Resubmissions

11/10/2022, 17:08

221011-vnmsrafbdn 6

10/10/2022, 15:31

221010-syaj3acdb3 10

09/10/2022, 15:59

221009-tfb6lshbg4 10

09/10/2022, 15:28

221009-swtvxshceq 10

09/10/2022, 13:04

221009-qa2brshab7 10

09/10/2022, 13:03

221009-qaj3gshab6 1

09/10/2022, 12:59

221009-p8jnyahaa6 10

09/10/2022, 12:54

221009-p5m7yshbdm 10

08/10/2022, 21:32

221008-1dxg4afgb8 10

08/10/2022, 13:52

221008-q6p9daegh5 1

Analysis

  • max time kernel
    226s
  • max time network
    225s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2022, 12:54

General

  • Target

    fucker script.exe

  • Size

    104KB

  • MD5

    db0655efbe0dbdef1df06207f5cb5b5b

  • SHA1

    a8d48d5c0042ce359178d018c0873e8a7c2f27e8

  • SHA256

    52972a23ab12b95cd51d71741db2cf276749e56030c092e2e4f0907dcb1fbd56

  • SHA512

    5adc8463c3e148a66f8afdeefc31f2b3ffeb12b7641584d1d24306b0898da60a8b9b948bb4f9b7d693185f2daa9bd9437b3b84cebc0eabfa84dfcef6938e1704

