Analysis
-
max time kernel
165s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 06:05
Static task
static1
Behavioral task
behavioral1
Sample
f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe
Resource
win10v2004-20220414-en
General
-
Target
f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe
-
Size
325KB
-
MD5
05036519b910018bab5cbafadb034684
-
SHA1
779b7f6d3a0c836df19fdfe0c621fbee384b0548
-
SHA256
f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
-
SHA512
96e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
Malware Config
Extracted
asyncrat
0.5.2
31.17.132.37:8808
pksru.ddns.net:8808
hfgbhiguiruh4rxdsfsdfsdfsd
-
delay
0
-
install
true
-
install_file
Nackbilder.png.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4212-137-0x0000000000400000-0x0000000000442000-memory.dmp asyncrat -
Executes dropped EXE 49 IoCs
Processes:
MServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exepid process 5076 MServices.exe 4212 MServices.exe 2136 Nackbilder.png.exe 2596 MServices.exe 5088 MServices.exe 4892 MServices.exe 832 Nackbilder.png.exe 1672 MServices.exe 908 MServices.exe 2564 Nackbilder.png.exe 4952 MServices.exe 4868 MServices.exe 1476 MServices.exe 4532 Nackbilder.png.exe 2516 MServices.exe 4940 MServices.exe 4320 Nackbilder.png.exe 4772 MServices.exe 4560 MServices.exe 4360 Nackbilder.png.exe 452 MServices.exe 2068 MServices.exe 2092 MServices.exe 4280 Nackbilder.png.exe 3276 MServices.exe 3136 MServices.exe 3520 MServices.exe 2372 Nackbilder.png.exe 1316 MServices.exe 3924 MServices.exe 4704 MServices.exe 880 MServices.exe 2484 MServices.exe 3644 Nackbilder.png.exe 3316 MServices.exe 1872 MServices.exe 2692 Nackbilder.png.exe 3648 MServices.exe 4124 MServices.exe 4104 Nackbilder.png.exe 4452 MServices.exe 3904 MServices.exe 3312 MServices.exe 1316 Nackbilder.png.exe 4892 MServices.exe 3720 MServices.exe 4108 Nackbilder.png.exe 3644 MServices.exe 2352 MServices.exe -
Checks computer location settings 2 TTPs 39 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Nackbilder.png.exeWScript.exef77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exeNackbilder.png.exeMServices.exeWScript.exeMServices.exeWScript.exeNackbilder.png.exeMServices.exeWScript.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeMServices.exeMServices.exeWScript.exeNackbilder.png.exeWScript.exeMServices.exeNackbilder.png.exeWScript.exeWScript.exeMServices.exeNackbilder.png.exeMServices.exeNackbilder.png.exeWScript.exeWScript.exeNackbilder.png.exeNackbilder.png.exeNackbilder.png.exeNackbilder.png.exeMServices.exeMServices.exeWScript.exeNackbilder.png.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Nackbilder.png.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 14 IoCs
Processes:
Nackbilder.png.exeNackbilder.png.exeNackbilder.png.exeNackbilder.png.exeNackbilder.png.exeNackbilder.png.exeNackbilder.png.exeNackbilder.png.exef77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exeNackbilder.png.exeNackbilder.png.exeNackbilder.png.exeNackbilder.png.exeNackbilder.png.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MServices.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MServices.exe" Nackbilder.png.exe -
Suspicious use of SetThreadContext 14 IoCs
Processes:
MServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exedescription pid process target process PID 5076 set thread context of 4212 5076 MServices.exe MServices.exe PID 2596 set thread context of 4892 2596 MServices.exe MServices.exe PID 1672 set thread context of 908 1672 MServices.exe MServices.exe PID 4952 set thread context of 1476 4952 MServices.exe MServices.exe PID 2516 set thread context of 4940 2516 MServices.exe MServices.exe PID 4772 set thread context of 4560 4772 MServices.exe MServices.exe PID 452 set thread context of 2092 452 MServices.exe MServices.exe PID 3276 set thread context of 3520 3276 MServices.exe MServices.exe PID 1316 set thread context of 2484 1316 MServices.exe MServices.exe PID 3316 set thread context of 1872 3316 MServices.exe MServices.exe PID 3648 set thread context of 4124 3648 MServices.exe MServices.exe PID 4452 set thread context of 3312 4452 MServices.exe MServices.exe PID 4892 set thread context of 3720 4892 MServices.exe MServices.exe PID 3644 set thread context of 2352 3644 MServices.exe MServices.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 26 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MServices.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MServices.exe -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4208 schtasks.exe 3288 schtasks.exe 1288 schtasks.exe 1264 schtasks.exe 4184 schtasks.exe 3364 schtasks.exe 2040 schtasks.exe 4628 schtasks.exe 2372 schtasks.exe 4464 schtasks.exe 3484 schtasks.exe 5044 schtasks.exe -
Modifies registry class 13 IoCs
Processes:
MServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exeMServices.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings MServices.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MServices.exeMServices.exeMServices.exepid process 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 4212 MServices.exe 2596 MServices.exe 2596 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe 4892 MServices.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exeMServices.exeNackbilder.png.exeMServices.exedescription pid process Token: SeDebugPrivilege 3124 f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe Token: SeDebugPrivilege 5076 MServices.exe Token: SeDebugPrivilege 4212 MServices.exe Token: SeDebugPrivilege 2136 Nackbilder.png.exe Token: SeDebugPrivilege 2596 MServices.exe Token: SeDebugPrivilege 4892 MServices.exe Token: SeDebugPrivilege 832 Nackbilder.png.exe Token: SeDebugPrivilege 1672 MServices.exe Token: SeDebugPrivilege 908 MServices.exe Token: SeDebugPrivilege 2564 Nackbilder.png.exe Token: SeDebugPrivilege 4952 MServices.exe Token: SeDebugPrivilege 1476 MServices.exe Token: SeDebugPrivilege 4532 Nackbilder.png.exe Token: SeDebugPrivilege 2516 MServices.exe Token: SeDebugPrivilege 4940 MServices.exe Token: SeDebugPrivilege 4320 Nackbilder.png.exe Token: SeDebugPrivilege 4772 MServices.exe Token: SeDebugPrivilege 4560 MServices.exe Token: SeDebugPrivilege 4360 Nackbilder.png.exe Token: SeDebugPrivilege 452 MServices.exe Token: SeDebugPrivilege 2092 MServices.exe Token: SeDebugPrivilege 4280 Nackbilder.png.exe Token: SeDebugPrivilege 3276 MServices.exe Token: SeDebugPrivilege 3520 MServices.exe Token: SeDebugPrivilege 2372 Nackbilder.png.exe Token: SeDebugPrivilege 1316 MServices.exe Token: SeDebugPrivilege 2484 MServices.exe Token: SeDebugPrivilege 3644 Nackbilder.png.exe Token: SeDebugPrivilege 3316 MServices.exe Token: SeDebugPrivilege 1872 MServices.exe Token: SeDebugPrivilege 2692 Nackbilder.png.exe Token: SeDebugPrivilege 3648 MServices.exe Token: SeDebugPrivilege 4124 MServices.exe Token: SeDebugPrivilege 4104 Nackbilder.png.exe Token: SeDebugPrivilege 4452 MServices.exe Token: SeDebugPrivilege 3312 MServices.exe Token: SeDebugPrivilege 1316 Nackbilder.png.exe Token: SeDebugPrivilege 4892 MServices.exe Token: SeDebugPrivilege 3720 MServices.exe Token: SeDebugPrivilege 4108 Nackbilder.png.exe Token: SeDebugPrivilege 3644 MServices.