.OCX AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\SET4012.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\intl\SET4018.tmp INSTALLER.exe File opened for modification C:\Windows\INF\SET42BF.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\intl\Agt0409.dll INSTALLER.exe File created C:\Windows\executables.bin Bonzify.exe File opened for modification C:\Windows\msagent\AgentCtl.dll INSTALLER.exe File opened for modification C:\Windows\msagent\AgentDp2.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SET4011.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentSR.dll INSTALLER.exe File opened for modification C:\Windows\help\Agt0409.hlp INSTALLER.exe File opened for modification C:\Windows\302746537.exe AntivirusPlatinum.exe File opened for modification C:\Windows\INF\setupapi.app.log INSTALLER.exe File opened for modification C:\Windows\fonts\SET42BE.tmp INSTALLER.exe File created C:\Windows\msagent\chars\Bonzi.acs Bonzify.exe File opened for modification C:\Windows\msagent\SET4013.tmp INSTALLER.exe File created C:\Windows\msagent\SET4019.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\help\tv_enua.hlp INSTALLER.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe explorer.exe File opened for modification C:\Windows\notepad.dll.sys.exe Zika.exe File created C:\Windows\msagent\SET400E.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SET400F.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SET4010.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentMPx.dll INSTALLER.exe File created C:\Windows\lhsp\tv\SET42BC.tmp INSTALLER.exe File created C:\Windows\INF\SET42BF.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SET4014.tmp INSTALLER.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe explorer.exe File created C:\Windows\finalDestruction.bin Bonzify.exe File created C:\Windows\antivirus-platinum.exe AntivirusPlatinum.exe File opened for modification C:\Windows\MSCOMCTL.OCX AntivirusPlatinum.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe FreeYoutubeDownloader.exe File created C:\Windows\__tmp_rar_sfx_access_check_259838666 AntivirusPlatinum.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe FreeYoutubeDownloader.exe File opened for modification C:\Windows\INF\setupapi.app.log INSTALLER.exe File opened for modification C:\Windows\lhsp\tv\SET42AB.tmp INSTALLER.exe File created C:\Windows\lhsp\tv\SET42AB.tmp INSTALLER.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.exe FreeYoutubeDownloader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 316 2092 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J16L62D3S46L5DL3R11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AntivirusPlatinum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhc51jj0e5aj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C37A87Y4F40I1JW5Z85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AgentSvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R31S01Y5U56Q0MI2J10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W52B34B2Q01J7IB3O00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B71W07N8R46T0CO4X17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X75N43K7E64V2IV0W12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Box.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WannaCrypt0r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HappyAntivirus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S84R47C8A47L0SH6Y68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AntivirusPro2017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antivirus-platinum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INSTALLER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z34B03E1K40Q0OS6K15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X01H48Z4W86R3WZ0Z87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XPAntivirus2008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W64G07Q3V18O6YW0W88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AgentSvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G75H25V3I77U3OM1P46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IconDance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bonzify.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language O14U26L5P13Q5KX3O72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grpconv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E00V61G7W08G2ZT0Q83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U13T58D2E30D7AZ6H07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsmprovhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zika.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral4/files/0x000500000001a4b9-600.dat nsis_installer_1 behavioral4/files/0x000500000001a4b9-600.dat nsis_installer_2 behavioral4/files/0x000500000001cb49-1963.dat nsis_installer_1 behavioral4/files/0x000500000001cb49-1963.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1740 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 2892 taskkill.exe -
Modifies Control Panel 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s1159 = "Bolbi" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s2359 = "Bolbi" wscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Appearance\New Schemes\2\Sizes\0\Color #0 = "0" Box.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Colors\InfoWindow = "255 255 255" Box.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "YOUR PC MAY BE INFECTED WITH SPYWARE OR OTHER MALICIOUS ITEMS" antivirus-platinum.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main antivirus-platinum.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\SystemNotification\.Default\ = "%SystemRoot%\\media\\Windows Balloon.wav" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\AppEvents\Schemes\Apps\.Default\CriticalBatteryAlarm\Characters\ = "C:\\Windows\\Media\\Characters\\Windows Battery Critical.wav" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\Control Panel\Desktop\Colors\GrayText = "128 128 128" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" Box.exe Set value (str) \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\SystemAsterisk\Calligraphy\ = "C:\\Windows\\Media\\Balligraphy\\Windows Error.wav" Box.exe Set value (str) \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\Explorer\Navigating\Calligraphy\ = "C:\\Windows\\Media\\Calligraphy\\Windows Navigation Start.wav" Box.exe Set value (int) \REGISTRY\USER\S-1-5-19\Console\ColorTable07 = "12632256" Box.exe Set value (str) \REGISTRY\USER\S-1-5-19\Control Panel\International\s2359 = "PM" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\ime\IMTC70\NewChangJie.Modeless = "0x00000000" Box.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2004 = "0" Box.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WindowMetrics\MenuWidth = "-285" Box.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\System32\ListSvc.dll,-100 = "HomeGroup Listener" Box.exe Set value (int) \REGISTRY\USER\S-1-5-19\Console\ColorTable01 = "8388608" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\AppEvents\Schemes\Apps\.Default\LowBatteryAlarm\Savanna\ = "C:\\Windows\\Media\\Savannb\\Windows Battery Low.wav" Box.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PeerNet\CollabHost\ShowIcon = "1" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\AppEvents\Schemes\Apps\.Default\SystemNotification\Raga\ = "C:\\Windows\\Media\\Raga\\Windows Balloon.wav" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\AppEvents\Schemes\Apps\Explorer\FaxSent\Heritage\ = "C:\\Windows\\Media\\tada.wav" Box.exe Set value (str) \REGISTRY\USER\S-1-5-20\AppEvents\Schemes\Apps\sapisvr\HubOnSound\Calligraphy\ = "C:\\Windows\\Media\\Speech On.wav" Box.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\IMEJP\10.0\MSIME\AutoCharWidth\SHARP = "151585536" Box.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\CurrentLevel = "0" Box.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E6E17E84-DF38-11CF-8E74-00A0C90F26F8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F055-858B-11D1-B16A-00C0F0283628}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5BE8BD1-7DE6-11D0-91FE-00C04FD701A5}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8563FF20-8ECC-11D1-B9B4-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9ED94442-E5E8-101B-B9B5-444553540000}\TypeLib\Version = "1.3" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C27CCE3E-8596-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C27CCE40-8596-11D1-B16A-00C0F0283628}\InprocServer32\ = "c:\\windows\\mscomctl.