  • SSDEEP

    1536:m5iT3FccnYWkyjWpOku3yUyJCbyVAvy7+fRo:3LOcxkyjW3wvHq

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fucker script.exe
    "C:\Users\Admin\AppData\Local\Temp\fucker script.exe"
    1⤵
      PID:1424
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:616
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:616 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:768
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:6620
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:616 CREDAT:406532 /prefetch:2
          2⤵
            PID:5048
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:616 CREDAT:3290117 /prefetch:2
            2⤵
              PID:4268
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:616 CREDAT:5846023 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              PID:4528
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:616 CREDAT:3748922 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              PID:6360
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            1⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:904
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:340993 /prefetch:2
              2⤵
              • Suspicious use of SetWindowsHookEx
              PID:996
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:340997 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3088
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:209934 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3304
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:603148 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3860
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:2110476 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:4516
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:2372662 /prefetch:2
              2⤵
                PID:4936
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:2044946 /prefetch:2
                2⤵
                  PID:4968
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:904 CREDAT:3945508 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  PID:6856
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:996382 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  PID:6828
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:904 CREDAT:1782851 /prefetch:2
                  2⤵
                    PID:8088
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:668775 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    PID:4964
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:904 CREDAT:1979498 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    PID:5880
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:904 CREDAT:734297 /prefetch:2
                    2⤵
                      PID:8564
                    • C:\Program Files\Internet Explorer\iexplore.exe
                      "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:904 CREDAT:2307220 /prefetch:2
                      2⤵
                      • Modifies Internet Explorer settings
                      PID:8732
                  • C:\Windows\explorer.exe
                    "C:\Windows\explorer.exe"
                    1⤵
                      PID:1968
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe"
                      1⤵
                      • Enumerates system info in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:1644
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef65c4f50,0x7fef65c4f60,0x7fef65c4f70
                        2⤵
                          PID:1016
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1064,6842109121864534988,5093943769242215518,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1076 /prefetch:2
                          2⤵
                            PID:812
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1064,6842109121864534988,5093943769242215518,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1400 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1384
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1064,6842109121864534988,5093943769242215518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1812 /prefetch:8
                            2⤵
                              PID:1764
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,6842109121864534988,5093943769242215518,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2044 /prefetch:1
                              2⤵
                                PID:2260
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,6842109121864534988,5093943769242215518,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:1
                                2⤵
                                  PID:2272
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1064,6842109121864534988,5093943769242215518,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2420 /prefetch:2
                                  2⤵
                                    PID:2960
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1064,6842109121864534988,5093943769242215518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3048 /prefetch:8
                                    2⤵
                                      PID:3408
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1064,6842109121864534988,5093943769242215518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2428 /prefetch:8
                                      2⤵
                                        PID:6476
                                    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:1
                                      1⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:1084
                                      • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
                                        "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:1
                                        2⤵
                                          PID:800
                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1752
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:2
                                          2⤵
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2180
                                      • C:\Windows\system32\calc.exe
                                        "C:\Windows\system32\calc.exe"
                                        1⤵
                                          PID:924
                                        • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                          "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                          1⤵
                                            PID:860
                                          • C:\Windows\explorer.exe
                                            "C:\Windows\explorer.exe"
                                            1⤵
                                              PID:1704
                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                              1⤵
                                              • Suspicious behavior: AddClipboardFormatListener
                                              • Suspicious behavior: GetForegroundWindowSpam
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1724
                                            • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                              "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                              1⤵
                                                PID:556
                                              • C:\Windows\system32\calc.exe
                                                "C:\Windows\system32\calc.exe"
                                                1⤵
                                                  PID:1460
                                                • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                  "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                  1⤵
                                                  • Accesses Microsoft Outlook profiles
                                                  • Drops file in System32 directory
                                                  • Drops file in Windows directory
                                                  • Modifies Internet Explorer settings
                                                  • Suspicious behavior: AddClipboardFormatListener
                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                  • Suspicious use of SetWindowsHookEx
                                                  • outlook_win_path
                                                  PID:1256
                                                • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                  "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                  1⤵
                                                  • Suspicious behavior: AddClipboardFormatListener
                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2840
                                                • C:\Windows\system32\calc.exe
                                                  "C:\Windows\system32\calc.exe"
                                                  1⤵
                                                    PID:3016
                                                  • C:\Windows\system32\calc.exe
                                                    "C:\Windows\system32\calc.exe"
                                                    1⤵
                                                      PID:3056
                                                    • C:\Windows\system32\calc.exe
                                                      "C:\Windows\system32\calc.exe"
                                                      1⤵
                                                        PID:2176
                                                      • C:\Windows\system32\calc.exe
                                                        "C:\Windows\system32\calc.exe"
                                                        1⤵
                                                          PID:1576
                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                          1⤵
                                                          • Suspicious behavior: AddClipboardFormatListener
                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2592
                                                        • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                          "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                          1⤵
                                                            PID:2608
                                                          • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                            "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                            1⤵
                                                              PID:2836
                                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                              1⤵
                                                              • Suspicious behavior: AddClipboardFormatListener
                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SendNotifyMessage
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2980
                                                            • C:\Windows\system32\calc.exe
                                                              "C:\Windows\system32\calc.exe"
                                                              1⤵
                                                                PID:2588
                                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                1⤵
                                                                  PID:2420
                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                  1⤵
                                                                    PID:3148
                                                                  • C:\Windows\explorer.exe
                                                                    "C:\Windows\explorer.exe"
                                                                    1⤵
                                                                      PID:3240
                                                                    • C:\Windows\system32\calc.exe
                                                                      "C:\Windows\system32\calc.exe"
                                                                      1⤵
                                                                        PID:3412
                                                                      • C:\Windows\system32\calc.exe
                                                                        "C:\Windows\system32\calc.exe"
                                                                        1⤵
                                                                          PID:3460
                                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                          1⤵
                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                          • Suspicious use of SendNotifyMessage
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:3452
                                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                          1⤵
                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                          • Suspicious use of SendNotifyMessage
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:3476
                                                                        • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                          "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                          1⤵
                                                                            PID:3520
                                                                          • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                            "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                            1⤵
                                                                              PID:3608
                                                                            • C:\Windows\system32\calc.exe
                                                                              "C:\Windows\system32\calc.exe"
                                                                              1⤵
                                                                                PID:3616
                                                                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                1⤵
                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                • Suspicious use of SendNotifyMessage
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:3648
                                                                              • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                1⤵
                                                                                  PID:3660
                                                                                • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                  "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                  1⤵
                                                                                  • Suspicious behavior: AddClipboardFormatListener
                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                  • Suspicious use of SendNotifyMessage
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:3740
                                                                                • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                  "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                  1⤵
                                                                                    PID:3828
                                                                                  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                    "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                    1⤵
                                                                                      PID:3840
                                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                      1⤵
                                                                                        PID:3868
                                                                                      • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                        "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                        1⤵
                                                                                          PID:3876
                                                                                        • C:\Windows\explorer.exe
                                                                                          "C:\Windows\explorer.exe"
                                                                                          1⤵
                                                                                            PID:3984
                                                                                          • C:\Windows\System32\rundll32.exe
                                                                                            "C:\Windows\System32\rundll32.exe" C:\Windows\system32\shell32.dll,Options_RunDLL 1
                                                                                            1⤵
                                                                                              PID:4080
                                                                                            • C:\Windows\system32\calc.exe
                                                                                              "C:\Windows\system32\calc.exe"
                                                                                              1⤵
                                                                                                PID:3192
                                                                                              • C:\Windows\system32\calc.exe
                                                                                                "C:\Windows\system32\calc.exe"
                                                                                                1⤵
                                                                                                  PID:2880
                                                                                                • C:\Windows\helppane.exe
