Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe
-
Size
3.7MB
-
MD5
074ce128e23528f00e98eac6ae9a6618
-
SHA1
39b2c91abb87af6399a7befab2fc100a03631258
-
SHA256
04371796ab1e77b188bf8f1007466552b2faf7176918f3e0b6ce499d3ba57411
-
SHA512
1db6635586bd506d4ca98e6be8b759fcfb8f44b7b6c3a96abf62986e4be49b5a04e3003dc379c8ea28342b3837ba71a32fa598125b8af001faebed9d8a23d97e
-
SSDEEP
24576:ajAj4d2Cc/8o+1WkGHIvl4Bw5vJULHsbDwPD9cAXVCEbEWBgvM7eTVVfR35e7xLP:ayxIZk9FO5e1lqd/E+e7CZti1D1f
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\yxjL_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 2548 MpCmdRun.exe -
Disables service(s) 3 TTPs
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 1400 wevtutil.exe 2520 wevtutil.exe 916 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (1917) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (5590) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2860 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 2464 powershell.exe 2832 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\item_hover_floating.png 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\yxjL_HOW_TO_DECRYPT.txt 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\TipBand.dll.mui 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Roses.htm 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105912.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipRes.dll.mui 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\9.png 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-Oblique.otf 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152890.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Black Tie.xml.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_Earthy.gif.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00369_.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\LOOKUP.DAT.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\PhotoAcq.dll.mui 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099168.JPG.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCHDRESN.CFG.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187893.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSTORE.HXS.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-gibbous.png 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_MATTE2_PAL.wmv 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_mru_on_win7.css.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Shanghai.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01138_.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\VelvetRose.css.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\PST8PDT.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-favorites.jar.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre7\lib\psfont.properties.ja.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\settings.js 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\yxjL_HOW_TO_DECRYPT.txt 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\7-Zip\descript.ion.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\mainscroll.png 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToNotesBackground_PAL.wmv 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Honolulu.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app_1.0.300.v20140228-1829.jar.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_hail.png 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\ADD.GIF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\UKRAINE.TXT 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195788.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\VelvetRose.css.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Journal\en-US\PDIALOG.exe.mui 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\settings.js 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\PREVIEW.GIF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\button_left_over.gif.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\powerpnt.exe.manifest.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\El_Aaiun.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\com-sun-tools-visualvm-modules-startup_zh_CN.jar.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00681_.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198021.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00050_.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00453_.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCHDRESP.CFG.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Phone.accft.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_olv.css.