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C27CCE42-8596-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F08DF952-8592-11D1-B16A-00C0F0283628}\ = "ISlider" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5BE8BDD-7DE6-11D0-91FE-00C04FD701A5}\ = "IAgentCtlSpeechInput" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5BE8BD4-7DE6-11D0-91FE-00C04FD701A5}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C8D-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0713E8A2-850A-101B-AFC0-4210102A8DA7}\ = "Microsoft TreeView Control, version 5.0 (SP2)" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.Toolbar\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C74190B8-8589-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA664-8594-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F5BE8BD2-7DE6-11D0-91FE-00C04FD701A5}\ToolboxBitmap32\ = "C:\\Windows\\msagent\\AgentCtl.dll, 105" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9ED94440-E5E8-101B-B9B5-444553540000}\MiscStatus\1\ = "131473" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{612A8624-0FB3-11CE-8747-524153480004}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0713E8D2-850A-101B-AFC0-4210102A8DA7}\ProgID\ = "COMCTL.ProgCtrl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C27CCE3A-8596-11D1-B16A-00C0F0283628}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66833FE7-8583-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F5BE8BD2-7DE6-11D0-91FE-00C04FD701A5}\ = "Microsoft Agent Control 1.5" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B0913410-3B44-11D1-ACBA-00C04FD97575} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5BE8BD1-7DE6-11D0-91FE-00C04FD701A5}\ = "IAgentCtl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0713E8D2-850A-101B-AFC0-4210102A8DA7}\ = "Microsoft ProgressBar Control, version 5.0 (SP2)" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8A1-850A-101B-AFC0-4210102A8DA7}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E8E-DF38-11CF-8E74-00A0C90F26F8}\ = "ITreeView" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DA8D94-9D6A-101B-AFC0-4210102A8DA7}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.Slider.2\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C27CCE3E-8596-11D1-B16A-00C0F0283628}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B77181C-D3EF-11D1-8500-00C04FA34A14}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0713E8D8-850A-101B-AFC0-4210102A8DA7}\InprocServer32\ = "c:\\windows\\comctl32.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4D83601-895E-11D0-B0A6-000000000000}\ = "IListItems" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageListCtrl\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F26-8591-11D1-B16A-00C0F0283628}\ = "IImage" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A7B93CA0-7B81-11D0-AC5F-00C04FD97575}\TypeLib AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A7B93C8F-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{612A8624-0FB3-11CE-8747-524153480004}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E944-850A-101B-AFC0-4210102A8DA7}\ = "ITab10" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7791BA40-E020-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6B7E6391-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BF877892-E026-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{58DA8D91-9D6A-101B-AFC0-4210102A8DA7}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EC0AB1C0-6CAB-11CF-8998-00AA00688B10}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{612A8624-0FB3-11CE-8747-524153480004}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7791BA50-E020-11CF-8E74-00A0C90F26F8}\ = "ITabs" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.TabStrip\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ProgCtrl\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EFB6597-857C-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7791BA40-E020-11CF-8E74-00A0C90F26F8}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DA8D8B-9D6A-101B-AFC0-4210102A8DA7}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C27CCE34-8596-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B77181C-D3EF-11D1-8500-00C04FA34A14}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B1-713E-11CF-8AE5-00AA00C00905}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0713E8AE-850A-101B-AFC0-4210102A8DA7}\ = "IListItems10" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6BA90C01-3910-11D1-ACB3-00C04FD97575}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8563FF20-8ECC-11D1-B9B4-00C04FD97575}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9ED94440-E5E8-101B-B9B5-444553540000}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{612A8624-0FB3-11CE-8747-524153480004} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6E1B5150-DB62-11D0-A0D8-0080C7E7B78D}\TypeLib regsvr32.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2908 reg.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 @[email protected] Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 @[email protected] -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\trash_malware.zip:Zone.Identifier firefox.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 11 IoCs
pid Process 448 Zika.exe 2176 IconDance.exe 896 Illerka.C.exe 1312 FreeYoutubeDownloader.exe 768 XPAntivirus2008.exe 3056 AntivirusPro2017.exe 2556 HappyAntivirus.exe 1240 AntivirusPlatinum.exe 2084 icons.exe 3036 Bonzify.exe 2468 WannaCrypt0r.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 896 Illerka.C.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 1304 S11M66P6S66T8PC1C61.exe 324 O14U26L5P13Q5KX3O72.exe 936 taskdl.exe 936 taskdl.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1952 explorer.exe 1108 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1956 firefox.exe Token: SeDebugPrivilege 1956 firefox.exe Token: SeDebugPrivilege 1956 firefox.exe Token: 33 2344 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2344 AUDIODG.EXE Token: 33 2344 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2344 AUDIODG.EXE Token: SeRestorePrivilege 1904 7zG.exe Token: 35 1904 7zG.exe Token: SeSecurityPrivilege 1904 7zG.exe Token: SeSecurityPrivilege 1904 7zG.exe Token: SeDebugPrivilege 448 Zika.exe Token: SeDebugPrivilege 2892 taskkill.exe Token: SeDebugPrivilege 896 Illerka.C.exe Token: SeDebugPrivilege 1304 S11M66P6S66T8PC1C61.exe Token: SeDebugPrivilege 324 O14U26L5P13Q5KX3O72.exe Token: SeBackupPrivilege 1628 vssvc.exe Token: SeRestorePrivilege 1628 vssvc.exe Token: SeAuditPrivilege 1628 vssvc.exe Token: SeIncreaseQuotaPrivilege 2348 WMIC.exe Token: SeSecurityPrivilege 2348 WMIC.exe Token: SeTakeOwnershipPrivilege 2348 WMIC.exe Token: SeLoadDriverPrivilege 2348 WMIC.exe Token: SeSystemProfilePrivilege 2348 WMIC.exe Token: SeSystemtimePrivilege 2348 WMIC.exe Token: SeProfSingleProcessPrivilege 2348 WMIC.exe Token: SeIncBasePriorityPrivilege 2348 WMIC.exe Token: SeCreatePagefilePrivilege 2348 WMIC.exe Token: SeBackupPrivilege 2348 WMIC.exe Token: SeRestorePrivilege 2348 WMIC.exe Token: SeShutdownPrivilege 2348 WMIC.exe Token: SeDebugPrivilege 2348 WMIC.exe Token: SeSystemEnvironmentPrivilege 2348 WMIC.exe Token: SeRemoteShutdownPrivilege 2348 WMIC.exe Token: SeUndockPrivilege 2348 WMIC.exe Token: SeManageVolumePrivilege 2348 WMIC.exe Token: 33 2348 WMIC.exe Token: 34 2348 WMIC.exe Token: 35 2348 WMIC.exe Token: SeIncreaseQuotaPrivilege 2348 WMIC.exe Token: SeSecurityPrivilege 2348 WMIC.exe Token: SeTakeOwnershipPrivilege 2348 WMIC.exe Token: SeLoadDriverPrivilege 2348 WMIC.exe Token: SeSystemProfilePrivilege 2348 WMIC.exe Token: SeSystemtimePrivilege 2348 WMIC.exe Token: SeProfSingleProcessPrivilege 2348 WMIC.exe Token: SeIncBasePriorityPrivilege 2348 WMIC.exe Token: SeCreatePagefilePrivilege 2348 WMIC.exe Token: SeBackupPrivilege 2348 WMIC.exe Token: SeRestorePrivilege 2348 WMIC.exe Token: SeShutdownPrivilege 2348 WMIC.exe Token: SeDebugPrivilege 2348 WMIC.exe Token: SeSystemEnvironmentPrivilege 2348 WMIC.exe Token: SeRemoteShutdownPrivilege 2348 WMIC.exe Token: SeUndockPrivilege 2348 WMIC.exe Token: SeManageVolumePrivilege 2348 WMIC.exe Token: 33 2348 WMIC.exe Token: 34 2348 WMIC.exe Token: 35 2348 WMIC.exe Token: SeRestorePrivilege 2572 INSTALLER.exe Token: SeRestorePrivilege 2572 INSTALLER.exe Token: SeRestorePrivilege 2572 INSTALLER.exe Token: SeRestorePrivilege 2572 INSTALLER.exe Token: SeRestorePrivilege 2572 INSTALLER.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1956 firefox.exe 1956 firefox.exe 1956 firefox.exe 1956 firefox.exe 1904 7zG.exe 2556 HappyAntivirus.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe 2760 Free YouTube Downloader.exe 2640 AgentSvr.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe 2760 Free YouTube Downloader.exe 2556 HappyAntivirus.exe 2640 AgentSvr.exe 3056 AntivirusPro2017.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 3056 AntivirusPro2017.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 3056 AntivirusPro2017.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 3056 AntivirusPro2017.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 1956 firefox.exe 1956 firefox.exe 1956 firefox.exe 2556 HappyAntivirus.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe 2760 Free YouTube Downloader.exe 2640 AgentSvr.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe 2760 Free YouTube Downloader.exe 2556 HappyAntivirus.exe 2640 AgentSvr.exe 3056 AntivirusPro2017.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1956 firefox.exe 1956 firefox.exe 1956 firefox.exe 3056 AntivirusPro2017.exe 3056 AntivirusPro2017.exe 2940 @[email protected] 2940 @[email protected] 2460 antivirus-platinum.exe 1152 @[email protected] 1152 @[email protected] 1584 @[email protected] 1584 @[email protected] 1716 @[email protected] 780 @[email protected] 112 @[email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 3064 wrote to memory of 1956 3064 firefox.exe 30 PID 1956 wrote to memory of 1580 1956 firefox.exe 31 PID 1956 wrote to memory of 1580 1956 firefox.exe 31 PID 1956 wrote to memory of 1580 1956 firefox.exe 31 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2852 1956 firefox.exe 32 PID 1956 wrote to memory of 2356 1956 firefox.exe 33 PID 1956 wrote to memory of 2356 1956 firefox.exe 33 PID 1956 wrote to memory of 2356 1956 firefox.exe 33 PID 1956 wrote to memory of 2356 1956 firefox.exe 33 PID 1956 wrote to memory of 2356 1956 firefox.exe 33 -
