Trojan.Bitcoinminer.BB
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 877 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 42,854 |
| First Seen: | July 24, 2009 |
| Last Seen: | April 21, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Bitcoinminer.BB |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
8740d7493073053a98ef11c75a140e31
SHA1:
b9fd774b8390ebd6f0e2c3431248b84108bd9580
File Size:
192.51 KB, 192512 bytes
|
|
MD5:
2780bd407e95fe13c6db62aa28b8b08b
SHA1:
0ef7776f6c69b0e7243d6df1e9329acf15fdf5d8
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
2d65a432932cb239624be11c925260b5
SHA1:
c9818a0b029fee54cedf74badb99a578bad4ce6a
SHA256:
32F085AB2556A617EA8907CA6EF07B40A1A6C404950934ED7D009332F759E96F
File Size:
282.44 KB, 282443 bytes
|
|
MD5:
f8db5710f2ddf8bc4528ff7dfe40b2c1
SHA1:
8fb06cdd9dcd833647839ae420e95276d4c5eb6c
SHA256:
5DA9F9BECAEB86F055C41021D1972CC22A6417F0D7FE137E0F143E411118CC8E
File Size:
425.47 KB, 425472 bytes
|
|
MD5:
5f98eb2eec2c8fdf8994f0cc8c96c7d0
SHA1:
9c38714c0c2e34428d6a1cc6696f713ea5632357
SHA256:
17309266E1284B175C67AB49F0ACFBFF778B05D9B46240B1D15DCB6F45BF113A
File Size:
386.56 KB, 386560 bytes
|
Show More
|
MD5:
3a586e507a2b237d3caa9796ebdf82ad
SHA1:
4a164e8dbe73b2da6257d2bf1009df07b80a2f17
SHA256:
1C76DB9FE162C788CFEAE6E6CC0D3BADF42418A04B6EBAFA85BB90B410C93FFD
File Size:
130.05 KB, 130048 bytes
|
|
MD5:
0f6d72d89a520523c4fe22050307fee3
SHA1:
236749837977f3175008054826e83e3d8875deac
SHA256:
9D3DAE6D074FEBB01DC1A88451FEC27D27F1154782E4F21AC79077C130D99C0C
File Size:
288.26 KB, 288256 bytes
|
|
MD5:
d34f21affc929230e897bebd998a297e
SHA1:
f42b0593f7028c29207e271b147fa5530a8a8924
SHA256:
DA6E0C436D6E9E94F4F5942588FBA4BF151606C3C50A405548E9D1C13E33DCEA
File Size:
391.68 KB, 391680 bytes
|
|
MD5:
af90f5110a9840c179140a410d8e158e
SHA1:
09a1abd67422e002aa9b53f89f983da69dcb7f7d
SHA256:
FAC53E698739B90C2981DB950A3A238C03F228D7E646D0FCE6F014EE2821DC3F
File Size:
2.57 MB, 2568192 bytes
|
|
MD5:
22fd87a00d6bd298c0b75557b1aa4801
SHA1:
54d3e601f0362f0260dc63ffb0383b4c16acc88a
SHA256:
46BA79919192ABC0E22DC8927DC54F35CC5F20FCE74AB9782A178EE24DEEB37C
File Size:
197.63 KB, 197632 bytes
|
|
MD5:
6a5fb4a5f63bb817c7cbe406488856ef
SHA1:
4a384fd363d71913ffcd1ff32d5177bf4cfd01d5
SHA256:
F60C3072EA30067608B279FAA869D14184CEE14FFF7896B4E20F7626C2DD0E7B
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
ec723f46ba27c46be0704bcd836ec209
SHA1:
7c42c5412b11d3d96210fc00321dadd5cdea4f52
SHA256:
FBF0BE8CCD150EE5FF9E16452117C2FBFFB1D5F6C98BB22FC53D756D3CA705BB
File Size:
207.36 KB, 207360 bytes
|
|
MD5:
fda5184570e5552941946ff36874d7a9
SHA1:
1b931bd11f9e199ffa56c51c9b6c07a66ccda9b2
SHA256:
6DB2F31ECFD1309F2CDEFB8DDC420C6CA6AF21CB61421D26A07BA42723F20460
File Size:
498.69 KB, 498688 bytes
|
|
MD5:
81d7838bac1d0db3a0f007253caea9a5
SHA1:
e13d4b1ba84c28d29f02a0e2f3b6dff659c98162
SHA256:
E2D10406EB701D6FC79CBA1D10FBE1BD1DD41277EA062B3213DD4AB60D693999
File Size:
164.86 KB, 164864 bytes
|
|
MD5:
acf5d12e84e163e73f309ae7beefa236
SHA1:
68c16c0aeeec62811343f01e4630a3e44bde223b
SHA256:
7B6F3EF97E6D2D4973A3BE95AE8814B64DDD178E049AD8F99BC4AEBBADF3FFC7
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
888ad6b3f91a2be8b4272824c0b12f12
SHA1:
a4c024144ed0426501eff263512dfcee08522e1f
SHA256:
659F28642F22996156086A27DDC209B1341E0CBA9FE291DF442CDC1A68984F78
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
c067919eeb0b006e1664a457c1727336
SHA1:
ec49c9c764b4480383549531a1cfe6525f8ea195
SHA256:
4091209181CF41050781709DA3D575838DCBEC2B831137DCB485FF973ABDF79D
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
414898fe4f9376bc0a94c7d6462fdfa4
SHA1:
252dbf03d926b7136c67bfb3de05eafbe65355d8
SHA256:
EF7DAB12C5EF07ECA91B9ECA7406AFAE7EF75D51339E5339AE29903F4D5D8052
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
cd712f3428ca2b398aea9ad2c957d31a
SHA1:
27b07ccc46b9b4c945571e0a1161884eb020d17c
SHA256:
67B5597CF8AEC47B3AA244C4E4C8AB0FA65D183FCA7E004345A0C723B8D67EF3
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
88c2b893cfdf5f63fa5bf89ff2902bde
SHA1:
8f7afdfe373bf754270caff338177fbb3f89708c
SHA256:
FBEDD4AEBBA30B36C6882F8308D733D7174B1169A727C71C765590945C3FF604
File Size:
390.14 KB, 390144 bytes
|
|
MD5:
b43fd7fd79fb76c69c4158e587564b6b
SHA1:
14f3214508c418558f0b4fd08f6868a0a7f0f001
SHA256:
F005F7810C7BB3F4849F4E71833BE9EDCA70571851BB8A818FF9F34B8D22BA40
File Size:
485.89 KB, 485888 bytes
|
|
MD5:
24ad78a7a7a39e3f001699f5037d0e02
SHA1:
87e696db924e184bc0196d0e41de697fb9775756
SHA256:
41BAFFDC8F1CC22BAC364CDE9470C526C3CB09C0B3DDB766617612270DDFDF2E
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
4110a428b5ada30988657d1b9405f348
SHA1:
6fceb2b243ad2891bdb5f83a4a5265295f7a1a91
SHA256:
87385CCD1123EA868F6EA07C3683388BF2CAE12366E0642AFAABEE2D8F610D08
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
b1717bda7c76bb7a3cf20d3b9c2b09b8
SHA1:
6f86cd072a396c7b6abb3806d2905b780ff8d6a5
SHA256:
3AA83A08D942206C4BAB6F0ADF17D251B9838DD228B813A4E0E5F66D1077A634
File Size:
140.29 KB, 140288 bytes
|
|
MD5:
9a1e921dde5db958f19eb0df4c40b6d9
SHA1:
0b3ed40c3254bdaea0248ccee0e08bee95d87768
SHA256:
98C218393594092FC2E30CDB8F9D182115DDB08AC17956AAA151D8F49BD54D10
File Size:
194.56 KB, 194560 bytes
|
|
MD5:
4a87fb48442efade79a9069b195ca086
SHA1:
1e0cb684e4942ecab68bef187528d3ecb97428c9
SHA256:
CFF96F1765EF71C09FEA4058C9BE13F71DF323FE5BF5F32835561A5374C7D352
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
e35c18a563d7c9f7ffa0291fecdd4f18
SHA1:
cc70fd6a175f62c802ae58e29cae0f23161e1419
SHA256:
1886EBED97FD31C498319CDB92C31CD4E71EA86A784391132DD1484CFDED1CA8
File Size:
346.11 KB, 346112 bytes
|
|
MD5:
38fc5ee6df0b4f0130036e5491d4e1a2
SHA1:
3cd15a87446ecc65f7973927ace1580d6583e76e
SHA256:
DCC01BCAE9C2BFA9E82DA5731AE207C17C37C3763EA89553AE7B76D543D24083
File Size:
396.80 KB, 396800 bytes
|
|
MD5:
67540809a56e5b4fad6f9c9eadcad5df
SHA1:
273421244d56d006027a6f79d9f78e2425b071bf
SHA256:
BB9DCB20E4B70F7B71AB33F2D9FD56E334C2BCF85529D5998897B493165233B8
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
84b234beaaebd9a19aff9167a6928da1
SHA1:
11f5ebd1c47bc933e2e7d367ea10d85493c0dd62
SHA256:
86B514F9BFE86EDBEFA4A24B85D3011837D51A469385A921E0CFF57F8E855B71
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
eb4abb846a6dfe1920daff2b70f9a0eb
SHA1:
920d8083eac7051339505ce511cbc1a0c8a69661
SHA256:
4D9BBFB407283ABEAF387CE6DB633C0DF49ABD676A5FFCFC747F8805B25D6F05
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
763d7bede625c29dfff931a0130a79a0
SHA1:
171b5435ddedef67ef01974659487a153bd9d68b
SHA256:
36E0294ADCAEF25C9DC31C7B102DAC6085A178F758F4423454A2C060F101CAFA
File Size:
70.14 KB, 70144 bytes
|
|
MD5:
0fb3f3c122df9e2350f6e7158e27818a
SHA1:
089f6dd6ccadf11626453eff2a81587a1ebeca43
SHA256:
5986FE6680D5B228FC2E9B6FAA9BC80CD329A3DC3AF2FEACC5BCD4FF98D39406
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
9e955893d76a94e0dd4e28030f5c84bd
SHA1:
260b9fbf8856cea37a9d473e4f831330f2870e8b
SHA256:
06810BD68E0DF8471B0FC4B9826BC5FA45DE689A5167B0AEC367D4179094B732
File Size:
541.18 KB, 541184 bytes
|
|
MD5:
202ea0e2a628e205aa2f7b61c712bbc1
SHA1:
dc8dd7f2ae7a4720ce9da482fc1e18e391dc94af
SHA256:
9B8A00351438DE903411AC34E5C47356D10B02F29FA69906228E87D41073DC8B
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
8f70900a1d02cfa59d942e81f46af6c4
SHA1:
4799380b2c8e621561a4de087cf1fcf427246400
SHA256:
D8E794322C14B97F38956D2BFFE7698C707BC443F362830B8510F0B6A0FD3F78
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
f41a81643e25f831164458b27792166b
SHA1:
4b96c15657b4e58f10f0b9370bb5bc46ec6f5f92
SHA256:
A9983818EB98BE8F6276DFBB940E0B263E30B79640460D99610A51AE0FE94E75
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
bdb606f2285a073d8b4f7c00a4987242
SHA1:
75ed077c5dee2ed48a8ae0ac3f34245e9a9059a9
SHA256:
CB1BC0801AFEC3A8E57B00489E6C0FB4599075C5605CA856C464EFEE7671DC4D
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
6827cdb72b2308a88e825671b20e512b
SHA1:
2c3ee8c54a7dbbad4c4dec51153e894ddc754f26
SHA256:
CF69A6A82B5FE817450FD7469F698D10035DEFD7CEE91A0DB436374AB6D2557F
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
0c21915260806c08d2ba11f70f2bb1e5
SHA1:
9af23c4b4ce5fbd0424d0dad1e1c5345eee5520b
SHA256:
75ECCB2F583A26DC3987FC75C8B5E1855FB14D6FC76B9A29DDE69AD68DEF1BB8
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
ed3352414e72f1aa363d40dc0ccfc31b
SHA1:
299759b755109af6bec5dd18e3e7f97b77574085
SHA256:
E47905CADF2919675CD4644FEA991596CA3D395BD914010663D96D44AAE4355E
File Size:
157.70 KB, 157696 bytes
|
|
MD5:
1844218353ccae5dd9332ce7b77dbac9
SHA1:
62c2466b5a960e98f66c5c012aaddacbe9f6f821
SHA256:
D156DBD762EC2E743F43160F7B0D0B69BC0AAC50597E57EE01A6F1F52CC1223B
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
2c0604e736d40e2ae8f8adcd9e53d27c
SHA1:
17b6f58d83ecaf1584747ec03dab6db8273cbb16
SHA256:
A2DBFB3BE756BE7F1EDB56B6D01BBF3E74584036F048AAE32776FD23D599E202
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
aadae57dcde18ba843858cdd9236c8db
SHA1:
e3ff040d59b02724f53aa50720bc19fafd781881
SHA256:
E022A67BFB460BB57205E88536B81FF753678D557C83348284C46EB1048DAE96
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
b2f8230e615cea0af418f45c6e99c69d
SHA1:
46cd563ddbe1194a7ed362279628a41464f36082
SHA256:
EB2D2474311D84FC7B06D49A5C1F7B34850BC0B4878E2D8F0AF79B98EF7A82B7
File Size:
416.77 KB, 416768 bytes
|
|
MD5:
66439298c54548936ec9ff455baf1a3b
SHA1:
4ddefef57c50124713cc427c9f1cc1460185fb3d
SHA256:
0FBF5B4210C144424585287EE72DDAEEE20C6694E1A0CB84A5C370C09B77D73F
File Size:
195.07 KB, 195072 bytes
|
|
MD5:
26aae15d492f0583a4044b4050369e9e
SHA1:
a00e37a28d8bec694d871078e43531e9a1915386
SHA256:
E77B5CE17C357E5C9772CA1E431126820BABFD799028713C99373F30FF175BFC
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
7607246a7548d33cdd55437eef55effa
SHA1:
7c7ff3e33dafe5b2e03104ad1ffcf026162b3780
SHA256:
49F32991342CA6B5C244E13627F147BBFFA4D25B02AF14641DFBCCF5877C8A63
File Size:
165.89 KB, 165888 bytes
|
|
MD5:
2b7235e3a0934275ee07a7dba4b80851
SHA1:
a571c5d07679ba1d1e041d70f403a3f8b1590b4f
SHA256:
20AA2F19BD9C989B76A2C51E7CC0180AE2FDD13DFB3EF69035E1D45A0234BD0A
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
a35510e44123c2dc95eb5d76243d2a6a
SHA1:
60197b35de8f237c3d0b56c767ef990bf871c807
SHA256:
26C6BFEE9B9086EE888B1FA3B70D7DEED1926DE830147FD837735257140A02CA
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
cd97720066806a851b8715dd65fcb809
SHA1:
f5e9fb891a8134ca96f9bc6a6e01a71a96b6279e
SHA256:
2CB8E5E04103F8A4B240E64C59FFB2C8CB8FA21E0F1E698ED69311EE7D18F0D9
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
88d53b39b04de4a21a82d1620c8a5d33
SHA1:
578f62ce90020694653e65b7bf04ed2aff638c2b
SHA256:
FE7642EE65812CB4EDAEA6B5635872542F75B03881541F3A811F15343323ABF1
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
4f6487c757499722f8ddffa57f0b8286
SHA1:
c61399e940956263eb34985bd9234aaa66fb843b
SHA256:
D817C36FC61F644ECBBB39D8803201ECA0486BD449C0888B3B433E7873CE0C46
File Size:
154.11 KB, 154112 bytes
|
|
MD5:
f22dbeab886881dc1900374e230b4e1e
SHA1:
d1e2f4ef271e0245431b9cf7560b1e95126956df
SHA256:
4368E65205082AE14E0EF1A3C45716CFEED6F75840AFE5DBF2D8643D0E4CCD03
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
4f27692bfcc834584ec4f10a3281a71a
SHA1:
cdd0d4f819f6aa837e0db1aa7c68b003917cf30a
SHA256:
FA0D254EB01C13254BA6840374CEF3B96B11958F37DCDA259779D0C7D8296A1A
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