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exeMServices.exeMServices.exeWScript.exeNackbilder.png.exeMServices.exeMServices.exeWScript.exeNackbilder.png.exeMServices.exeMServices.exeWScript.exeNackbilder.png.exedescription pid process target process PID 3124 wrote to memory of 5076 3124 f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe MServices.exe PID 3124 wrote to memory of 5076 3124 f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe MServices.exe PID 3124 wrote to memory of 5076 3124 f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe MServices.exe PID 5076 wrote to memory of 4212 5076 MServices.exe MServices.exe PID 5076 wrote to memory of 4212 5076 MServices.exe MServices.exe PID 5076 wrote to memory of 4212 5076 MServices.exe MServices.exe PID 5076 wrote to memory of 4212 5076 MServices.exe MServices.exe PID 5076 wrote to memory of 4212 5076 MServices.exe MServices.exe PID 5076 wrote to memory of 4212 5076 MServices.exe MServices.exe PID 5076 wrote to memory of 4212 5076 MServices.exe MServices.exe PID 5076 wrote to memory of 4212 5076 MServices.exe MServices.exe PID 4212 wrote to memory of 4940 4212 MServices.exe WScript.exe PID 4212 wrote to memory of 4940 4212 MServices.exe WScript.exe PID 4212 wrote to memory of 4940 4212 MServices.exe WScript.exe PID 4940 wrote to memory of 1264 4940 WScript.exe schtasks.exe PID 4940 wrote to memory of 1264 4940 WScript.exe schtasks.exe PID 4940 wrote to memory of 1264 4940 WScript.exe schtasks.exe PID 4212 wrote to memory of 2136 4212 MServices.exe Nackbilder.png.exe PID 4212 wrote to memory of 2136 4212 MServices.exe Nackbilder.png.exe PID 4212 wrote to memory of 2136 4212 MServices.exe Nackbilder.png.exe PID 2136 wrote to memory of 2596 2136 Nackbilder.png.exe MServices.exe PID 2136 wrote to memory of 2596 2136 Nackbilder.png.exe MServices.exe PID 2136 wrote to memory of 2596 2136 Nackbilder.png.exe MServices.exe PID 2596 wrote to memory of 5088 2596 MServices.exe MServices.exe PID 2596 wrote to memory of 5088 2596 MServices.exe MServices.exe PID 2596 wrote to memory of 5088 2596 MServices.exe MServices.exe PID 2596 wrote to memory of 4892 2596 MServices.exe MServices.exe PID 2596 wrote to memory of 4892 2596 MServices.exe MServices.exe PID 2596 wrote to memory of 4892 2596 MServices.exe MServices.exe PID 2596 wrote to memory of 4892 2596 MServices.exe MServices.exe PID 2596 wrote to memory of 4892 2596 MServices.exe MServices.exe PID 2596 wrote to memory of 4892 2596 MServices.exe MServices.exe PID 2596 wrote to memory of 4892 2596 MServices.exe MServices.exe PID 2596 wrote to memory of 4892 2596 MServices.exe MServices.exe PID 4892 wrote to memory of 3180 4892 MServices.exe WScript.exe PID 4892 wrote to memory of 3180 4892 MServices.exe WScript.exe PID 4892 wrote to memory of 3180 4892 MServices.exe WScript.exe PID 3180 wrote to memory of 3484 3180 WScript.exe schtasks.exe PID 3180 wrote to memory of 3484 3180 WScript.exe schtasks.exe PID 3180 wrote to memory of 3484 3180 WScript.exe schtasks.exe PID 4892 wrote to memory of 832 4892 MServices.exe Nackbilder.png.exe PID 4892 wrote to memory of 832 4892 MServices.exe Nackbilder.png.exe PID 4892 wrote to memory of 832 4892 MServices.exe Nackbilder.png.exe PID 832 wrote to memory of 1672 832 Nackbilder.png.exe MServices.exe PID 832 wrote to memory of 1672 832 Nackbilder.png.exe MServices.exe PID 832 wrote to memory of 1672 832 Nackbilder.png.exe MServices.exe PID 1672 wrote to memory of 908 1672 MServices.exe MServices.exe PID 1672 wrote to memory of 908 1672 MServices.exe MServices.exe PID 1672 wrote to memory of 908 1672 MServices.exe MServices.exe PID 1672 wrote to memory of 908 1672 MServices.exe MServices.exe PID 1672 wrote to memory of 908 1672 MServices.exe MServices.exe PID 1672 wrote to memory of 908 1672 MServices.exe MServices.exe PID 1672 wrote to memory of 908 1672 MServices.exe MServices.exe PID 1672 wrote to memory of 908 1672 MServices.exe MServices.exe PID 908 wrote to memory of 3128 908 MServices.exe WScript.exe