System policy modification 1 TTPs 34 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" G75H25V3I77U3OM1P46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C37A87Y4F40I1JW5Z85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W64G07Q3V18O6YW0W88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "ATTENTION!" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Illerka.C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" S11M66P6S66T8PC1C61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" R31S01Y5U56Q0MI2J10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" X75N43K7E64V2IV0W12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" J16L62D3S46L5DL3R11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W47I82V1P04V2PA6K37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W52B34B2Q01J7IB3O00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" K80N56J1M43T1TP8G51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" U13T58D2E30D7AZ6H07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" B71W07N8R46T0CO4X17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" S84R47C8A47L0SH6Y68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" X01H48Z4W86R3WZ0Z87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "Your PC has been wrecked by Bolbi!" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" E00V61G7W08G2ZT0Q83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskdl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Z34B03E1K40Q0OS6K15.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" O14U26L5P13Q5KX3O72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" V23R18X5W24F7YM3U36.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2140 attrib.exe 828 attrib.exe 1948 attrib.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "http://temp.sh/ennfh/trash_malware.zip"1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url http://temp.sh/ennfh/trash_malware.zip2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1956.0.407646310\1372225875" -parentBuildID 20221007134813 -prefsHandle 1208 -prefMapHandle 1200 -prefsLen 20769 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9623137e-8a2d-41e5-be3f-fcf06ea406e6} 1956 "\\.\pipe\gecko-crash-server-pipe.1956" 1288 10cd8e58 gpu3⤵PID:1580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1956.1.1332135792\2034360136" -parentBuildID 20221007134813 -prefsHandle 1476 -prefMapHandle 1472 -prefsLen 21630 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {187a24b6-5bc6-4613-993e-6a5b148d172d} 1956 "\\.\pipe\gecko-crash-server-pipe.1956" 1488 d70158 socket3⤵
- Checks processor information in registry
PID:2852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1956.2.1906878381\575221609" -childID 1 -isForBrowser -prefsHandle 2080 -prefMapHandle 2076 -prefsLen 21668 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf978e19-fdfd-4b98-8c44-e714de74a091} 1956 "\\.\pipe\gecko-crash-server-pipe.1956" 2092 1a3d1658 tab3⤵PID:2356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1956.3.1942411831\877844368" -childID 2 -isForBrowser -prefsHandle 2436 -prefMapHandle 2408 -prefsLen 26138 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c680510-1172-491e-8cb3-f26a6f31de3c} 1956 "\\.\pipe\gecko-crash-server-pipe.1956" 2372 1b085858 tab3⤵PID:1936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1956.4.1771044412\1924715304" -childID 3 -isForBrowser -prefsHandle 3464 -prefMapHandle 3608 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9eb038a2-525f-486b-82af-635ef377a55b} 1956 "\\.\pipe\gecko-crash-server-pipe.1956" 1088 1cc3ce58 tab3⤵PID:2244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1956.5.432937943\58552929" -childID 4 -isForBrowser -prefsHandle 3740 -prefMapHandle 3744 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bba5744-a27b-499c-9142-61104f9fcccf} 1956 "\\.\pipe\gecko-crash-server-pipe.1956" 3728 1cc3d158 tab3⤵PID:396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1956.6.1977305689\767234424" -childID 5 -isForBrowser -prefsHandle 3904 -prefMapHandle 3908 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5889e157-817a-48f2-98a7-8ca064aff5b3} 1956 "\\.\pipe\gecko-crash-server-pipe.1956" 3892 1cc3e658 tab3⤵PID:612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1956.7.1432875337\1525909406" -childID 6 -isForBrowser -prefsHandle 2200 -prefMapHandle 2136 -prefsLen 26448 -prefMapSize 233414 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bf38c8c-03c5-45bb-a681-3f81897ea191} 1956 "\\.\pipe\gecko-crash-server-pipe.1956" 2092 21090e58 tab3⤵PID:1560
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2764
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5301⤵
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\trash_malware\" -spe -an -ai#7zMap20239:88:7zEvent126401⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1904
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Downloads\trash_malware\trash malware\stupidy fuckity malware.bat" "1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1108 -
C:\Windows\system32\msg.exemsg * you did a mistake...2⤵PID:2236
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\Zika.exeZika.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:448 -
C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\svchost.exe"C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\svchost.exe" -extract C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.rc, icongroup,,3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.rc, C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.res3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\svchost.exe"C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\svchost.exe" -extract C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.rc, icongroup,,3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.rc, C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.res3⤵
- Executes dropped EXE
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\svchost.exe"C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\svchost.exe" -addoverwrite C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe", "C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe, C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.res, icongroup,,3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\svchost.exe"C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\svchost.exe" -extract C:\@[email protected], C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.rc, icongroup,,3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:808
-
-
C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.rc, C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.res3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\svchost.exe"C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\svchost.exe" -addoverwrite C:\@[email protected]", "C:\@[email protected], C:\Users\Admin\AppData\Local\Temp\fc3c6bd844574cc3b13b9052481e6dae\icons.res, icongroup,,3⤵
- Executes dropped EXE
PID:2820
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs"2⤵PID:2656
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs" /elevated3⤵
- Drops file in Windows directory
- Modifies Control Panel
- System policy modification
PID:3064
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\IconDance.exeIconDance.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2176
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\Illerka.C.exeIllerka.C.exe2⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:896 -
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\S11M66P6S66T8PC1C61.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\S11M66P6S66T8PC1C61.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1304