6e4da05e1f01d1a29110d51b08f96332
SHA1:
e1f9a2144f6cc01e0f7bd1c8bc219b54b42873bf
SHA256:
E4DB3902E1C1C79900EA9065A10DDC846B45BAD301928FF093A341CE2FEE05F8
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
dc8012c860070d04e6f6e3e83debdbd8
SHA1:
50d0db6ebf4e68de69cb1989dd1843c836877907
SHA256:
B4DD44A50255E65B7B16DA3B8AD5A5675150A44771947AAC1075FAE3FFF7E3BE
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
a82888338c54f78d97e9061126cac2ba
SHA1:
60cdde159dd21cf13eaf11b1520a51c8ff52e74c
SHA256:
195DCA4852E8B4906B2E19819D372614108741D248B290BA1D05ABC433885A8A
File Size:
130.56 KB, 130560 bytes
|
|
MD5:
e002fd484d381230bc5d44d86baa9e55
SHA1:
00c1d671b8cb560df3f20323e4a522c0a2cec045
SHA256:
310EFFAFEC1BF4594946D19265FC7C2D5C0811381474C2F2F0FD064BE09F840E
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
4bcc8d756f2c4bee111636a14c830429
SHA1:
d8ec5a0168ed5485baebcc9427f6bb7e54f4e461
SHA256:
9DA6051E8170DA2E340395FEE6871ED2C483C8ADD356EEE426B1A431AA104096
File Size:
647.17 KB, 647168 bytes
|
|
MD5:
722ba030aa71fb480bf7d473ab0d5ad1
SHA1:
40598e2e9adbb2bd0c705d8d419d93cd0f64bef3
SHA256:
C59B89D5588CCEC7576FEEFD9FDACFE18C4B53CE5550188DC80E1C2F22FF7456
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
cddbced1978deb101f7c78e0d3d7a61b
SHA1:
0a964f506babcce5341b1ed2b36e3db1fdda6712
SHA256:
DBA1726A0BD9548714E310F956A76B4DB00D73571DE9EA82A036109CDDB081FB
File Size:
193.02 KB, 193024 bytes
|
|
MD5:
c559546464a240855cc67ddf97f65a6a
SHA1:
dff1783daa3bf8c304cd055b53171aa2ad9572b3
SHA256:
18A1969DA914AA97B48A55DE0A2FDE0E0D6192FCA1D1D15F9DBCE28808069192
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
131f8ee9144b09d33f99177cb9c04f8b
SHA1:
7a18440b22befae7db600233825a0cf7b6044076
SHA256:
30D034A1C49C542DC8A7338B54F10F6AFCAF505F65F4C2211CB8F6E12F3310E5
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
30b01e9532b77d799150a08b452a0a66
SHA1:
a6aed10e54b422d803ba5105e02a9312c07cdaaf
SHA256:
2073BEEF64F1C1527578B67FAFC85F479727DE27BD174B38D0ED9BCE4D7A0BD7
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
8fce1c624821c38a334fc142e8acac43
SHA1:
4062dc9618704c8e5ef26418acffa1175bb3260e
SHA256:
5A1B152E42A1FCA18C3E57DF437D2A646786A7816F230645ECC668507AFA2B68
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
b2a3a4f72abdddd1113f7527af738994
SHA1:
517e50772835c0c9bd85d32be8e336b105fbfac5
SHA256:
30C990B2B64F4556CA88780C1B21ABF2BAB9CBFC2612F7A70784656C0597D180
File Size:
168.96 KB, 168960 bytes
|
|
MD5:
4ea320f88f12c2b387a0ab66bcffefb7
SHA1:
766d563bf38d9d46b1de128d20abcfb82e6060d0
SHA256:
62309EFC4C9944DCB0A4102AA39D887B5D34B1C92FFEC603F822B72D3A1D9697
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
25d72249d747a2eec21854eb1bd09241
SHA1:
2bd7f0f9d85e7134cde5ca99dbb0bd9b4c417b3e
SHA256:
B8E96F2FEED3EBDA31BA1BE5F26F580EF9ABA6E3840E4136374346BE1BFBC022
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
948f26ed41128ef145cfafa5883c3fcb
SHA1:
1bcf2cf2e28f676f6c4685592e08a24a68e237c0
SHA256:
209D38B51B51768C756289BB2F7F89654E7C9E0195033EE0A1A72A2815EACEE7
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
ab49d042ee2c4dc6a720cdce22c12a86
SHA1:
2625286fc117d1d65421634f571712275fa4a286
SHA256:
E253CBBB38255B43CF995B6B75977C1370279DC354C1E6FA044C18AFAAD296DE
File Size:
135.10 KB, 135096 bytes
|
|
MD5:
30ca9d6edca8c29f2739882e74ab9545
SHA1:
227355f3eacf09d1e228d227ba26946b4a33b129
SHA256:
25A308CB9E187EA22CAA644B07986439D346787728CE6CD7F2983ABAF2DCB26C
File Size:
124.93 KB, 124928 bytes
|
|
MD5:
75c7a25754ab3995038e501cfb8c9da1
SHA1:
6eb9d51cafc5c5e9e57e06d130a01b695c784552
SHA256:
FB4299A445DB640D6BC2070B354B4B693414FEE76283BCD8E7E54FA00FD614A1
File Size:
124.93 KB, 124928 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File is .NET application
- File is 32-bit executable
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
Show More
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
7 additional icons are not displayed above.
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version |
|
| Comments |
|
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Legal Trademarks |
|
| Original Filename |
|
| Product Name |
Show More
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| CRYPTAUTH LLC | CRYPTAUTH LLC | Self Signed |
File Traits
- 2+ executable sections
- HighEntropy
- No Version Info
- packed
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 270 |
|---|---|
| Potentially Malicious Blocks: | 3 |
| Whitelisted Blocks: | 267 |
| Unknown Blocks: | 0 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Bitcoinminer.BB
- MSIL.BadJoke.XF
- MSIL.Krypt.FRA
- MSIL.Krypt.JUB
- MSIL.Krypt.MBCAG
Show More
- MSIL.Kryptik.XB
- MSIL.RunescapeHack.D
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\1153.tmp\1154.tmp\1165.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\1d18.tmp\1d19.tmp\1d2a.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\1e8b.tmp\1e8c.tmp\1e8d.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\243d.tmp\243e.tmp\243f.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\2a60.tmp\2a61.tmp\2a71.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\2b2e.tmp\2b2f.tmp\2b30.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\2ef7.tmp\2ef8.tmp\2ef9.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\2f83.tmp\2f84.tmp\2f85.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Show More