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\SETLANG_K_COL.HXK.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\11.png 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\sunjce_provider.jar.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-windows_ja.jar.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\slideShow.html 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01181_.WMF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUB6INTL.REST.IDX_DLL.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB4.BDR.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Havana.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382959.JPG.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2720 sc.exe 2864 sc.exe 1904 sc.exe 2008 sc.exe 1612 sc.exe 2084 sc.exe 2816 sc.exe 2260 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 768 PING.EXE 2860 cmd.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2024 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3004 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 768 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2464 powershell.exe 2832 powershell.exe 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1400 wevtutil.exe Token: SeBackupPrivilege 1400 wevtutil.exe Token: SeSecurityPrivilege 2520 wevtutil.exe Token: SeBackupPrivilege 2520 wevtutil.exe Token: SeSecurityPrivilege 916 wevtutil.exe Token: SeBackupPrivilege 916 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1720 wmic.exe Token: SeSecurityPrivilege 1720 wmic.exe Token: SeTakeOwnershipPrivilege 1720 wmic.exe Token: SeLoadDriverPrivilege 1720 wmic.exe Token: SeSystemProfilePrivilege 1720 wmic.exe Token: SeSystemtimePrivilege 1720 wmic.exe Token: SeProfSingleProcessPrivilege 1720 wmic.exe Token: SeIncBasePriorityPrivilege 1720 wmic.exe Token: SeCreatePagefilePrivilege 1720 wmic.exe Token: SeBackupPrivilege 1720 wmic.exe Token: SeRestorePrivilege 1720 wmic.exe Token: SeShutdownPrivilege 1720 wmic.exe Token: SeDebugPrivilege 1720 wmic.exe Token: SeSystemEnvironmentPrivilege 1720 wmic.exe Token: SeRemoteShutdownPrivilege 1720 wmic.exe Token: SeUndockPrivilege 1720 wmic.exe Token: SeManageVolumePrivilege 1720 wmic.exe Token: 33 1720 wmic.exe Token: 34 1720 wmic.exe Token: 35 1720 wmic.exe Token: SeIncreaseQuotaPrivilege 612 wmic.exe Token: SeSecurityPrivilege 612 wmic.exe Token: SeTakeOwnershipPrivilege 612 wmic.exe Token: SeLoadDriverPrivilege 612 wmic.exe Token: SeSystemProfilePrivilege 612 wmic.exe Token: SeSystemtimePrivilege 612 wmic.exe Token: SeProfSingleProcessPrivilege 612 wmic.exe Token: SeIncBasePriorityPrivilege 612 wmic.exe Token: SeCreatePagefilePrivilege 612 wmic.exe Token: SeBackupPrivilege 612 wmic.exe Token: SeRestorePrivilege 612 wmic.exe Token: SeShutdownPrivilege 612 wmic.exe Token: SeDebugPrivilege 612 wmic.exe Token: SeSystemEnvironmentPrivilege 612 wmic.exe Token: SeRemoteShutdownPrivilege 612 wmic.exe Token: SeUndockPrivilege 612 wmic.exe Token: SeManageVolumePrivilege 612 wmic.exe Token: 33 612 wmic.exe Token: 34 612 wmic.exe Token: 35 612 wmic.exe Token: SeIncreaseQuotaPrivilege 612 wmic.exe Token: SeSecurityPrivilege 612 wmic.exe Token: SeTakeOwnershipPrivilege 612 wmic.exe Token: SeLoadDriverPrivilege 612 wmic.exe Token: SeSystemProfilePrivilege 612 wmic.exe Token: SeSystemtimePrivilege 612 wmic.exe Token: SeProfSingleProcessPrivilege 612 wmic.exe Token: SeIncBasePriorityPrivilege 612 wmic.exe Token: SeCreatePagefilePrivilege 612 wmic.exe Token: SeBackupPrivilege 612 wmic.exe Token: SeRestorePrivilege 612 wmic.exe Token: SeShutdownPrivilege 612 wmic.exe Token: SeDebugPrivilege 612 wmic.exe Token: SeSystemEnvironmentPrivilege 612 wmic.exe Token: SeRemoteShutdownPrivilege 612 wmic.exe Token: SeUndockPrivilege 612 wmic.exe Token: SeManageVolumePrivilege 612 wmic.exe Token: 33 612 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2332 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 31 PID 1956 wrote to memory of 2332 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 31 PID 1956 wrote to memory of 2332 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 31 PID 1956 wrote to memory of 2332 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 31 PID 2332 wrote to memory of 2600 2332 net.exe 33 PID 2332 wrote to memory of 2600 2332 net.exe 33 PID 2332 wrote to memory of 2600 2332 net.exe 33 PID 2332 wrote to memory of 2600 2332 net.exe 33 PID 1956 wrote to memory of 2620 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 34 PID 1956 wrote to memory of 2620 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 34 PID 1956 wrote to memory of 