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\O14U26L5P13Q5KX3O72.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\O14U26L5P13Q5KX3O72.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:324
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\FreeYoutubeDownloader.exeFreeYoutubeDownloader.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1312 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2760 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
PID:2028 -
C:\Windows\SysWOW64\wsmprovhost.exe"C:\Windows\SysWOW64\wsmprovhost.exe"5⤵
- System Location Discovery: System Language Discovery
PID:592
-
-
C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe"C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Windows\winsxs\wow64_microsoft-windows-p..installerandprintui_31bf3856ad364e35_6.1.7601.17514_none_3eceef6140ec9728\printui.exe"C:\Windows\winsxs\wow64_microsoft-windows-p..installerandprintui_31bf3856ad364e35_6.1.7601.17514_none_3eceef6140ec9728\printui.exe"5⤵PID:2072
-
-
C:\Windows\SysWOW64\write.exe"C:\Windows\SysWOW64\write.exe"5⤵PID:1540
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"6⤵PID:1320
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122887⤵PID:2064
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122887⤵PID:1012
-
-
-
-
C:\Windows\winsxs\amd64_microsoft-windows-s..restartup-baaupdate_31bf3856ad364e35_6.1.7600.16385_none_9243b833ecd918df\baaupdate.exe"C:\Windows\winsxs\amd64_microsoft-windows-s..restartup-baaupdate_31bf3856ad364e35_6.1.7600.16385_none_9243b833ecd918df\baaupdate.exe"5⤵PID:1400
-
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exeXPAntivirus2008.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:768 -
C:\Windows\SysWOW64\wscript.exewscript //B C:\Users\Admin\AppData\Local\Temp\pin.vbs "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008" "Antivirus XP 2008.lnk"3⤵PID:1728
-
-
C:\Windows\SysWOW64\wscript.exewscript //B C:\Users\Admin\AppData\Local\Temp\pin.vbs "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008" "Register Antivirus XP 2008.lnk"3⤵PID:2656
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c mpfo.bat "C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exe"3⤵PID:1000
-
-
C:\Program Files (x86)\rhc51jj0e5aj\rhc51jj0e5aj.exe"C:\Program Files (x86)\rhc51jj0e5aj\rhc51jj0e5aj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 2524⤵
- Loads dropped DLL
- Program crash
PID:316
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPro2017.exeAntivirusPro2017.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\HappyAntivirus.exeHappyAntivirus.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2556
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPlatinum.exeAntivirusPlatinum.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1240 -
C:\WINDOWS\302746537.exe"C:\WINDOWS\302746537.exe"3⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\D549.tmp\302746537.bat" "4⤵PID:2060
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\comctl32.ocx5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1304
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\mscomctl.ocx5⤵
- Modifies registry class
PID:2028
-
-
\??\c:\windows\antivirus-platinum.exec:\windows\antivirus-platinum.exe5⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2460
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h c:\windows\antivirus-platinum.exe5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1948
-
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\icons.exeicons.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2084
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\Bonzify.exeBonzify.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\KillAgent.bat"3⤵PID:2920
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AgentSvr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\takeown.exetakeown /r /d y /f C:\Windows\MsAgent4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\MsAgent /c /t /grant "everyone":(f)4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2064
-
-
-
C:\Users\Admin\AppData\Local\Temp\INSTALLER.exeINSTALLER.exe /q3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2572 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentCtl.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:1904
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDPv.dll"4⤵
- Loads dropped DLL
PID:2088
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\mslwvtts.dll"4⤵
- Loads dropped DLL
PID:1196
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDP2.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentMPx.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentSR.dll"4⤵
- Loads dropped DLL
PID:1576
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentPsh.dll"4⤵
- Loads dropped DLL
PID:2068
-
-
C:\Windows\msagent\AgentSvr.exe"C:\Windows\msagent\AgentSvr.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1732
-
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o4⤵
- System Location Discovery: System Language Discovery
PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\INSTALLER.exeINSTALLER.exe /q3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tv_enua.dll4⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tvenuax.dll4⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o4⤵PID:2552
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\Jigsaw.exeJigsaw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1452 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\Downloads\trash_malware\trash?malware\Jigsaw.exe3⤵
- Executes dropped EXE
PID:912
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\WannaCrypt0r.exeWannaCrypt0r2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2468 -
C:\Windows\SysWOW64\attrib.exeattrib +h .3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2140
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskdl.exetaskdl.exe3⤵
- Executes dropped EXE
PID:1952
-
-
C:\Windows\SysWOW64\cmd.execmd /c 249661741295894.bat3⤵
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs4⤵
- Loads dropped DLL
PID:2856
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:828
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
C:\Windows\SysWOW64\cmd.exePID:2788
-
C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet5⤵
- System Location Discovery: System Language Discovery
PID:1200 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1740
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskdl.exetaskdl.exe3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:936 -
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\K80N56J1M43T1TP8G51.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\K80N56J1M43T1TP8G51.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System policy modification
PID:2488
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\U13T58D2E30D7AZ6H07.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\U13T58D2E30D7AZ6H07.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:2156
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskse.exetaskse.exe C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System policy modification
PID:2436 -
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\C37A87Y4F40I1JW5Z85.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\C37A87Y4F40I1JW5Z85.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:936
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\V23R18X5W24F7YM3U36.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\V23R18X5W24F7YM3U36.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System policy modification
PID:2380
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1584
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "lxejlrdtqen920" /t REG_SZ /d "\"C:\Users\Admin\Downloads\trash_malware\trash malware\tasksche.exe\"" /f3⤵PID:716
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "lxejlrdtqen920" /t REG_SZ /d "\"C:\Users\Admin\Downloads\trash_malware\trash malware\tasksche.exe\"" /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2908
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskse.exetaskse.exe C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:2104 -
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\R31S01Y5U56Q0MI2J10.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\R31S01Y5U56Q0MI2J10.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:1448
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\W47I82V1P04V2PA6K37.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\W47I82V1P04V2PA6K37.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System policy modification
PID:1828
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskdl.exetaskdl.exe3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:2040 -