| c:\3548.tmp\3549.tmp\354a.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\3a84.tmp\3a95.tmp\3a96.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\3bad.tmp\3bbe.tmp\3bbf.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\3e13.tmp\3e14.tmp\3e15.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\40ff.tmp\4110.tmp\4111.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\44f4.tmp\44f5.tmp\44f6.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\494e.tmp\494f.tmp\4950.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\4bfa.tmp\4bfb.tmp\4bfc.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\529.tmp\52a.tmp\53a.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\55c2.tmp\55c3.tmp\55d3.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\5787.tmp\5797.tmp\5798.vbs | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\5af5.tmp\5af6.tmp\5af7.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\5cbc.tmp\5cbd.tmp\5cbe.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\6943.tmp\6944.tmp\6945.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\6ceb.tmp\6cec.tmp\6ced.vbs | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\7510.tmp\7521.tmp\7522.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\7833.tmp\7834.tmp\7835.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\792a.tmp\792b.tmp\792c.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\82ea.tmp\82eb.tmp\82ec.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\8665.tmp\8666.tmp\8677.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\8f39.tmp\8f4a.tmp\8f4b.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\92cc.tmp\92cd.tmp\92ce.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\98c6.tmp\98d7.tmp\98e7.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\9ba7.tmp\9ba8.tmp\9ba9.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a217.tmp\a227.tmp\a228.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a236.tmp\a237.tmp\a238.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a255.tmp\a256.tmp\a267.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a2a3.tmp\a2a4.tmp\a2a5.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a320.tmp\a321.tmp\a322.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a320.tmp\a331.tmp\a332.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a5ff.tmp\a60f.tmp\a610.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a61e.tmp\a61f.tmp\a620.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a61e.tmp\a62f.tmp\a630.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a66c.tmp\a66d.tmp\a66e.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a67c.tmp\a67d.tmp\a67e.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a69b.tmp\a69c.tmp\a69d.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a69b.tmp\a69c.tmp\a6ad.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a6ca.tmp\a6cb.tmp\a6db.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\a8e1.tmp\a8e2.tmp\a8e3.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\aaf0.tmp\aaf1.tmp\aaf2.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\ad41.tmp\ad51.tmp\ad52.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\b147.tmp\b148.tmp\b149.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\ba8b.tmp\ba8c.tmp\ba8d.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\baba.tmp\babb.tmp\babc.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\bac9.tmp\baca.tmp\bacb.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\bb08.tmp\bb09.tmp\bb0a.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\bb08.tmp\bb18.tmp\bb19.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\bb37.tmp\bb38.tmp\bb39.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\bba4.tmp\bba5.tmp\bba6.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\bbd3.tmp\bbd4.tmp\bbd5.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\bcf5.tmp\bcf6.tmp\bcf7.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\bd34.tmp\bd35.tmp\bd36.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\bf7c.tmp\bf7d.tmp\bf8e.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\d638.tmp\d639.tmp\d63a.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\e2c0.tmp\e2c1.tmp\e2c2.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\f278.tmp\f279.tmp\f289.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\f9d3.tmp\f9d4.tmp\f9d5.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\diagnosticsnet\cache.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\diagnosticsnet\configuration.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\diagnosticsnet\update.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\diagnosticsnet\updater.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\features\x\_locales\en\messages.json | Generic Write,Read Attributes |
| c:\users\user\appdata\local\features\x\icon.png | Generic Write,Read Attributes |
| c:\users\user\appdata\local\features\x\interface.html | Generic Write,Read Attributes |
| c:\users\user\appdata\local\features\x\interface.js | Generic Write,Read Attributes |
| c:\users\user\appdata\local\features\x\manifest.json | Generic Write,Read Attributes |
| c:\users\user\appdata\local\features\x\pdf_handler.js | Generic Write,Read Attributes |
| c:\users\user\appdata\local\features\x\script.js | Generic Write,Read Attributes |
| c:\users\user\appdata\local\features\x\security.js | Generic Write,Read Attributes |
| c:\users\user\appdata\local\features\x\style_01.css | Generic Write,Read Attributes |
| c:\users\user\appdata\local\features\x\web_accessible_resource.js | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_a04r2sd3.s1j.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_tuboheca.x14.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\c9818a0b029fee54cedf74badb99a578bad4ce6a_000028_patch-run.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\nsef7ff.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsxf511.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsxf9b6.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsxf9b6.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsxf9b6.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\temp_cleanup.ico | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\tidy.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\~lvecdkp.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\~lvecdkp.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\updateswin\update.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\updateswin\updater.tmp | Generic Write,Read Attributes |