2620 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 34 PID 1956 wrote to memory of 2620 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 34 PID 2620 wrote to memory of 3028 2620 net.exe 36 PID 2620 wrote to memory of 3028 2620 net.exe 36 PID 2620 wrote to memory of 3028 2620 net.exe 36 PID 2620 wrote to memory of 3028 2620 net.exe 36 PID 1956 wrote to memory of 3020 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 37 PID 1956 wrote to memory of 3020 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 37 PID 1956 wrote to memory of 3020 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 37 PID 1956 wrote to memory of 3020 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 37 PID 3020 wrote to memory of 2472 3020 net.exe 39 PID 3020 wrote to memory of 2472 3020 net.exe 39 PID 3020 wrote to memory of 2472 3020 net.exe 39 PID 3020 wrote to memory of 2472 3020 net.exe 39 PID 1956 wrote to memory of 2588 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 40 PID 1956 wrote to memory of 2588 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 40 PID 1956 wrote to memory of 2588 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 40 PID 1956 wrote to memory of 2588 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 40 PID 2588 wrote to memory of 2844 2588 net.exe 42 PID 2588 wrote to memory of 2844 2588 net.exe 42 PID 2588 wrote to memory of 2844 2588 net.exe 42 PID 2588 wrote to memory of 2844 2588 net.exe 42 PID 1956 wrote to memory of 2252 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 43 PID 1956 wrote to memory of 2252 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 43 PID 1956 wrote to memory of 2252 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 43 PID 1956 wrote to memory of 2252 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 43 PID 2252 wrote to memory of 2968 2252 net.exe 45 PID 2252 wrote to memory of 2968 2252 net.exe 45 PID 2252 wrote to memory of 2968 2252 net.exe 45 PID 2252 wrote to memory of 2968 2252 net.exe 45 PID 1956 wrote to memory of 2972 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 46 PID 1956 wrote to memory of 2972 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 46 PID 1956 wrote to memory of 2972 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 46 PID 1956 wrote to memory of 2972 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 46 PID 2972 wrote to memory of 2852 2972 net.exe 48 PID 2972 wrote to memory of 2852 2972 net.exe 48 PID 2972 wrote to memory of 2852 2972 net.exe 48 PID 2972 wrote to memory of 2852 2972 net.exe 48 PID 1956 wrote to memory of 2848 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 49 PID 1956 wrote to memory of 2848 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 49 PID 1956 wrote to memory of 2848 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 49 PID 1956 wrote to memory of 2848 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 49 PID 2848 wrote to memory of 2832 2848 net.exe 51 PID 2848 wrote to memory of 2832 2848 net.exe 51 PID 2848 wrote to memory of 2832 2848 net.exe 51 PID 2848 wrote to memory of 2832 2848 net.exe 51 PID 1956 wrote to memory of 2288 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 52 PID 1956 wrote to memory of 2288 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 52 PID 1956 wrote to memory of 2288 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 52 PID 1956 wrote to memory of 2288 1956 2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe 52 PID 2288 wrote to memory of 2992 2288 net.exe 54 PID 2288 wrote to memory of 2992 2288 net.exe 54 PID 2288 wrote to memory of 2992 2288 net.exe 54 PID 2288 wrote to memory of 2992 2288 net.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UI0Detect" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2260
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1904
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1948
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2036
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1244
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:2684
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:316
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1224
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:716
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:296
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:932
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1572
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2024
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:612