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\E00V61G7W08G2ZT0Q83.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\E00V61G7W08G2ZT0Q83.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:1276
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\J16L62D3S46L5DL3R11.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\J16L62D3S46L5DL3R11.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:1772
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskse.exetaskse.exe C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:1212 -
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\W52B34B2Q01J7IB3O00.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\W52B34B2Q01J7IB3O00.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:1588
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\G75H25V3I77U3OM1P46.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\G75H25V3I77U3OM1P46.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:2464
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]PID:780
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskdl.exetaskdl.exe3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:284 -
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\W64G07Q3V18O6YW0W88.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\W64G07Q3V18O6YW0W88.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:2740
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\B71W07N8R46T0CO4X17.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\B71W07N8R46T0CO4X17.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:2064
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskse.exetaskse.exe C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:2352 -
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\Z34B03E1K40Q0OS6K15.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\Z34B03E1K40Q0OS6K15.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:1380
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\X75N43K7E64V2IV0W12.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\X75N43K7E64V2IV0W12.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:612
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:112
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskdl.exetaskdl.exe3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:1732 -
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\S84R47C8A47L0SH6Y68.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\S84R47C8A47L0SH6Y68.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:1404
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\X01H48Z4W86R3WZ0Z87.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\X01H48Z4W86R3WZ0Z87.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:1440
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskse.exePID:1868
-
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\X86G43B3A47L5ZZ2S11.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\X86G43B3A47L5ZZ2S11.exe"4⤵PID:2816
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\Q72X64Z4R22I2OP8N42.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\Q72X64Z4R22I2OP8N42.exe"4⤵PID:1468
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]PID:2312
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskdl.exetaskdl.exe3⤵PID:2396
-
C:\Users\Admin\Downloads\trash_malware\trash malware\msg\K07N07R8K40E0JA7Z20.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\msg\K07N07R8K40E0JA7Z20.exe"4⤵PID:2884
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\R61E40R6W50T8KN8N64.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\TaskData\R61E40R6W50T8KN8N64.exe"4⤵PID:3032
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskse.exePID:112
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]PID:2860
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\taskdl.exetaskdl.exe3⤵PID:1836
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\gaben64.exegaben64.exe2⤵
- Executes dropped EXE
PID:2112
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\sweeney64.exesweeney64.exe2⤵
- Executes dropped EXE
PID:1264
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2380
-
C:\Windows\msagent\AgentSvr.exeC:\Windows\msagent\AgentSvr.exe -Embedding1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2640
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1952
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2552
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2872
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:2800
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:1688
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x02⤵PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Indicator Removal
2File Deletion
2Modify Registry
11Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5626c26ac3aab9fc9487c85763a458cc2
SHA1a77d3f13eef3ba4efb1c81efa03887fa075a7d44
SHA25615c62ddf6e6e4898c720af7f5dafec87e6b90a89c533d15972178a11153f4a55
SHA512dd29c7c6e91519038a0ad80f3a1bb43672ec36d0641efae0f82a5d2c3401b1e0d22ec4d0d4d727f736b18fa12a4e93e713a3dde7bf0d13c5d0df6ff853d20804
-
Filesize
75KB
MD5373ab9f3666e444d538dab8e35d56730
SHA1e5498ad390b38983a887e850e48c6235b4be3249
SHA2568536a124573aee7b65d87e6d7d7bbc480a3084bef0ea75c1e82816a64817a451
SHA512f18112b60ac9ad4b563fec2b895e82be08d776d99a613855c646e1160923c16ca377cc66f7190ce603b2e32b21832d5eb0335daa4f6057ee47cb79110db9bc07
-
Filesize
9.0MB
MD504b88c7067b53a9bdf844cd1cb4b9c30
SHA17d081a1053cd9ef3d593f5ef9a27303824b779f5
SHA256d42b135a1e70b6f7d0d98c340f4b529f722953cf57e573bb21a078f50f2016b9
SHA512566f36f804d3027daab0e01f6d816b0420ba21fc276f2fabda4d0ed37b0e830704dcba8ccc3d30a7023c69f8ad3da0b9b58a49a26b3bb239d8ae0762bc157a42
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD52d50d1ad403bfeb3b5cc8822d5158e20
SHA1351f1f459b98df13a79223da4b532e9545e9985f
SHA256a32486d8a295f38e506d4b78705d09b93547b42ff68ff2a72e175943ee4020a3
SHA512d2d5e6575615a429c163779c2d9dabde326918388ff2f67a9358be044fe613e9b1e4a14e2bb875454ce3743e66dc56892df9b921d51d68871e60e93a33304de9
-
Filesize
13KB
MD542fa555763ec00439fff855c5e797093
SHA1272fd17b18ae3b4455c6ec91421276721b415810
SHA256e37fd1f04155c7e5e14485f2484bbb19502585288de53cc71e1198eb5a6fb249
SHA512b8b3fb26b7a877642ffb8bba576bc093fffcb216374fbf0fc3031fa98c700d0d0e846302cbd8c600df4a7b50549736b2f2e25f82b3994edcc4c6da4beb75e89f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
348B
MD57d8beb22dfcfacbbc2609f88a41c1458
SHA152ec2b10489736b963d39a9f84b66bafbf15685f
SHA2564aa9ed4b38514f117e6e4f326cb0a1be7f7b96199e21305e2bd6dce289d7baa2
SHA512a26cf9168cf7450435a9fe8942445511f6fda1087db52bd73e335d6f5b544fc892999019d9291d9dcc60c3656de49688f6d63282c97706e2db286f988e44fd94
-
Filesize
73KB
MD581e5c8596a7e4e98117f5c5143293020
SHA145b7fe0989e2df1b4dfd227f8f3b73b6b7df9081
SHA2567d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004
SHA51205b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6
-
Filesize
40KB
MD548c00a7493b28139cbf197ccc8d1f9ed
SHA1a25243b06d4bb83f66b7cd738e79fccf9a02b33b
SHA256905cb1a15eccaa9b79926ee7cfe3629a6f1c6b24bdd6cea9ccb9ebc9eaa92ff7
SHA512c0b0a410ded92adc24c0f347a57d37e7465e50310011a9d636c5224d91fbc5d103920ab5ef86f29168e325b189d2f74659f153595df10eef3a9d348bb595d830
-
Filesize
160KB
MD5237e13b95ab37d0141cf0bc585b8db94
SHA1102c6164c21de1f3e0b7d487dd5dc4c5249e0994
SHA256d19b6b7c57bcee7239526339e683f62d9c2f9690947d0a446001377f0b56103a
SHA5129d0a68a806be25d2eeedba8be1acc2542d44ecd8ba4d9d123543d0f7c4732e1e490bad31cad830f788c81395f6b21d5a277c0bed251c9854440a662ac36ac4cb
-
Filesize
60KB
MD5a334bbf5f5a19b3bdb5b7f1703363981
SHA16cb50b15c0e7d9401364c0fafeef65774f5d1a2c
SHA256c33beaba130f8b740dddb9980fe9012f9322ac6e94f36a6aa6086851c51b98de
SHA5121fa170f643054c0957ed1257c4d7778976c59748670afa877d625aaa006325404bc17c41b47be2906dd3f1e229870d54eb7aba4a412de5adedbd5387e24abf46
-
Filesize
64KB
MD57c5aefb11e797129c9e90f279fbdf71b
SHA1cb9d9cbfbebb5aed6810a4e424a295c27520576e
SHA256394a17150b8774e507b8f368c2c248c10fce50fc43184b744e771f0e79ecafed
SHA512df59a30704d62fa2d598a5824aa04b4b4298f6192a01d93d437b46c4f907c90a1bad357199c51a62beb87cd724a30af55a619baef9ecf2cba032c5290938022a
-
Filesize
60KB
MD54fbbaac42cf2ecb83543f262973d07c0
SHA1ab1b302d7cce10443dfc14a2eba528a0431e1718
SHA2566550582e41fc53b8a7ccdf9ac603216937c6ff2a28e9538610adb7e67d782ab5
SHA5124146999b4bec85bcd2774ac242cb50797134e5180a3b3df627106cdfa28f61aeea75a7530094a9b408bc9699572cae8cf998108bde51b57a6690d44f0b34b69e
-
Filesize
36KB
MD5b4ac608ebf5a8fdefa2d635e83b7c0e8
SHA1d92a2861d5d1eb67ab434ff2bd0a11029b3bd9a9
SHA2568414dfe399813b7426c235ba1e625bd2b5635c8140da0d0cfc947f6565fe415f
SHA5122c42daade24c3ff01c551a223ee183301518357990a9cb2cc2dd7bf411b7059ff8e0bf1d1aee2d268eca58db25902a8048050bdb3cb48ae8be1e4c2631e3d9b4
-
Filesize
60KB
MD59fafb9d0591f2be4c2a846f63d82d301
SHA11df97aa4f3722b6695eac457e207a76a6b7457be
SHA256e78e74c24d468284639faf9dcfdba855f3e4f00b2f26db6b2c491fa51da8916d