PID 908 wrote to memory of 3128 908 MServices.exe WScript.exe PID 908 wrote to memory of 3128 908 MServices.exe WScript.exe PID 3128 wrote to memory of 4184 3128 WScript.exe schtasks.exe PID 3128 wrote to memory of 4184 3128 WScript.exe schtasks.exe PID 3128 wrote to memory of 4184 3128 WScript.exe schtasks.exe PID 908 wrote to memory of 2564 908 MServices.exe Nackbilder.png.exe PID 908 wrote to memory of 2564 908 MServices.exe Nackbilder.png.exe PID 908 wrote to memory of 2564 908 MServices.exe Nackbilder.png.exe PID 2564 wrote to memory of 4952 2564 Nackbilder.png.exe MServices.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe"C:\Users\Admin\AppData\Local\Temp\f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmpCE61.tmp.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmpEE9B.tmp.vbs"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp31AF.tmp.vbs"10⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe11⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"10⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"12⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"12⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp4E2F.tmp.vbs"13⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe14⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"13⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"15⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp6C95.tmp.vbs"16⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe17⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"16⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"18⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp96C2.tmp.vbs"19⤵
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"19⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"21⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"21⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmpF2EB.tmp.vbs"22⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe23⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"22⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"24⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"24⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp124B.tmp.vbs"25⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe26⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"25⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"27⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"27⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"27⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"27⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp32D3.tmp.vbs"28⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe29⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"28⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"30⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp5EE4.tmp.vbs"31⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe32⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"31⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"33⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp94F8.tmp.vbs"34⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe35⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"34⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"36⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"36⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmpBA43.tmp.vbs"37⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe38⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"37⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"38⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"39⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmpD84A.tmp.vbs"40⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn Nackbilder.png.exe /tr "C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe41⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"C:\Users\Admin\AppData\Roaming\Nackbilder.png.exe"40⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MServices.exe"C:\Users\Admin\AppData\Local\Temp\MServices.exe"42⤵