| c:\users\user\downloads\ca131100001.cer | Generic Write,Read Attributes |
| c:\users\user\downloads\ca131100002.cer | Generic Write,Read Attributes |
| c:\users\user\downloads\gpkirootca1.cer | Generic Write,Read Attributes |
| c:\users\user\downloads\sh1.exe | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 쓽㞾Ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 紼뮑難Ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ♮赤ࠞǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Aunvsbun\AppData\Local\Temp\nsxF9B6.tmp\ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey |
Show More
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 虾超ࠞǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 굴趌ࠞǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 䊀⌃࣮ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 垄鳺Ⴌǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\explorer::slowcontextmenuentries | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\explorer::slowcontextmenuentries | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKCU\software\microsoft\edge\blbeacon::failed_count | RegNtPreCreateKey | |
| HKCU\software\microsoft\edge\blbeacon::state | RegNtPreCreateKey | |
| HKCU\software\microsoft\edge\thirdparty::statuscodes | (NULL) | RegNtPreCreateKey |
| HKCU\software\microsoft\edge\thirdparty::statuscodes | RegNtPreCreateKey | |
| HKCU\software\microsoft\edge\blbeacon::state | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ッ♚ǜ | RegNtPreCreateKey |
| HKCU\console::virtualterminallevel | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ᓥ♚ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 柶䞛ǜ | RegNtPreCreateKey |
| HKCU\software\topaz labs llc\topaz photo ai:: | RegNtPreCreateKey | |
| HKCU\software\topaz labs llc\topaz photo ai::token | null | RegNtPreCreateKey |
| HKCU\software\topaz labs llc\topaz photo ai::refreshtoken | null | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 證亅仇ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 媪솗怓ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 率绡圪ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 㽧朩揹ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ʗ짦晣ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ⾮㕻漆ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 힚漗ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 瑩濌ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 知潸灌ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\explorer::slowcontextmenuentries | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKCU\software\microsoft\edge\elfbeacon::version | 143.0.3650.80 | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 㹔Ⴡ濷ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 鄿㽸濵ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ⼼쌧猖ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 醦쌩猖ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 湻訝璙ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 榨瑦ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | RegNtPreCreateKey | |
| HKLM\software\activision\call of duty 4::codkey | LJ8D2DUSPJYGUWDW76B1 | RegNtPreCreateKey |
| HKLM\software\wow6432node\activision\call of duty 4::codkey | LJ8D2DUSPJYGUWDW76B1 | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ȴ몾知ǜ | RegNtPreCreateKey |
| HKCU\local settings\muicache\1b\52c64b7e::@c:\windows\system32\ndfapi.dll,-40001 | Windows Network Diagnostics | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 閚탨簪ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 孰쉻総ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ὼ쌖縔ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 腫ퟆ繖ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ꠓퟍ繖ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ᑟ终ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows\currentversion\driversearching::searchorderconfig | RegNtPreCreateKey | |
| HKLM\system\controlset001\control\power\powerthrottling::powerthrottlingoff | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\multimedia\systemprofile::systemresponsiveness | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\multimedia\systemprofile::networkthrottlingindex | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\multimedia\systemprofile::schedulerresolution | RegNtPreCreateKey | |
| HKCU\system\gameconfigstore::gamedvr_enabled | RegNtPreCreateKey | |
| HKCU\system\gameconfigstore::gamedvr_fsebehaviormode | RegNtPreCreateKey | |
| HKCU\system\gameconfigstore::gamedvr_fsebehavior | RegNtPreCreateKey | |
| HKCU\system\gameconfigstore::gamedvr_honoruserfsebehaviormode | RegNtPreCreateKey | |
| HKCU\system\gameconfigstore::gamedvr_escape | RegNtPreCreateKey | |