SHA512ac0d97833beec2010f79cb1fbdb370d3a812042957f4643657e15eed714b9117c18339c737d3fd95011f873cda46ae195a5a67ae40ff2a5bcbee54d1007f110a
-
Filesize
268KB
MD55c91bf20fe3594b81052d131db798575
SHA1eab3a7a678528b5b2c60d65b61e475f1b2f45baa
SHA256e8ce546196b6878a8c34da863a6c8a7e34af18fb9b509d4d36763734efa2d175
SHA512face50db7025e0eb2e67c4f8ec272413d13491f7438287664593636e3c7e3accaef76c3003a299a1c5873d388b618da9eaede5a675c91f4c1f570b640ac605d6
-
Filesize
28KB
MD50cbf0f4c9e54d12d34cd1a772ba799e1
SHA140e55eb54394d17d2d11ca0089b84e97c19634a7
SHA2566b0b57e5b27d901f4f106b236c58d0b2551b384531a8f3dad6c06ed4261424b1
SHA512bfdb6e8387ffbba3b07869cb3e1c8ca0b2d3336aa474bd19a35e4e3a3a90427e49b4b45c09d8873d9954d0f42b525ed18070b949c6047f4e4cdb096f9c5ae5d5
-
Filesize
8KB
MD5466d35e6a22924dd846a043bc7dd94b8
SHA135e5b7439e3d49cb9dc57e7ef895a3cd8d80fb10
SHA256e4ccf06706e68621bb69add3dd88fed82d30ad8778a55907d33f6d093ac16801
SHA51223b64ed68a8f1df4d942b5a08a6b6296ec5499a13bb48536e8426d9795771dbcef253be738bf6dc7158a5815f8dcc65feb92fadf89ea8054544bb54fc83aa247
-
Filesize
2KB
MD5e4a499b9e1fe33991dbcfb4e926c8821
SHA1951d4750b05ea6a63951a7667566467d01cb2d42
SHA25649e6b848f5a708d161f795157333d7e1c7103455a2f47f50895683ef6a1abe4d
SHA512a291bb986293197a16f75b2473297286525ac5674c08a92c87b5cc1f0f2e62254ea27d626b30898e7857281bdb502f188c365311c99bda5c2dd76da0c82c554a
-
Filesize
28KB
MD5f1656b80eaae5e5201dcbfbcd3523691
SHA16f93d71c210eb59416e31f12e4cc6a0da48de85b
SHA2563f8adc1e332dd5c252bbcf92bf6079b38a74d360d94979169206db34e6a24cd2
SHA512e9c216b9725bd419414155cfdd917f998aa41c463bc46a39e0c025aa030bc02a60c28ac00d03643c24472ffe20b8bbb5447c1a55ff07db3a41d6118b647a0003
-
Filesize
7KB
MD5b127d9187c6dbb1b948053c7c9a6811f
SHA1b3073c8cad22c87dd9b8f76b6ffd0c4d0a2010d9
SHA256bd1295d19d010d4866c9d6d87877913eee69e279d4d089e5756ba285f3424e00
SHA51288e447dd4db40e852d77016cfd24e09063490456c1426a779d33d8a06124569e26597bb1e46a3a2bbf78d9bffee46402c41f0ceb44970d92c69002880ddc0476
-
Filesize
52KB
MD5316999655fef30c52c3854751c663996
SHA1a7862202c3b075bdeb91c5e04fe5ff71907dae59
SHA256ea4ca740cd60d2c88280ff8115bf354876478ef27e9e676d8b66601b4e900ba0
SHA5125555673e9863127749fc240f09cf3fb46e2019b459ad198ba1dc356ba321c41e4295b6b2e2d67079421d7e6d2fb33542b81b0c7dae812fe8e1a87ded044edd44
-
Filesize
76KB
MD5e7cd26405293ee866fefdd715fc8b5e5
SHA16326412d0ea86add8355c76f09dfc5e7942f9c11
SHA256647f7534aaaedffa93534e4cb9b24bfcf91524828ff0364d88973be58139e255
SHA5121114c5f275ecebd5be330aa53ba24d2e7d38fc20bb3bdfa1b872288783ea87a7464d2ab032b542989dee6263499e4e93ca378f9a7d2260aebccbba7fe7f53999
-
Filesize
552KB
MD5497fd4a8f5c4fcdaaac1f761a92a366a
SHA181617006e93f8a171b2c47581c1d67fac463dc93
SHA25691cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a
SHA51273d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25
-
Filesize
2KB
MD57210d5407a2d2f52e851604666403024
SHA1242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9
SHA256337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af
SHA5121755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68
-
Filesize
4KB
MD54be7661c89897eaa9b28dae290c3922f
SHA14c9d25195093fea7c139167f0c5a40e13f3000f2
SHA256e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5
SHA5122035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f
-
Filesize
29KB
MD5c3e8aeabd1b692a9a6c5246f8dcaa7c9
SHA14567ea5044a3cef9cb803210a70866d83535ed31
SHA25638ae07eeb7909bda291d302848b8fe5f11849cf0d597f0e5b300bfed465aed4e
SHA512f74218681bd9d526b68876331b22080f30507898b6a6ebdf173490ca84b696f06f4c97f894cb6052e926b1eee4b28264db1ead28f3bc9f627b4569c1ddcd2d3e
-
Filesize
1.2MB
MD5ed98e67fa8cc190aad0757cd620e6b77
SHA10317b10cdb8ac080ba2919e2c04058f1b6f2f94d
SHA256e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d
SHA512ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0
-
Filesize
11KB
MD580d09149ca264c93e7d810aac6411d1d
SHA196e8ddc1d257097991f9cc9aaf38c77add3d6118
SHA256382d745e10944b507a8d9c69ae2e4affd4acf045729a19ac143fa8d9613ccb42
SHA5128813303cd6559e2cc726921838293377e84f9b5902603dac69d93e217ff3153b82b241d51d15808641b5c4fb99613b83912e9deda9d787b4c8ccfbd6afa56bc9
-
Filesize
2KB
MD50a250bb34cfa851e3dd1804251c93f25
SHA1c10e47a593c37dbb7226f65ad490ff65d9c73a34
SHA25685189df1c141ef5d86c93b1142e65bf03db126d12d24e18b93dd4cc9f3e438ae
SHA5128e056f4aa718221afab91c4307ff87db611faa51149310d990db296f979842d57c0653cb23d53fea54a69c99c4e5087a2eb37daa794ba62e6f08a8da41255795
-
Filesize
40KB
MD51587bf2e99abeeae856f33bf98d3512e
SHA1aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9
SHA256c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0
SHA51243161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a
-
Filesize
161B
MD5ea7df060b402326b4305241f21f39736
SHA17d58fb4c58e0edb2ddceef4d21581ff9d512fdc2
SHA256e4edc2cb6317ab19ee1a6327993e9332af35cfbebaff2ac7c3f71d43cfcbe793
SHA5123147615add5608d0dce7a8b6efbfb19263c51a2e495df72abb67c6db34f5995a27fde55b5af78bbd5a6468b4065942cad4a4d3cb28ab932aad9b0f835aafe4d0
-
Filesize
4.1MB
MD5c6391727ae405fb9812a8ad2a7729402
SHA183693dc297392c6a28f7f16d23414c6d62921711
SHA256d98fbfca17f194400d19111e4813340e6666b254b99f833739b661a4d2d0217c
SHA5127a4e2ff93d853415d433f5e90b36959c78b77590aa1fa00753831eb4d01cb1a972bb9e39eb8dee5b216005e7709eacda51c0c410aacfe37fcdb163603fd36570
-
Filesize
44B
MD5dbfea325d1e00a904309a682051778ad
SHA1525562934d0866f2ba90b3c25ea005c8c5f1e9fb
SHA25615a3a3303b4a77272ddb04454333a4c06aa2a113f210ba4a03314026e0821e6d
SHA512cd853c67c2b1a44c3f592ff42d207b2251e8b9bc1eb22fc12cd710329069ef75abffccd169418c4f9bd008a40f2fbbfc6904519f27fd658f316309f94b8ff59c
-
Filesize
193KB
MD5e92bbd011643cdf00084042ad8e5f421
SHA141b60393b180e73b1b388f356730b329c099fa93
SHA25682fe81db1c1401fce85c3a6008fbe2cc78d08107a13de6aa860c37c90a1571ec
SHA5121cd3969b47b3894f357d29e48ce8923c8c83c5b2b3ea9e7c3f0371663473efb83524812b14e13ac0b95fdb39ce04a35b3ef7a74935bf75cf0379b87d8cef4998
-
Filesize
5KB
MD58b49e96b0bd0fe3822bd4f516ad543ab
SHA13d04d3a4377e2e1888cc2be333b129daa8d2894d
SHA256c25cbc60ff1ccca811239655636717c9ff4decb9190a557489389504b248d037
SHA51246826285f213137cedefe379ece413730a36dcde016e5ac114743cb011e587fde503df1d70ea0e6c4213993749ac4d246e4c3c980b02e01239b392d0f5892e26
-
Filesize
52KB
MD5819265cb9b45d837914f428373b06318
SHA10725f84eba20acdbd702b688ea61dee84e370b0c
SHA256dd2f2d8c0a7d767be40b0f83ac6339ec86068e4ba0f4cd0e3e5b99050dd84fcf
SHA512ae4dd3f773568072e86e694c72a08d06b9206cb704a22ced1a922bc04a61a504aee67fc32ffb4d39f9e75f74c533d409756d4d953eaf9ab89cc9fe11f702b30c
-
Filesize
3KB
MD56899249ce2f6ede73e6fcc40fb31338a
SHA1385e408274c8d250ccafed3fe7b329b2f3a0df13
SHA256d02a2c0c9917a5ff728400357aa231473cd20da01b538a0e19bc0c0b885ea212
SHA5120db15d8050a3d39a14ebe6b58ebd68f0241d3ee688988e1e2217e2c43a834dff0959ba050d7e458ab6dfb466c91a3109ead350fe58fb3daa0753f6ca1ed9d60d
-
Filesize
214B
MD514f51baaf9e518780594e20887e6fe36
SHA119f934f6a8cb11c53ae06f71457bfa643bb06576
SHA25699cc25682aa82e36757361afdd6e0436ff56cdc03993e6d60f20d052f8b9dbe5
SHA512d48e9a9e12a69fef2b6c324a9c2f1fb46d8eb931a4cde955f2c196c3ee78ac80dcfdb98cc17530854c3775db41de66b09b9ba498c550ac500ec40cdefe4caf81
-
Filesize
14KB
MD5abd13026c90196210954972001586e30
SHA123092e2dd1283487614fbc40cce35201bd79eab0
SHA2564f05b1809c23ea4c71b01771c43a60df3c48ae2d2b8b55918cf6e2f91d3d8097
SHA51268a9e0d1b1e002de9ec38e142d7de7bc4b85f4971598faf85553ca19daa7fe51cae9496b3296855345f7a08a97515c3a2bd8e6f87cb14e338687b224fd9c22fa
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD5a954d84c471bf52c88bc303fe1c85dfb
SHA13fd3994df87eaa3a4449bc6d5463df9932fc198f
SHA2564b99bbc7a88ee3ff71efa17ad8afe7d452e4a50797bf36b5b719a84eba36c447
SHA512d9d949bcd471fb9a3e40997ac529770833c893fb25256c9a71b78364e25c1fe4a6eedc7edf24f1d0cba409a4ebdf2d50b43e4e4595219213ebc5ba8142216b53
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\bookmarkbackups\bookmarks-2025-03-06_11_7Rf7HncBl+3VdROYNL8qAw==.jsonlz4
Filesize943B
MD5eee6961e0cda219c540ede84dbf62c68
SHA1b95a56fb33b8eefec54591d4ea6cd12c092ebbbd
SHA25679008b1590fb7a23e0de7d9d4d02723dd44133a22976ca2598b7eae2324883aa
SHA5121ef572548ac7836ceb36ab8853cd909651008150c2feda277169530dbe585843d80d28b5fe5966059ad5fc78e74d68b381153bacd537a71ad4be2f02974d3850
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\broadcast-listeners.json
Filesize204B
MD572c95709e1a3b27919e13d28bbe8e8a2
SHA100892decbee63d627057730bfc0c6a4f13099ee4
SHA2569cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa
SHA512613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD52c98ae5ec8bfc8ed359d74c14307f6f3
SHA13982b13a7ac9e0d90d811b7b8b055a40bd74b406
SHA256fc518bb3b23fc53028dac3ae5bf3d7a9aaf7b4fca7ec377ea64b1895b96605a4
SHA5121fb92b6174de3ced2ecaaf1ac30a291970507981cae4d7e8ec10b2f1bc37de544e6acd7d255513dffdb60702531378d42f296f1867eb7ad3939b4c4c2df7b64b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\104f60b1-2cdd-4024-a750-d0140f03f312
Filesize10KB
MD54ccaacaca4a16b7ff99e601ad6d50574
SHA16691656303357dd2dd32aee9f16f467afc64ba16
SHA2564a508e061445be786ad4ce12e16476395517b5f929fa8b14f241a19165b32857