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:3060
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe C:\yxjL_HOW_TO_DECRYPT.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3004
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\2025-03-12_074ce128e23528f00e98eac6ae9a6618_frostygoop_hive_sliver_snatch.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2860 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 5 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:768
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
4Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize341B
MD5f4393bdb40865ebd0eddf5a27b87ddbd
SHA1823b5e046d08576ac33517eaa93c61665edbb65c
SHA25687ff13b6c9f725a3fb2e5c8ef524cc5819601e2d8331822333087a72dd035efb
SHA51273a1db5a02928e2f903ffae6c477e7ce3d313048a0faf2216eeb9183db9e7406c2abfd8e36861f5a8a96eca220fe2d6a7771b84820ce27df232c944e56b62257
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw
Filesize222B
MD5a875cf9caadc406392ad4bbde44fd55c
SHA1847e6491a3699254781e581f107becea8812ffe5
SHA256fff5db9fafe7d0264df2c4135ca0a6252f4f4bddfc7b62471c2cca0a3fbf5954
SHA5125b2bbdb377737bd4892e41ad1127b5767af9d7d873300d065190d03e7a130810290bdd44500a01758c1305b7e0d50bfa5694dc188f60aabbff5a9f679fc4c036
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize114B
MD5b8fbbc73ddde31636552ab184b4e398f
SHA15cfbfaea56e979a07c083f2340b10a5894812d78
SHA2563c3702253a4695b5bcb18a2565b1d49f9f32f5f9f2442fd1395197970fa34edb
SHA5127f0f4b098e0d37ed403be8d54e2dcbc603791ddf00e3a21747c41ecfb829fdf664b6bddda8d51309e1229b197244a1d8ae23e1b3bf3348f99f84a7a8684db8d7
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw
Filesize113B
MD5db9742e49c49c505b293a84518e95fa5
SHA1406dae0b226900aad2ad2e10d8366651b848c053
SHA2561c17b95e5098adb0c0e06aac8a8c7c50c6a5ef1b696465d548c8a922f1d3a653
SHA512974917a72b2b3b783bb0ffcbfe0058489ae65ac0aa71ae86d77195780aeb7800848a3158fbe7ad8ddf9b30145d8a1a2c66f72484305ccf363b7981f105be295b
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize185B
MD5973779cfa96b0be367e8718db325c4ba
SHA1be1115e7d145c8181f82b66ed30b4d5dc60bdfb7
SHA25609d2a546c57dc9fec8fd5efd059ab8e7e21d51f582fd678f05900efef154db0a
SHA512baba3c85e1f49e2f3b1c26f3db0cedd7a340a67c8fd5ab80e70957418d658bf137ec32fe529c01f122b932a3961fd4739eb557588d239471aa84cdfe99aa9dfa
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw
Filesize496B
MD594f8f9cbbc7c55b6035f08f846d39cee
SHA12dad7a9174aea6a26301a00a7d3277595cfdca8f
SHA256f1b55bf40b6fa794c1e614aa75985258a88e2165bef91eff545438b85baa5c3f
SHA5126dabc2f1cc7872cff3682bb1d4e852d97e69cc7ae232dc9dbbb0fb3333bc3e3d99e9e2a2478cce03875abf9d2f27be964220586ae146af41484f78c98509c53c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize1KB
MD552236cec3798df288705441118df4bcc
SHA11fd595c15b27c07a7185cc39bcbf66c52641e32c
SHA25671e4d48ed4515f17faa6505256314a8d6022e103714193785e7fcd08a36a051d
SHA5120c949c6cf7c1d61978ae838e266c845cb9990ae574d6f1e80d96c5f87db15bca354aa4499ea80fa7fb47c8734b0db55d581b8e8cda07e1664423f957ef5f91e7
-
C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.SE.XML.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw
Filesize806B
MD5fc9a01384283f760b245bafde02893ca
SHA127787bad85297baad51216df565e409dfac1d440
SHA2567bdb5be38475510a7c05a3444b122a62e8cf4c05b35e656ca4deccce4a55d968
SHA512a35db9e5336b752fdd25db32ee0584fcd93c9c366ab3119d1e5cdd235c8f77e44170fdf2ce6c182d02df750ed89b85926c2cf4bfd4b4f6d634ec0c20c100c0e0
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\yxjL_HOW_TO_DECRYPT.txt
Filesize1KB
MD545cfb934ec29f5e73f7e81fbcdb87581
SHA13599e538a33ea625641712350c34406d1ca27047
SHA2562eb37477bce5aceb507003f28e068dd331c61c57c01b71eb15f5f8914fb0854d
SHA51249757baf3f5e874431437efae14cdbda72fcd1c23d4d53a81b08afd08bc16f148acf7d2cc37f35975e7b9775be43e3e101d1ab084ab02d0ba3fa4793d066d42a
-
C:\Program Files\Java\jdk1.7.0_80\db\bin\stopNetworkServer.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize5KB
MD56b38156ab3966c88706e6c6a36aa0c91
SHA1dbfb754cf33e583995b60cabe70f9e5e6013514f
SHA256cf89293922a3395f157c1d100a25caad75d845401b0e285f2547bd13f0f6a4ae
SHA512a3f44332535861175245ccc85b68be40974444159f53b4561aad5eefe4ea399bdc4ea9071e32b7f38fc050cf4aeaef5cff862fd576be5e8328d0e49bcc18e74d
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize57B
MD5adf99b54fd6f317b611320564167c305
SHA1d3d80dd39b686e04bf31db6ac9335084e841ef73
SHA2561b68454d53e781f8793547fde8fcb2f3b03b5c8134f37b9d8c4045cb8a5473f3
SHA51265fb44cdaf01632d60ecf3b49ab1eb661982ee8b6a430dcf6d1e75789787c9e7356754cd071421ca44a1b32ab918be97a630b1b0ca722383eea56d40fa131642
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize8KB