| HKCU\system\gameconfigstore::gamemodeenabled | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 㛨㙤羃ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 衯츦荺ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 侵覕ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 攰㚄覤ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 쒉탅赠ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 䨚譳趰ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 싹덌詪ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䳷덒詪ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ⚊잇跔ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 謡鿯遏ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 嬓銧ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 㥺﹍逺ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 柼뒬鋶ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ߁綥頬ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 쯍頄ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 扻颳ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 櫸糈鳣ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ৩ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ꇬǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ⳤ欹Ꜣǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 鮺䬽ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 䝘⭤ꪷǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 겿ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 閯곊ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\cryptography\oid\encodingtype 0\cryptdllfindoidinfo\1.3.6.1.4.1.311.60.3.1!7::name | szOID_ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION | RegNtPreCreateKey |
| HKLM\software\microsoft\cryptography\oid\encodingtype 0\cryptdllfindoidinfo\1.3.6.1.4.1.311.60.3.2!7::name | szOID_ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION | RegNtPreCreateKey |
| HKLM\software\microsoft\cryptography\oid\encodingtype 0\cryptdllfindoidinfo\1.3.6.1.4.1.311.60.3.3!7::name | szOID_ROOT_PROGRAM_NO_OCSP_FAILOVER_TO_CRL | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ≑곩ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 辬뎗ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 꺶耜땵ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 狹艃렻ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 皢뤖ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 敚킂뮨ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 䮈ࣼ윢ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 夢㊗죿ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 柤쨾ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | Ẓ켄ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\tracing\mprapi::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\mprapi::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\mprapi::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\mprapi::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\mprapi::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\mprapi::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\mprapi::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 沍솜쾳ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 䑥朹텦ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
201 additional items are not displayed above. |
| Process Shell Execute |
|
| Anti Debug |
|
| User Data Access |
|
| Process Manipulation Evasion |
|
| Process Terminate |
|
| Encryption Used |
|
| Other Suspicious |
|
| Network Winsock2 |
|
| Service Control |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\WINDOWS\system32\cmd" /c "\5AF5.tmp\5AF6.tmp\5AF7.bat c:\users\user\downloads\b9fd774b8390ebd6f0e2c3431248b84108bd9580_0000192512.exe"
|
"C:\WINDOWS\system32\cmd" /c "\3A84.tmp\3A95.tmp\3A96.bat c:\users\user\downloads\0ef7776f6c69b0e7243d6df1e9329acf15fdf5d8_0000124928.exe"
|
C:\WINDOWS\system32\timeout.exe timeout /t 300
|
(NULL) C:\Users\Aunvsbun\AppData\Local\Temp\c9818a0b029fee54cedf74badb99a578bad4ce6a_000028_patch-run.exe c:\users\user\downloads
|
(NULL) c:\users\user\downloads\SH1.exe
|
Show More
open C:\Users\Aunvsbun\AppData\Local\Temp\tidy.bat "C:\Users\Aunvsbun\AppData\Local\Temp\c9818a0b029fee54cedf74badb99a578bad4ce6a_000028_patch-run.exe" "DefaultSearchProvider" "HKEY_LOCAL_MACHINE\SOFTWARE\\" "GRPZWW" "S13SPB2Z_2025-08" "c9818a0b029fee54cedf74badb99a578bad4ce6a_000028_patch-run.exe" "Windows Registry Editor"
|
open C:\WINDOWS\system32\cmd /c "\F9D3.tmp\F9D4.tmp\F9D5.bat C:\Users\user\Downloads\SH1.exe"
|
WriteConsole: '"C:\Users\Aunvs
|
WriteConsole:
|
WriteConsole: c:\users\user\do
|
WriteConsole: duckstation-qt-x
|
WriteConsole: "SH1\Silent Hil
|
WriteConsole: 'duckstation-qt-
|
open C:\WINDOWS\system32\cmd /c "\8665.tmp\8666.tmp\8677.bat c:\users\user\downloads\8fb06cdd9dcd833647839ae420e95276d4c5eb6c_0000425472"
|
WriteConsole: rpcs3.exe
|
WriteConsole: "dev_hdd0\disc\
|
WriteConsole: 'rpcs3.exe' is n
|
"C:\WINDOWS\system32\cmd" /c "\55C2.tmp\55C3.tmp\55D3.bat c:\users\user\downloads\9c38714c0c2e34428d6a1cc6696f713ea5632357_0000386560"
|
"C:\WINDOWS\system32\cmd" /c "\3BAD.tmp\3BBE.tmp\3BBF.bat c:\users\user\downloads\4a164e8dbe73b2da6257d2bf1009df07b80a2f17_0000130048"
|
"C:\WINDOWS\system32\cmd" /c "\44F4.tmp\44F5.tmp\44F6.bat c:\users\user\downloads\236749837977f3175008054826e83e3d8875deac_0000288256"
|
C:\WINDOWS\system32\reg.exe Reg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f
|
C:\WINDOWS\System32\Wbem\WMIC.exe wmic path Win32_UserAccount where name="Wefmtfgw" get sid
|
C:\WINDOWS\system32\chcp.com chcp 65001
|
C:\WINDOWS\system32\timeout.exe timeout /t 1 /nobreak
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell -NoProfile Enable-ComputerRestore -Drive 'C:\'
|
"C:\WINDOWS\system32\cscript" \5787.tmp\5797.tmp\5798.vbs //Nologo
|
"C:\WINDOWS\system32\cmd" /c "\7510.tmp\7521.tmp\7522.bat c:\users\user\downloads\54d3e601f0362f0260dc63ffb0383b4c16acc88a_0000197632"
|
C:\WINDOWS\system32\tasklist.exe tasklist
|
C:\WINDOWS\system32\find.exe find /i "Topaz Photo AI.exe"
|
C:\WINDOWS\system32\reg.exe reg add "HKCU\SOFTWARE\Topaz Labs LLC\Topaz Photo AI" /ve /t "REG_SZ" /d "" /f
|
C:\WINDOWS\system32\reg.exe reg add "HKCU\SOFTWARE\Topaz Labs LLC\Topaz Photo AI" /v "token" /t "REG_SZ" /d "null" /f
|