SHA51245c960097b61bb23554309f58fccc75a59e97a6064e87be03c8c0887086800af00dc8cc89058da4c8268372e572f0e8494482e277796c5f15a640d1f7cfe5ded
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\3ff69c66-42f8-4367-8e6f-20ead0f66b9b
Filesize745B
MD53d4a1b632a4b31c34b69856a00681f2c
SHA19e95dcd62514bc6eaf2400575a0f98b8df526026
SHA256a76dc80283da62141e51954953256c28e0abe0b5bd3d811cb56a6ef8488ceca8
SHA512e863b40cf024ea7da60ef1a9b3ae1a076797b979b0d83bc1653a6ed65508def9e82f11cc17bcde64d3bbf98f824193533343f359511da8edb0a6bc6dd50e8f9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD561839f4108614af05d7b9bd6d50c21cd
SHA15ca6215a916ba101463e0035047e8a40e82b9948
SHA256c1723312c24786f16bbf15978995d761b1d7382e23ac7552c7d25ab083fbaa1b
SHA512445be2545ac73b02e4a2b56b53a9b4d6dbb87f65adcb561ce1a363847d5b3aa255328b82cd5627d75aabdbeafa638f69fab78a7499aed22b7ebbc146212e00bb
-
Filesize
7KB
MD573991a59ca44485edc4665415ce50271
SHA1f1493799cabd234594ab9d6974d62e22a7b2a004
SHA256d0ec8ba0bb9b6a00a6c1dbdcaad5d82d365ef08e6997ce681466dfec3ffdf9a8
SHA512bf173ccf5129da8eda2ab7b51ddc45df3f34a74dc25ada84efbb9943cb3259bdbf7baa523b69533e349bb9bdc8971db081dddb7f02ca7b12b1424a38eabbb4e5
-
Filesize
8KB
MD564981957b6eb4e7bfbffbb4e352791ea
SHA17295f1f39564cab05e254f9087a003b903e5bfd5
SHA256cc4eed25fd855f01419a1089d896cb47ef7329cd01818d85011bc39d0096c6ae
SHA5124b767d3f6c7e9994a6306783bad4487be7919cb4689444ccf0f751b72f53bbfb00930bdcf5a5d625e43bff2930beaff7c8d3ba8d688c518d043c52fe84ca8a27
-
Filesize
7KB
MD5041cd8408b2e10176f5378b9d57ab41b
SHA1bfdeef32e48b422dc0bfb9e2d977ce16d5f87d94
SHA256f0c37b058455c192278fabdef056743db37dc99e4cbc3c7bf6a3913e77ceed72
SHA5122946e8af2d07427de354a9208432cdaf9cb4f0b8aeb5a5099cc5d5325a7dd1defd8c2afde6c7f4fe1e3d958b41306983446086b35d7c7e43a736bfa97d61964d
-
Filesize
6KB
MD5cbb061b99afbc4590c64ba8674cee8f5
SHA107ba8e688d27b73af4e1ae28fcf66b3c3b7ed6a9
SHA25685f655501e43efa816e3c0792d0d10c0c8d948d1cffa4203b07e6cc4c508d3f7
SHA51238ea9cc0b8b5a45d8e34f2b7bd54d9fd9a90ebc7d4efcc8b1713d607329ff45caa994738c108749f9a387a2b95c6bcf65915dea81f695f0faab2def1067f288d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD57f4548ec61b5cee05d1dbbf16371a348
SHA170fd4db1d3832ab4839558ccd08741f412c4424d
SHA25680cf70e137d82df6cbb3a94ca35432099cf90c93afd9c6c190872e8534d7188c
SHA512525e1c505a7106a25e24ebe8edc3ed5f47a62da9d020916a7aecfb6b482397b129bc04afe9d6ac771f2a8aa98a7898a46caeef616c101290ccabd0194a9c493d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5cb23e5957df68a0e0e9ebe34a75aaf41
SHA1f29a6ca9a4408ec078f99050d8b2c42078a4ef9a
SHA256411c0bf1572af52a72930b52a8b2b6c0178fe7672115158afd3dc2d9b46ec1be
SHA51265e24f8a2b48da236f91da85f10c7c956be7c9843cbe0733519435c3cd539266c1df3c863065f5ba5f6eb30bcf9c0f2b5851e5d964160433bc08ac5607643121
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD510ee6bb2685c3f8c2a277a3fbb57b32e
SHA14d1f396093ba0bbc2e3514bd0426b7fdfdbd2b9f
SHA256c9eeabf4bd53a22d75ca0a8758c997f80f16881aaa34f27c74c58179e99bb6b9
SHA51258c9e343969db1b57a5696fd345cb79f86ee8e3285637b71b2503f49501fe0131720dbe96b232d03e9b1590722881280e27b72e81ea71e64fa0a741c1e9c6295
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore.jsonlz4
Filesize950B
MD5c8330fc0604fdde7021619705fa9e8cd
SHA1606d5d6ed21b160acd5ba5c398250562345dd9ed
SHA25698da421fec1f208eed576ef58d8473c7dd19f9f9ec8093e8ad96c578dfe05ada
SHA51209c35c70e907a266f0a39a0c571dad9d4cafeb007569917de62af01ee8f25adc6d6e983139a543a3dc4589b3392f6c1a444cd600c170ef413246397d1fabaef8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD51ba55d958bb8e1aad33a1e9c7539dd9b
SHA1c7e9afb8daa41c4a878e63ed9d23f9c214c925d4
SHA256dbf3e4d4306ba16c88777f6411211dd548115611d4b32a86fafe9b7b1f1c2b2c
SHA512e5efe67fbff7edcb84906d0da3332299493587eac387c1fcee6358bdaff68a9ea1c29be7ed10622db2ca002969cfa7122ddc881ac4afc2820a20310bc0c035e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\targeting.snapshot.json
Filesize4KB
MD5cb724f52d7114a995cd12cc3b6eb4de1
SHA13183a225f7ce05ddc9d1fbe7d64dbd327a4feb01
SHA2560f13a76effb55916c291d7a68c0fe3147f9aa345feffdf5083380f9177665f88
SHA5120e67d0527db193542deacbf39549dfa860b4d1209eae368a48a4ed04fd3ec33def780f43e6dbe4d74751ff75d63a3acb15dfe8ccb7646b336d0d30e348e0c0aa
-
C:\Users\Admin\Documents\@[email protected]
Filesize933B
MD5f97d2e6f8d820dbd3b66f21137de4f09
SHA1596799b75b5d60aa9cd45646f68e9c0bd06df252
SHA2560e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a
SHA512efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0
-
Filesize
63KB
MD526730d0a9ffb5e080b9bb934180ff6e7
SHA19370ee70e7eb7edae3b9db97844de385e374803c
SHA2568faaefc2f432ce3d9d20cada7b69c1303dffff91f6c18a44a77041f4e653e6c8
SHA512b3d7b7a6c4b56eccd8007ec32a5edd5aa3e2f1d1037231628da0fbfe1261f1dd6c0c590ca4bc222bcbcb0cfd32cb6628562a119a5bad41c833ce656cbae8167b
-
Filesize
38.0MB
MD51f071d1ad6adbca1695a514d9f953604
SHA10dd305399f173be003927957838f0b7957b80912
SHA2565fd84f4f2108568f61eb71479dc359425690f0a589ccf496000aed8f914e5b07
SHA512cc0f83bf25a7655f3eb4108f7beb222ea02532d4e9487c3c053c14f35a140f903139c183f9a74e04fac43c3040c64535e598686d2f08ff3b49b791b74e461557
-
Filesize
378B
MD50cc2dd83460b5f60061593ad38b401ba
SHA15b85d8c6a562f85ccb003fd59cd12b0e5a394c90
SHA256d9547cddf086e2a76b60d7eadbbf752c490e594262898ad724c944227236c14e
SHA5129b5973af2d9ca712f7bec86a62dc08cfbbddc903e2275ebdae3cc67ec68e897e08e8d0fe7b6c440edaa2a13aa3478ba40159ca31c838596467b48cccb134b7ec
-
C:\Users\Admin\Downloads\trash_malware\trash malware\@[email protected]
Filesize240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
Filesize
739KB
MD5382430dd7eae8945921b7feab37ed36b
SHA1c95ddaebe2ae8fbcb361f3bf080d95a7bb5bf128
SHA25670e5e902d0ac7534838b743c899f484fe10766aefacc6df697219387a8e3d06b
SHA51226abc02bde77f0b94613edc32e0843ac71a0a8f3d8ba01cb94a42c047d0be7befef52a81984e9a0fa867400082a8905e7a63aaaf85fa32a03d27f7bc6a548c3b
-
Filesize
816KB
MD57dfbfba1e4e64a946cb096bfc937fbad
SHA19180d2ce387314cd4a794d148ea6b14084c61e1b
SHA256312f082ea8f64609d30ff62b11f564107bf7a4ec9e95944dfd3da57c6cdb4e94
SHA512f47b05b9c294688811dd72d17f815cce6c90f96d78f6835804d5182e2f4bfbd2d6738de854b8a79dea6345f9372ba76a36920e51e6cb556ef4b38b620e887eb4
-
Filesize
52KB
MD5c7c4f36c35198df7d2f23c217f4b89bf
SHA19fe2c415e97a8d836cb8b7822d94e8da58014035
SHA256022c37312348e74e6b20a1f37ba35aa11b5621567529dc18276a855625aa23ab
SHA512aaa72e56b57ce4a7629229ca88bdb095a18aeeeb947fb80a80a6646e01f99444399acdb49580c9c8d8d6a8757595865ae5e9b995597eebe7e70f6a625a8782de
-
Filesize
70KB
MD5ab27a4504c98f0e22c266b0a377e5558
SHA1bc33a3caa48b25d7cdff1c72bc6e5c9ef198df84
SHA256077609aaef36278a7f2dbbc1e27cf876b7615ea9f7241730154777a36b21a9c5
SHA512e3a5f3b824bc70b8b4957cdfc3bf53978a6fc96c787b4afd485cc685543603fb5c1bf750723bba000bcdd0441a74212c839020622f35e20e1b588b5d15c3c8c2
-
Filesize
46KB
MD599ec3237394257cb0b5c24affe458f48
SHA15300e68423da9712280e601b51622c4b567a23a4
SHA256ec17f950f6ee9c0c237d93bc0b766aa6e2ab458c70320b534212043128177b51
SHA512af2394d18f672def6d5d7081def759093759205aac0390ca03591c58c15a02e463a68b583b6fc28ef1368922b4bd5f9072d570ee97a955250a478cdb093500cb
-
Filesize
6.4MB
MD5fba93d8d029e85e0cde3759b7903cee2
SHA1525b1aa549188f4565c75ab69e51f927204ca384
SHA25666f62408dfce7c4a5718d2759f1d35721ca22077398850277d16e1fca87fe764
SHA5127c1441b2e804e925eb5a03e97db620117d3ad4f6981dc020e4e7df4bfc4bd6e414fa3b0ce764481a2cef07eebb2baa87407355bfbe88fab96397d82bd441e6a2
-
Filesize
75KB
MD5de302cdfae9ca76f4406cd38ee81f594
SHA13f104f87a7ef77043025e36afbc1be3aff76a565
SHA25641702db1a096906e34dc669b5e7385b64c8c108ef7cb779279e80917eb15e4bb
SHA51288609e5e63825383221f22a75cd2c3cd20d08a8df78c117141288e05a82aebf1a9a4db384634a9db5dc0d767610b07deedad88d08376fe58d7347c1e589f15f9
-
Filesize
71KB
MD51db84f940138ade841eb69f2d1b5e657
SHA1d5d69675ee78842ba397049851617397457d8e23
SHA256558208dc757f1fb83b56889bb1c44f8b196fbbf1c2864272be8f9106692c5e50
SHA5129ac57ec73140532501ce4610dce128c7030ec914700687952f67839755bd986243afb32314e0e8f3b13713c4bc8cfa5444772a954088b0a82fa46750aa972520
-
Filesize
396KB
MD513f4b868603cf0dd6c32702d1bd858c9
SHA1a595ab75e134f5616679be5f11deefdfaae1de15
SHA256cae57a60c4d269cd1ca43ef143aedb8bfc4c09a7e4a689544883d05ce89406e7
SHA512e0d7a81c9cdd15a4ef7c8a9492fffb2c520b28cebc54a139e1bffa5c523cf17dfb9ffe57188cf8843d74479df402306f4f0ce9fc09d87c7cca92aea287e5ff24
-
Filesize
1.9MB
MD5cb02c0438f3f4ddabce36f8a26b0b961
SHA148c4fcb17e93b74030415996c0ec5c57b830ea53
SHA25664677f7767d6e791341b2eac7b43df90d39d9bdf26d21358578d2d38037e2c32
SHA512373f91981832cd9a1ff0b8744b43c7574b72971b5b6b19ea1f4665b6c878f7a1c7834ac08b92e0eca299eb4b590bf10f48a0485350a77a5f85fc3d2dd6913db3
-
Filesize
301KB
MD57ad8c84dea7bd1e9cbb888734db28961
SHA158e047c7abecdd31d4e3c937b0ee89c98ab06c6a
SHA256a4b6e53453d1874a6f78f0d7aa14dfafba778062f4b85b42b4c1001e1fc17095
SHA512d34b087f7c6dd224e9bfe7a24364f878fc55c5368ce7395349ca063a7fd9ac555baed8431bfa13c331d7e58108b34e0f9d84482ce2e133f623dd086f14345adb
-