MD5202ddee0f0fca55c043b44d09bfe2375
SHA10fc1234511599cb695726f107c36d317f4e4f263
SHA2567bca2f8a9053cbfc536cb3db7b316311d06499c5ec3e83862860d98f15ec9aab
SHA5120cd0b41a6d2943f42b2f4adb0bef02f5354904d2a10b2264d831f6650fd7519913f8cb377d827a904502b927e885ce84778f25fcc1ef14ac2f58eb211235c7a1
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize12KB
MD58c8398eafd44dbfdbd9c616943ebbf2e
SHA15086051fdee11f9817617ded842fecaa8965e58d
SHA256609c03b42ef3c746cdd8cf7255aa98f573c039af04e644549f2976ed96bfb9eb
SHA5127b75e1befac578ab534b7467c8daf674c2ffb5b23c8057971b22a69da346b323c8c6dc422372a9e07b4c0a7ac8b3fcf15c9edb480d621b8c164f902a45bfc93b
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\epl-v10.html.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw
Filesize12KB
MD5a161dafbe7c05ba7ddf611b1716c67a8
SHA196228ce1e7ca55407b55c6b474ad63a524362582
SHA256c5238e81c37fcbf3e7d8096e761d466559b0e05daa1934b8e4caf03e4ec60c7f
SHA512f9880fe01c0ac4d9b95141769bcb3543d373c1794b37beb1d7bf067cde3c2dd4630806f962845ba7f32315a4aad3d2e304a31de8903c09e2a5e3cafd1c09e578
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.RSA.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize7KB
MD553f2c69e916a1dab76248df43aa031bd
SHA186d66a3dcfd6810a21014fa67ec12910b35d0a17
SHA256f7fceb2193519470a82764e5b2a749ab5e0929fe3e998700e56a9c151a89fe61
SHA5122c606d43c5b8d9953475c319a7adbbb56f3a75a22e9d77a0cb3a88da1f005ea7888b0efed663785f9948badadbf198013992fdcc6e63fd73913c0b41f0d59161
-
C:\Program Files\Java\jre7\lib\images\cursors\win32_CopyNoDrop32x32.gif.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw
Filesize153B
MD51e9d8f133a442da6b0c74d49bc84a341
SHA1259edc45b4569427e8319895a444f4295d54348f
SHA2561a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b
SHA51263d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37
-
C:\Program Files\Java\jre7\lib\zi\EST.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw
Filesize27B
MD5a2abe32f03e019dbd5c21e71cc0f0db9
SHA125b042eb931fff4e815adcc2ddce3636debf0ae1
SHA25627ba8b5814833b1e8e8b5d08246b383cb8a5fb7e74e237cdbcadf320e882ab78
SHA512197c065b9c17c6849a15f45ac69dafa68aaa0b792219fedb153d146f23997bfa4fbc4127b1d030a92a4d7103bded76a1389df715b9539ea23ea21e6a4bb65fb2
-
C:\Program Files\Java\jre7\lib\zi\Etc\GMT.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw
Filesize27B
MD57da9aa0de33b521b3399a4ffd4078bdb
SHA1f188a712f77103d544d4acf91d13dbc664c67034
SHA2560a526439ed04845ce94f7e9ae55c689ad01e1493f3b30c5c2b434a31fa33a43d
SHA5129d2170571a58aed23f29fc465c2b14db3511e88907e017c010d452ecdf7a77299020d71f8b621a86e94dd2774a5418612d381e39335f92e287a4f451ee90cfb6
-
C:\Program Files\Java\jre7\lib\zi\HST.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize27B
MD5715dc3fcec7a4b845347b628caf46c84
SHA11b194cdd0a0dc5560680c33f19fc2e7c09523cd1
SHA2563144bc5353ebbd941cdccbbd9f5fb5a06f38abf5cc7b672111705c9778412d08
SHA51272ab4b4ad0990cce0723a882652bf4f37aac09b32a8dd33b56b1fbf25ac56ae054328909efd68c8243e54e449d845fb9d53dd95f47eaaf5873762fcd55a39662
-
C:\Program Files\Java\jre7\lib\zi\MST.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize27B
MD511f8e73ad57571383afa5eaf6bc0456a
SHA165a736dddd8e9a3f1dd6fbe999b188910b5f7931
SHA2560e6a7f1ab731ae6840eacc36b37cbe3277a991720a7c779e116ab488e0eeed4e
SHA512578665a0897a2c05eda59fb6828f4a9f440fc784059a5f97c8484f164a5fcec95274159c6ff6336f4863b942129cb884110d14c9bd507a2d12d83a4e17f596d2
-
C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\vlc.mo.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_AAAAAAAAAAA0.vsbnw
Filesize614KB
MD51bcd19452a5fdffda64c832dbca81036
SHA1bdd8bb2c420dd7a5a98b2c2e22df74ef35aa82a4
SHA2568d56ffc5bbc17522b11925fb6b04782384d96d9616ab663e03f77c44367eb9a7
SHA512704c1b5a998ff103b485e891d4c57ba048b27d67817df25d2b6541782788445c490ecda58d96f77dea77321a147d904329bad94084ac66a992d9bed6b4a04c7c
-
C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\vlc.mo.WqGaUbftkGnNhxXpCiFHrrrejk0dlhXFYu2YXkDErLL_IAAAACAAAAA0.vsbnw
Filesize616KB
MD52b4ff5d9fd295753ae7dce78308bf8fc
SHA1be9150495347e810648d685b6193d9242e299d05
SHA2560d01f969e6dc5f66756b2f5f7a4bf6779b6115116491792f8a06fb94e3fc7f03
SHA512e0a78a885209ba9e5d9a240e0b6c187d7fb3dd7a27009e898b0ef473a9e19e63f00784c359002f9875a3844b68f53cfdd6033eed015382654441588640199812
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD50dd28b170311528bb2f6b4a9c3ab386e
SHA14d86c4491751b00304237d23b38633287b15e90c
SHA25672775ed7c3332284a11180aae541db951281b79cf50564543af1ad8482d6a99d
SHA5126889e7921e26840a77c1b7ae9716474e466dda0fbf6b13912dd259a789e85d9d8affbb4179eecaa9ca8b62e71837216dbb80fe03e3f7366fd20a18279e3baea8