- Executes dropped EXE
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MServices.exe.logFilesize
617B
MD599e770c0d4043aa84ef3d3cbc7723c25
SHA119829c5c413fccba750a3357f938dfa94486acad
SHA25633c7dd4c852dae6462c701337f8e0a8647602847ccaee656fa6f1149cccfb5d5
SHA512ba521e2f57d7e1db19445201948caa7af6d953e1c1340228934888f8ec05b8984ad492122d0bf0550b5e679614d8a713ecf68f91916ffa6e5d8f75bf003aae39
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Nackbilder.png.exe.logFilesize
522B
MD58334a471a4b492ece225b471b8ad2fc8
SHA11cb24640f32d23e8f7800bd0511b7b9c3011d992
SHA2565612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169
SHA51256ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\MServices.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Local\Temp\tmp124B.tmp.vbsFilesize
230B
MD5df9fa03ba81cae64e8c1089d1813d1dd
SHA1fb65c5c9d0cd837ff639d3f4ba52470b911a594f
SHA25662b6b57662da1f31087ce0544c7310bdeeb45e5262541a4866298b02ca4f787b
SHA51299bb99f1e1fa0ef5707d114423cd4754d27a848a1f66c0765b50da1a635b61176de2f8be923b8a20caa825961dde257932cbf34f7eadddff4ef6c2be06d9f6d3
-
C:\Users\Admin\AppData\Local\Temp\tmp31AF.tmp.vbsFilesize
230B
MD5df9fa03ba81cae64e8c1089d1813d1dd
SHA1fb65c5c9d0cd837ff639d3f4ba52470b911a594f
SHA25662b6b57662da1f31087ce0544c7310bdeeb45e5262541a4866298b02ca4f787b
SHA51299bb99f1e1fa0ef5707d114423cd4754d27a848a1f66c0765b50da1a635b61176de2f8be923b8a20caa825961dde257932cbf34f7eadddff4ef6c2be06d9f6d3
-
C:\Users\Admin\AppData\Local\Temp\tmp4E2F.tmp.vbsFilesize
230B
MD5df9fa03ba81cae64e8c1089d1813d1dd
SHA1fb65c5c9d0cd837ff639d3f4ba52470b911a594f
SHA25662b6b57662da1f31087ce0544c7310bdeeb45e5262541a4866298b02ca4f787b
SHA51299bb99f1e1fa0ef5707d114423cd4754d27a848a1f66c0765b50da1a635b61176de2f8be923b8a20caa825961dde257932cbf34f7eadddff4ef6c2be06d9f6d3
-
C:\Users\Admin\AppData\Local\Temp\tmp6C95.tmp.vbsFilesize
230B
MD5df9fa03ba81cae64e8c1089d1813d1dd
SHA1fb65c5c9d0cd837ff639d3f4ba52470b911a594f
SHA25662b6b57662da1f31087ce0544c7310bdeeb45e5262541a4866298b02ca4f787b
SHA51299bb99f1e1fa0ef5707d114423cd4754d27a848a1f66c0765b50da1a635b61176de2f8be923b8a20caa825961dde257932cbf34f7eadddff4ef6c2be06d9f6d3
-
C:\Users\Admin\AppData\Local\Temp\tmpCE61.tmp.vbsFilesize
230B
MD5df9fa03ba81cae64e8c1089d1813d1dd
SHA1fb65c5c9d0cd837ff639d3f4ba52470b911a594f
SHA25662b6b57662da1f31087ce0544c7310bdeeb45e5262541a4866298b02ca4f787b
SHA51299bb99f1e1fa0ef5707d114423cd4754d27a848a1f66c0765b50da1a635b61176de2f8be923b8a20caa825961dde257932cbf34f7eadddff4ef6c2be06d9f6d3
-
C:\Users\Admin\AppData\Local\Temp\tmpEE9B.tmp.vbsFilesize
230B
MD5df9fa03ba81cae64e8c1089d1813d1dd
SHA1fb65c5c9d0cd837ff639d3f4ba52470b911a594f
SHA25662b6b57662da1f31087ce0544c7310bdeeb45e5262541a4866298b02ca4f787b
SHA51299bb99f1e1fa0ef5707d114423cd4754d27a848a1f66c0765b50da1a635b61176de2f8be923b8a20caa825961dde257932cbf34f7eadddff4ef6c2be06d9f6d3
-
C:\Users\Admin\AppData\Local\Temp\tmpF2EB.tmp.vbsFilesize
230B
MD5df9fa03ba81cae64e8c1089d1813d1dd
SHA1fb65c5c9d0cd837ff639d3f4ba52470b911a594f
SHA25662b6b57662da1f31087ce0544c7310bdeeb45e5262541a4866298b02ca4f787b
SHA51299bb99f1e1fa0ef5707d114423cd4754d27a848a1f66c0765b50da1a635b61176de2f8be923b8a20caa825961dde257932cbf34f7eadddff4ef6c2be06d9f6d3
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
C:\Users\Admin\AppData\Roaming\Nackbilder.png.exeFilesize
325KB
MD505036519b910018bab5cbafadb034684
SHA1779b7f6d3a0c836df19fdfe0c621fbee384b0548