Filesize
378KB
MD5c718a1cbf0e13674714c66694be02421
SHA1001d5370d3a7ee48db6caaecb1c213b5dfdf8e65
SHA256cde188d6c4d6e64d6abfdea1e113314f9cdf9417bca36eb7201e6b766e5f5a7f
SHA512ba0ddff47b618740dfcb63024435c36d895889dd3cf6b4559969283ba8100e8063f5c7767e56dfab67a2b5c96e4ae22e141e5b09e81be5cec9aa7ca7827b4b8a
-
Filesize
323KB
MD56515aac6d12e20b052187f256af73b96
SHA1e91df2fad020ff5f11c28256650d7e231de67b8b
SHA2564a36aecfb0ade38d252327f534058e3dd2e2209629631b9ad2b1c9cac86aed35
SHA512ad49c7f734c36eea304846328485b2866d403672511f9df8d4c60038aabbecce952ff5afaf4774eda8dfd7647f0ca1839d136e74dfc16ae43bacd537b453b4b9
-
Filesize
283KB
MD52773e3dc59472296cb0024ba7715a64e
SHA127d99fbca067f478bb91cdbcb92f13a828b00859
SHA2563ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
SHA5126ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
Filesize
3.4MB
MD584c82835a5d21bbcf75a61706d8ab549
SHA15ff465afaabcbf0150d1a3ab2c2e74f3a4426467
SHA256ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
SHA51290723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244
-
Filesize
5.6MB
MD540228458ca455d28e33951a2f3844209
SHA186165eb8eb3e99b6efa25426508a323be0e68a44
SHA2561a904494bb7a21512af6013fe65745e7898cdd6fadac8cb58be04e02346ed95f
SHA512da62cc244f9924444c7cb4fdbd46017c65e6130d639f6696f7930d867017c211df8b18601bfdaaee65438cee03977848513d7f08987b9b945f3f05241f55ec39
-
Filesize
1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
Filesize
780B
MD5383a85eab6ecda319bfddd82416fc6c2
SHA12a9324e1d02c3e41582bf5370043d8afeb02ba6f
SHA256079ce1041cbffe18ff62a2b4a33711eda40f680d0b1d3b551db47e39a6390b21
SHA512c661e0b3c175d31b365362e52d7b152267a15d59517a4bcc493329be20b23d0e4eb62d1ba80bb96447eeaf91a6901f4b34bf173b4ab6f90d4111ea97c87c1252
-
Filesize
105KB
MD53ca1d5768c2944d4284b1541653823c7
SHA185cf021ac23cd1340c6d649e6a77a213c1f848b6
SHA2564172c6120f8f98685698365d6dd52c80eb2080203cdde479009bf8f4fa770af0
SHA5127972adb329dbebc347b8a68789bbac4ba7c230cc980910d18a322d1a512015633d2a5801e76c0aae2fcfe120790c69417864549787dfc37574fb0aa3bfc202f0
-
Filesize
1.3MB
MD55075aa1815f57f9df355bc0c1ed96bac
SHA1b56eee0afb749e2faa4da62340e0dfc1a4891348
SHA256c69d5d57a31933f5e855f1ef0d2d451beece6d376b95eecfe2bc3140b0410857
SHA51207a4e32ab14386d02e9297e5bc06a9a24e4accfdbf0d5a445661338472dee345de7f75b6e1de09a11e94d558a15b309280840b65afd9faf4a0ac1af1421fc8fe
-
Filesize
46KB
MD595673b0f968c0f55b32204361940d184
SHA181e427d15a1a826b93e91c3d2fa65221c8ca9cff
SHA25640b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd
SHA5127601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92
-
Filesize
53KB
MD50252d45ca21c8e43c9742285c48e91ad
SHA15c14551d2736eef3a1c1970cc492206e531703c1
SHA256845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a
SHA5121bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755
-
Filesize
77KB
MD52efc3690d67cd073a9406a25005f7cea
SHA152c07f98870eabace6ec370b7eb562751e8067e9
SHA2565c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a
SHA5120766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c
-
Filesize
38KB
MD517194003fa70ce477326ce2f6deeb270
SHA1e325988f68d327743926ea317abb9882f347fa73
SHA2563f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171
SHA512dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c
-
Filesize
39KB
MD5537efeecdfa94cc421e58fd82a58ba9e
SHA13609456e16bc16ba447979f3aa69221290ec17d0
SHA2565afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150
SHA512e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b
-
Filesize
36KB
MD52c5a3b81d5c4715b7bea01033367fcb5
SHA1b548b45da8463e17199daafd34c23591f94e82cd
SHA256a75bb44284b9db8d702692f84909a7e23f21141866adf3db888042e9109a1cb6
SHA512490c5a892fac801b853c348477b1140755d4c53ca05726ac19d3649af4285c93523393a3667e209c71c80ac06ffd809f62dd69ae65012dcb00445d032f1277b3
-
Filesize
36KB
MD57a8d499407c6a647c03c4471a67eaad7
SHA1d573b6ac8e7e04a05cbbd6b7f6a9842f371d343b
SHA2562c95bef914da6c50d7bdedec601e589fbb4fda24c4863a7260f4f72bd025799c
SHA512608ef3ff0a517fe1e70ff41aeb277821565c5a9bee5103aa5e45c68d4763fce507c2a34d810f4cd242d163181f8341d9a69e93fe32aded6fbc7f544c55743f12
-
Filesize
36KB
MD5fe68c2dc0d2419b38f44d83f2fcf232e
SHA16c6e49949957215aa2f3dfb72207d249adf36283
SHA25626fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5
SHA512941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810
-
Filesize
36KB
MD508b9e69b57e4c9b966664f8e1c27ab09
SHA12da1025bbbfb3cd308070765fc0893a48e5a85fa
SHA256d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324
SHA512966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4
-
Filesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
Filesize
37KB
MD54e57113a6bf6b88fdd32782a4a381274
SHA10fccbc91f0f94453d91670c6794f71348711061d
SHA2569bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc
SHA5124f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9
-
Filesize
36KB
MD53d59bbb5553fe03a89f817819540f469
SHA126781d4b06ff704800b463d0f1fca3afd923a9fe
SHA2562adc900fafa9938d85ce53cb793271f37af40cf499bcc454f44975db533f0b61
SHA51295719ae80589f71209bb3cb953276538040e7111b994d757b0a24283aefe27aadbbe9eef3f1f823ce4cabc1090946d4a2a558607ac6cac6faca5971529b34dac
-
Filesize
47KB
MD5fb4e8718fea95bb7479727fde80cb424
SHA11088c7653cba385fe994e9ae34a6595898f20aeb
SHA256e13cc9b13aa5074dc45d50379eceb17ee39a0c2531ab617d93800fe236758ca9
SHA51224db377af1569e4e2b2ebccec42564cea95a30f1ff43bcaf25a692f99567e027bcef4aacef008ec5f64ea2eef0c04be88d2b30bcadabb3919b5f45a6633940cb
-
Filesize
36KB
MD53788f91c694dfc48e12417ce93356b0f
SHA1eb3b87f7f654b604daf3484da9e02ca6c4ea98b7
SHA25623e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4
SHA512b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd
-
Filesize
36KB
MD530a200f78498990095b36f574b6e8690
SHA1c4b1b3c087bd12b063e98bca464cd05f3f7b7882
SHA25649f2c739e7d9745c0834dc817a71bf6676ccc24a4c28dcddf8844093aab3df07
SHA512c0da2aae82c397f6943a0a7b838f60eeef8f57192c5f498f2ecf05db824cfeb6d6ca830bf3715da7ee400aa8362bd64dc835298f3f0085ae7a744e6e6c690511
-
Filesize
79KB
MD5b77e1221f7ecd0b5d696cb66cda1609e
SHA151eb7a254a33d05edf188ded653005dc82de8a46
SHA2567e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e
SHA512f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc
-
Filesize
89KB
MD56735cb43fe44832b061eeb3f5956b099
SHA1d636daf64d524f81367ea92fdafa3726c909bee1
SHA256552aa0f82f37c9601114974228d4fc54f7434fe3ae7a276ef1ae98a0f608f1d0
SHA51260272801909dbba21578b22c49f6b0ba8cd0070f116476ff35b3ac8347b987790e4cc0334724244c4b13415a246e77a577230029e4561ae6f04a598c3f536c7e
-
Filesize
739B
MD5aa416839111989eec2411d409582a9fa
SHA174f6b0a73f6f380046b347574867fced82504264
SHA256a55e69e805387339fef5309169242a48f8533f21e15b1d16fdf9292e71b7fc8d
SHA512d14900d93e7a7c869700d589b5be869b1dd96f894870ed51f4e11a49bbc816fd503f8549d984a0a352ac1b8ad1c315c0685cdfe5f387fd91daef539e49f197d8
-
C:\Users\Public\Pictures\Sample Pictures\@[email protected]
Filesize883B
MD58a0a6f1b83e123d40c36b56a32c75d3f
SHA1d5d11fdd1b90e230b3a0b03ed581420da764709d
SHA2561e416425bbae83f646f35d441120f4b7fb6d4c2f7bb5df60ea99f434b0c4e187
SHA512cc5297331ad4ab90fc702ad82c2f00e4272fc4f1ddb07a5a50f7d8aaffaa710f9e2b4def29203af9e77d2ad1d3de6b0fc8e1c763561e36ec70e0cd1b2f0d53cb
-
Filesize
22KB
MD58703ff2e53c6fd3bc91294ef9204baca
SHA13dbb8f7f5dfe6b235486ab867a2844b1c2143733
SHA2563028a2b0e95143a4caa9bcd6ae794958e7469a20c6e673da067958cbf4310035
SHA512d5eb8a07457a78f9acd0f81d2f58bbf64b52183318b87c353a590cd2a3ac3a6ec9c1452bd52306c7cf99f19b6a897b16ceb8289a7d008c5ce3b07eda9b871204
-
Filesize
153KB
MD5f33a4e991a11baf336a2324f700d874d
SHA19da1891a164f2fc0a88d0de1ba397585b455b0f4
SHA256a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7
SHA512edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20
-
Filesize
861KB
MD566064dbdb70a5eb15ebf3bf65aba254b
SHA10284fd320f99f62aca800fb1251eff4c31ec4ed7
SHA2566a94dbda2dd1edcff2331061d65e1baf09d4861cc7ba590c5ec754f3ac96a795
SHA512b05c6c09ae7372c381fba591c3cb13a69a2451b9d38da1a95aac89413d7438083475d06796acb5440cd6ec65b030c9fa6cbdaa0d2fe91a926bae6499c360f17f
-
Filesize
1.3MB
MD5e979fb2eb504972ed87ad3c825ec6c2c
SHA17a927cfa6d413f66da1ae05f668ce85b3547aaf2
SHA2569d45ae1d8d3749efbe72b24bc20142e8c55b88a0733a45e5fe8579cf24981f33
SHA512df1b55bff5fdee03cd77d59befe5ccfef555100605f7e9782e0a90e21ad6f67c92bdf925e2844d042c9da48e1c05eb4970460683aebbec2bf5a3f9cf6341bee6
-
Filesize
1.5MB
MD5c75a53e3d52543b1f7f18dced4d2e7e6
SHA1a570b105c8433333152da79d0d584cbf58fa028d
SHA25644700e507a6d0f3da8a625affe35264963bc6ce21b4c45b1bd5f8636f73324f0
SHA512a7bf4dac1eac425a3e7613a417fc8de7c841d8dfcc36786e08bcd384399b9ab62013f4ffa820fee3485b878ec7f1318ae406257a4bc52f0e8142112488631a6e
-
Filesize
1.2MB
MD5983d92b95c706a99fc613e59ba5d45c4
SHA1f4b63d88ce8ce5df0e2a8a6b1e5954188f2a45a5
SHA2566ea7e86a7de8be07b56496385b5584d417dfeb0a7198d2766d508697327932ac
SHA5124a53dadf6b6009ab0bb6dd382735fc2d9c5c13792d76212b9b3762fe458493061ac37d87bde877876ff20b8019aaf4bfe018edc6157c3dc5cfc7ab7f19a2f300