C:\WINDOWS\system32\reg.exe reg add "HKCU\SOFTWARE\Topaz Labs LLC\Topaz Photo AI" /v "refreshToken" /t "REG_SZ" /d "null" /f
|
"C:\WINDOWS\system32\cmd" /c "\1E8B.tmp\1E8C.tmp\1E8D.bat c:\users\user\downloads\4a384fd363d71913ffcd1ff32d5177bf4cfd01d5_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\F278.tmp\F279.tmp\F289.bat c:\users\user\downloads\7c42c5412b11d3d96210fc00321dadd5cdea4f52_0000207360"
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "ModEnablerGUI.ps1"
|
"C:\WINDOWS\system32\cmd" /c "\3E13.tmp\3E14.tmp\3E15.bat c:\users\user\downloads\1b931bd11f9e199ffa56c51c9b6c07a66ccda9b2_0000498688"
|
C:\WINDOWS\system32\timeout.exe Timeout /t 3 /nobreak
|
"C:\WINDOWS\system32\cmd" /c "\6943.tmp\6944.tmp\6945.bat c:\users\user\downloads\e13d4b1ba84c28d29f02a0e2f3b6dff659c98162_0000164864"
|
C:\WINDOWS\system32\mode.com mode 58,20
|
C:\WINDOWS\system32\PING.EXE ping -n 3 ServerDmi
|
C:\WINDOWS\system32\find.exe find /I /C "maxim"
|
"C:\WINDOWS\system32\cmd" /c "\D638.tmp\D639.tmp\D63A.bat c:\users\user\downloads\68c16c0aeeec62811343f01e4630a3e44bde223b_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\7833.tmp\7834.tmp\7835.bat c:\users\user\downloads\a4c024144ed0426501eff263512dfcee08522e1f_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\2F83.tmp\2F84.tmp\2F85.bat c:\users\user\downloads\ec49c9c764b4480383549531a1cfe6525f8ea195_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\2B2E.tmp\2B2F.tmp\2B30.bat c:\users\user\downloads\252dbf03d926b7136c67bfb3de05eafbe65355d8_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\2EF7.tmp\2EF8.tmp\2EF9.bat c:\users\user\downloads\27b07ccc46b9b4c945571e0a1161884eb020d17c_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\92CC.tmp\92CD.tmp\92CE.bat c:\users\user\downloads\8f7afdfe373bf754270caff338177fbb3f89708c_0000390144"
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch --single-argument https://ww1.goojara.to/
|
"C:\WINDOWS\system32\cmd" /c "\2A60.tmp\2A61.tmp\2A71.bat c:\users\user\downloads\87e696db924e184bc0196d0e41de697fb9775756_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\40FF.tmp\4110.tmp\4111.bat c:\users\user\downloads\6fceb2b243ad2891bdb5f83a4a5265295f7a1a91_0000124928"
|
"C:\WINDOWS\system32\cscript" \6CEB.tmp\6CEC.tmp\6CED.vbs //Nologo
|
open C:\WINDOWS\system32\cmd /c "\529.tmp\52A.tmp\53A.bat c:\users\user\downloads\0b3ed40c3254bdaea0248ccee0e08bee95d87768_0000194560"
|
"C:\WINDOWS\system32\cmd" /c "\243D.tmp\243E.tmp\243F.bat c:\users\user\downloads\1e0cb684e4942ecab68bef187528d3ecb97428c9_0000124928"
|
open C:\WINDOWS\system32\cmd /c "\A67C.tmp\A67D.tmp\A67E.bat c:\users\user\downloads\cc70fd6a175f62c802ae58e29cae0f23161e1419_0000346112"
|
C:\WINDOWS\regedit.exe C:\WINDOWS\Regedit.exe /S "C:\Users\Afbmviii\AppData\Local\Temp\~lvecdkp.tmp"
|
"C:\WINDOWS\system32\cmd" /c "\A61E.tmp\A62F.tmp\A630.bat c:\users\user\downloads\3cd15a87446ecc65f7973927ace1580d6583e76e_0000396800"
|
C:\WINDOWS\system32\timeout.exe timeout /t 5 /nobreak
|
"C:\WINDOWS\system32\cmd" /c "\5CBC.tmp\5CBD.tmp\5CBE.bat c:\users\user\downloads\273421244d56d006027a6f79d9f78e2425b071bf_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\A66C.tmp\A66D.tmp\A66E.bat c:\users\user\downloads\11f5ebd1c47bc933e2e7d367ea10d85493c0dd62_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\A2A3.tmp\A2A4.tmp\A2A5.bat c:\users\user\downloads\920d8083eac7051339505ce511cbc1a0c8a69661_0000124928"
|
open C:\WINDOWS\system32\cmd /c "\A69B.tmp\A69C.tmp\A6AD.bat c:\users\user\downloads\171b5435ddedef67ef01974659487a153bd9d68b_0000070144"
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-Type -AssemblyName PresentationFramework
|
"C:\WINDOWS\system32\cmd" /c "\A5FF.tmp\A60F.tmp\A610.bat c:\users\user\downloads\089f6dd6ccadf11626453eff2a81587a1ebeca43_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\1D18.tmp\1D19.tmp\1D2A.bat c:\users\user\downloads\260b9fbf8856cea37a9d473e4f831330f2870e8b_0000541184"
|
C:\WINDOWS\system32\mode.com mode con: cols=80 lines=25
|
C:\WINDOWS\system32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DriverSearching" /v "SearchOrderConfig" /t REG_DWORD /d 0 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\Power\PowerThrottling" /v "PowerThrottlingOff" /t REG_DWORD /d 1 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v "SystemResponsiveness" /t REG_DWORD /d 0 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v "NetworkThrottlingIndex" /t REG_DWORD /d 4294967295 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v "SchedulerResolution" /t REG_DWORD /d 1 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKCU\System\GameConfigStore" /v "GameDVR_Enabled" /t REG_DWORD /d 0 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKCU\System\GameConfigStore" /v "GameDVR_FSEBehaviorMode" /t REG_DWORD /d 2 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKCU\System\GameConfigStore" /v "GameDVR_FSEBehavior" /t REG_DWORD /d 2 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKCU\System\GameConfigStore" /v "GameDVR_HonorUserFSEBehaviorMode" /t REG_DWORD /d 1 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKCU\System\GameConfigStore" /v "GameDVR_Escape" /t REG_DWORD /d 0 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKCU\System\GameConfigStore" /v "GameModeEnabled" /t REG_DWORD /d 1 /f
|
C:\WINDOWS\system32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Scheduling Category" /t REG_SZ /d "High" /f
|