SHA256f77b608a4c97894c9872e5a87182073f2f4bda255e2af6eb0304e0834b0c31bd
SHA51296e1a5f54ef4c135722015441564baa8c06da76bb34e69acd686f0805db52755449959b90ffe595ccd2553fd5bd4953f6276de986e5abace37d7954573b5ef8a
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/452-211-0x0000000000000000-mapping.dmp
-
memory/704-257-0x0000000000000000-mapping.dmp
-
memory/832-158-0x0000000000000000-mapping.dmp
-
memory/880-246-0x0000000000000000-mapping.dmp
-
memory/908-165-0x0000000000000000-mapping.dmp
-
memory/1180-219-0x0000000000000000-mapping.dmp
-
memory/1264-143-0x0000000000000000-mapping.dmp
-
memory/1288-258-0x0000000000000000-mapping.dmp
-
memory/1316-239-0x0000000000000000-mapping.dmp
-
memory/1476-180-0x0000000000000000-mapping.dmp
-
memory/1672-162-0x0000000000000000-mapping.dmp
-
memory/1872-255-0x0000000000000000-mapping.dmp
-
memory/1920-233-0x0000000000000000-mapping.dmp
-
memory/2040-252-0x0000000000000000-mapping.dmp
-
memory/2068-214-0x0000000000000000-mapping.dmp
-
memory/2092-216-0x0000000000000000-mapping.dmp
-
memory/2136-144-0x0000000000000000-mapping.dmp
-
memory/2372-236-0x0000000000000000-mapping.dmp
-
memory/2484-248-0x0000000000000000-mapping.dmp
-
memory/2516-189-0x0000000000000000-mapping.dmp
-
memory/2548-183-0x0000000000000000-mapping.dmp
-
memory/2564-172-0x0000000000000000-mapping.dmp
-
memory/2596-147-0x0000000000000000-mapping.dmp
-
memory/2692-259-0x0000000000000000-mapping.dmp
-
memory/3020-251-0x0000000000000000-mapping.dmp
-
memory/3124-131-0x00000000055F0000-0x000000000568C000-memory.dmpFilesize
624KB
-
memory/3124-130-0x0000000000BC0000-0x0000000000C18000-memory.dmpFilesize
352KB
-
memory/3128-169-0x0000000000000000-mapping.dmp
-
memory/3136-228-0x0000000000000000-mapping.dmp
-
memory/3180-155-0x0000000000000000-mapping.dmp
-
memory/3276-225-0x0000000000000000-mapping.dmp
-
memory/3288-235-0x0000000000000000-mapping.dmp
-
memory/3312-268-0x0000000000000000-mapping.dmp
-
memory/3316-254-0x0000000000000000-mapping.dmp
-
memory/3364-221-0x0000000000000000-mapping.dmp
-
memory/3484-157-0x0000000000000000-mapping.dmp
-
memory/3520-230-0x0000000000000000-mapping.dmp
-
memory/3644-253-0x0000000000000000-mapping.dmp
-
memory/3648-260-0x0000000000000000-mapping.dmp
-
memory/3904-267-0x0000000000000000-mapping.dmp
-
memory/3924-242-0x0000000000000000-mapping.dmp
-
memory/4104-265-0x0000000000000000-mapping.dmp
-
memory/4124-261-0x0000000000000000-mapping.dmp
-
memory/4184-171-0x0000000000000000-mapping.dmp
-
memory/4208-197-0x0000000000000000-mapping.dmp
-
memory/4212-136-0x0000000000000000-mapping.dmp
-
memory/4212-140-0x0000000005A60000-0x0000000005AC6000-memory.dmpFilesize
408KB
-
memory/4212-137-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/4216-195-0x0000000000000000-mapping.dmp
-
memory/4280-222-0x0000000000000000-mapping.dmp
-
memory/4320-198-0x0000000000000000-mapping.dmp
-
memory/4360-208-0x0000000000000000-mapping.dmp
-
memory/4452-266-0x0000000000000000-mapping.dmp
-
memory/4532-186-0x0000000000000000-mapping.dmp
-
memory/4560-204-0x0000000000000000-mapping.dmp
-
memory/4592-263-0x0000000000000000-mapping.dmp
-
memory/4628-264-0x0000000000000000-mapping.dmp
-
memory/4704-244-0x0000000000000000-mapping.dmp
-
memory/4772-201-0x0000000000000000-mapping.dmp
-
memory/4868-178-0x0000000000000000-mapping.dmp
-
memory/4892-152-0x0000000000000000-mapping.dmp
-
memory/4912-207-0x0000000000000000-mapping.dmp
-
memory/4940-141-0x0000000000000000-mapping.dmp
-
memory/4940-192-0x0000000000000000-mapping.dmp
-
memory/4952-175-0x0000000000000000-mapping.dmp
-
memory/5044-185-0x0000000000000000-mapping.dmp
-
memory/5076-132-0x0000000000000000-mapping.dmp
-
memory/5076-135-0x0000000005B20000-0x00000000060C4000-memory.dmpFilesize
5.6MB
-
memory/5088-150-0x0000000000000000-mapping.dmp