"C:\WINDOWS\system32\cmd" /c "\A6CA.tmp\A6CB.tmp\A6DB.bat c:\users\user\downloads\dc8dd7f2ae7a4720ce9da482fc1e18e391dc94af_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\BF7C.tmp\BF7D.tmp\BF8E.bat c:\users\user\downloads\4799380b2c8e621561a4de087cf1fcf427246400_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\AAF0.tmp\AAF1.tmp\AAF2.bat c:\users\user\downloads\4b96c15657b4e58f10f0b9370bb5bc46ec6f5f92_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\A320.tmp\A321.tmp\A322.bat c:\users\user\downloads\75ed077c5dee2ed48a8ae0ac3f34245e9a9059a9_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\BA8B.tmp\BA8C.tmp\BA8D.bat c:\users\user\downloads\2c3ee8c54a7dbbad4c4dec51153e894ddc754f26_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\BBD3.tmp\BBD4.tmp\BBD5.bat c:\users\user\downloads\9af23c4b4ce5fbd0424d0dad1e1c5345eee5520b_0000124928"
|
open C:\WINDOWS\system32\cmd /c "\A69B.tmp\A69C.tmp\A69D.bat c:\users\user\downloads\299759b755109af6bec5dd18e3e7f97b77574085_0000157696"
|
WriteConsole: SET
|
WriteConsole: _JAVA_OPTIONS=
|
WriteConsole: PZ_CLASSPATH=is
|
WriteConsole: ".\jre64\bin\jav
|
WriteConsole: -Djava.awt.head
|
WriteConsole: The system canno
|
WriteConsole: PAUSE
|
WriteConsole: Press any key to
|
"C:\WINDOWS\system32\cmd" /c "\BBA4.tmp\BBA5.tmp\BBA6.bat c:\users\user\downloads\62c2466b5a960e98f66c5c012aaddacbe9f6f821_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\BA8B.tmp\BA8C.tmp\BA8D.bat c:\users\user\downloads\17b6f58d83ecaf1584747ec03dab6db8273cbb16_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\BB08.tmp\BB18.tmp\BB19.bat c:\users\user\downloads\e3ff040d59b02724f53aa50720bc19fafd781881_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\A236.tmp\A237.tmp\A238.bat c:\users\user\downloads\46cd563ddbe1194a7ed362279628a41464f36082_0000416768"
|
"C:\WINDOWS\system32\cmd" /c "\A217.tmp\A227.tmp\A228.bat c:\users\user\downloads\4ddefef57c50124713cc427c9f1cc1460185fb3d_0000195072"
|
C:\WINDOWS\system32\mode.com mode con: cols=100 lines=40
|
"C:\WINDOWS\system32\cmd" /c "\A8E1.tmp\A8E2.tmp\A8E3.bat c:\users\user\downloads\a00e37a28d8bec694d871078e43531e9a1915386_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\A255.tmp\A256.tmp\A267.bat c:\users\user\downloads\a571c5d07679ba1d1e041d70f403a3f8b1590b4f_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\A61E.tmp\A61F.tmp\A620.bat c:\users\user\downloads\60197b35de8f237c3d0b56c767ef990bf871c807_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\494E.tmp\494F.tmp\4950.bat c:\users\user\downloads\f5e9fb891a8134ca96f9bc6a6e01a71a96b6279e_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\8F39.tmp\8F4A.tmp\8F4B.bat c:\users\user\downloads\578f62ce90020694653e65b7bf04ed2aff638c2b_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\BB08.tmp\BB09.tmp\BB0A.bat c:\users\user\downloads\c61399e940956263eb34985bd9234aaa66fb843b_0000154112"
|
C:\WINDOWS\system32\cacls.exe "C:\WINDOWS\system32\cacls.exe" "C:\WINDOWS\system32\config\system"
|
C:\WINDOWS\system32\mode.com mode con: cols=120 lines=45
|
"C:\WINDOWS\system32\cmd" /c "\BB37.tmp\BB38.tmp\BB39.bat c:\users\user\downloads\d1e2f4ef271e0245431b9cf7560b1e95126956df_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\3548.tmp\3549.tmp\354A.bat c:\users\user\downloads\cdd0d4f819f6aa837e0db1aa7c68b003917cf30a_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\82EA.tmp\82EB.tmp\82EC.bat c:\users\user\downloads\e1f9a2144f6cc01e0f7bd1c8bc219b54b42873bf_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\1153.tmp\1154.tmp\1165.bat c:\users\user\downloads\50d0db6ebf4e68de69cb1989dd1843c836877907_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\B147.tmp\B148.tmp\B149.bat c:\users\user\downloads\60cdde159dd21cf13eaf11b1520a51c8ff52e74c_0000130560"
|
C:\WINDOWS\system32\certutil.exe certutil -f -delstore root CA131100001
|
C:\WINDOWS\system32\certutil.exe certutil -f -delstore root CA131100002
|
C:\WINDOWS\system32\certutil.exe certutil -f -delstore root GPKIRootCA1
|
"C:\WINDOWS\system32\cmd" /c "\9BA7.tmp\9BA8.tmp\9BA9.bat c:\users\user\downloads\00c1d671b8cb560df3f20323e4a522c0a2cec045_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\98C6.tmp\98D7.tmp\98E7.bat c:\users\user\downloads\40598e2e9adbb2bd0c705d8d419d93cd0f64bef3_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\BABA.tmp\BABB.tmp\BABC.bat c:\users\user\downloads\0a964f506babcce5341b1ed2b36e3db1fdda6712_0000193024"
|
C:\Users\Nudhknac\AppData\Local\Microsoft\WindowsApps\python.exe python sun_times.py
|
"C:\WINDOWS\system32\cmd" /c "\E2C0.tmp\E2C1.tmp\E2C2.bat c:\users\user\downloads\dff1783daa3bf8c304cd055b53171aa2ad9572b3_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\BAC9.tmp\BACA.tmp\BACB.bat c:\users\user\downloads\7a18440b22befae7db600233825a0cf7b6044076_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\AD41.tmp\AD51.tmp\AD52.bat c:\users\user\downloads\4062dc9618704c8e5ef26418acffa1175bb3260e_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\4BFA.tmp\4BFB.tmp\4BFC.bat c:\users\user\downloads\766d563bf38d9d46b1de128d20abcfb82e6060d0_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\BAC9.tmp\BACA.tmp\BACB.bat c:\users\user\downloads\2bd7f0f9d85e7134cde5ca99dbb0bd9b4c417b3e_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\A320.tmp\A331.tmp\A332.bat c:\users\user\downloads\1bcf2cf2e28f676f6c4685592e08a24a68e237c0_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\BCF5.tmp\BCF6.tmp\BCF7.bat c:\users\user\downloads\2625286fc117d1d65421634f571712275fa4a286_0000135096"
|
C:\WINDOWS\system32\netsh.exe netsh interface ipv6 uninstall
|
C:\WINDOWS\system32\netsh.exe netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=no
|
"C:\WINDOWS\system32\cmd" /c "\BD34.tmp\BD35.tmp\BD36.bat c:\users\user\downloads\227355f3eacf09d1e228d227ba26946b4a33b129_0000124928"
|
"C:\WINDOWS\system32\cmd" /c "\792A.tmp\792B.tmp\792C.bat c:\users\user\downloads\6eb9d51cafc5c5e9e57e06d130a01b695c784552_0000124928"
|