                                                                                                  C:\Windows\helppane.exe -Embedding
                                                                                                  1⤵
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:2860
                                                                                                • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                  "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                  1⤵
                                                                                                  • Suspicious behavior: AddClipboardFormatListener
                                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:3264
                                                                                                • C:\Windows\System32\rundll32.exe
                                                                                                  "C:\Windows\System32\rundll32.exe" C:\Windows\system32\shell32.dll,Options_RunDLL 1
                                                                                                  1⤵
                                                                                                    PID:3408
                                                                                                  • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                    "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                    1⤵
                                                                                                    • Suspicious behavior: AddClipboardFormatListener
                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:3440
                                                                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                    1⤵
                                                                                                      PID:3656
                                                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                      1⤵
                                                                                                        PID:4004
                                                                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                        1⤵
                                                                                                          PID:3992
                                                                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                          1⤵
                                                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:3168
                                                                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                          1⤵
                                                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:4104
                                                                                                        • C:\Windows\system32\calc.exe
                                                                                                          "C:\Windows\system32\calc.exe"
                                                                                                          1⤵
                                                                                                            PID:4220
                                                                                                          • C:\Windows\system32\calc.exe
                                                                                                            "C:\Windows\system32\calc.exe"
                                                                                                            1⤵
                                                                                                              PID:4268
                                                                                                            • C:\Windows\system32\calc.exe
                                                                                                              "C:\Windows\system32\calc.exe"
                                                                                                              1⤵
                                                                                                                PID:4320
                                                                                                              • C:\Windows\system32\calc.exe
                                                                                                                "C:\Windows\system32\calc.exe"
                                                                                                                1⤵
                                                                                                                  PID:4344
                                                                                                                • C:\Windows\system32\calc.exe
                                                                                                                  "C:\Windows\system32\calc.exe"
                                                                                                                  1⤵
                                                                                                                    PID:4460
                                                                                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                    1⤵
                                                                                                                      PID:4472
                                                                                                                    • C:\Windows\system32\calc.exe
                                                                                                                      "C:\Windows\system32\calc.exe"
                                                                                                                      1⤵
                                                                                                                        PID:4524
                                                                                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                        1⤵
                                                                                                                          PID:4576
                                                                                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                          "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                          1⤵
                                                                                                                            PID:4616
                                                                                                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                            "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                            1⤵
                                                                                                                              PID:4656
                                                                                                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                              1⤵
                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                              PID:4680
                                                                                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                              "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                              1⤵
                                                                                                                                PID:4716
                                                                                                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                1⤵
                                                                                                                                  PID:4844
                                                                                                                                • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                  "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                  1⤵
                                                                                                                                    PID:5012
                                                                                                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                    1⤵
                                                                                                                                      PID:5036
                                                                                                                                    • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                      "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                      1⤵
                                                                                                                                      • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                      PID:4176
                                                                                                                                    • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                      "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                      1⤵
                                                                                                                                        PID:1776
                                                                                                                                      • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                        "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                        1⤵
                                                                                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                        PID:4084
                                                                                                                                      • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                        "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                        1⤵
                                                                                                                                          PID:4488
                                                                                                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                          1⤵
                                                                                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                          PID:4628
                                                                                                                                        • C:\Windows\system32\calc.exe
                                                                                                                                          "C:\Windows\system32\calc.exe"
                                                                                                                                          1⤵
                                                                                                                                            PID:3004
                                                                                                                                          • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                                                                                                                            "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:1
                                                                                                                                            1⤵
                                                                                                                                              PID:4848
                                                                                                                                              • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
                                                                                                                                                "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:1
                                                                                                                                                2⤵
                                                                                                                                                  PID:1688
                                                                                                                                              • C:\Windows\explorer.exe
                                                                                                                                                "C:\Windows\explorer.exe"
                                                                                                                                                1⤵
                                                                                                                                                  PID:5048
                                                                                                                                                • C:\Windows\system32\calc.exe
                                                                                                                                                  "C:\Windows\system32\calc.exe"
                                                                                                                                                  1⤵
                                                                                                                                                    PID:5008
                                                                                                                                                  • C:\Windows\system32\calc.exe
                                                                                                                                                    "C:\Windows\system32\calc.exe"
                                                                                                                                                    1⤵
                                                                                                                                                      PID:1688
                                                                                                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                      1⤵
                                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                                      PID:3984
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3984 CREDAT:275457 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                          PID:1972
                                                                                                                                                      • C:\Windows\system32\calc.exe
                                                                                                                                                        "C:\Windows\system32\calc.exe"
                                                                                                                                                        1⤵
                                                                                                                                                          PID:4348
                                                                                                                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                          1⤵
                                                                                                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                          PID:1568
                                                                                                                                                        • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                          "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                          1⤵
                                                                                                                                                            PID:3192
                                                                                                                                                          • C:\Windows\system32\calc.exe
                                                                                                                                                            "C:\Windows\system32\calc.exe"
                                                                                                                                                            1⤵
                                                                                                                                                              PID:3044
                                                                                                                                                            • C:\Windows\system32\calc.exe
                                                                                                                                                              "C:\Windows\system32\calc.exe"
                                                                                                                                                              1⤵
                                                                                                                                                                PID:2584
                                                                                                                                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:5440
                                                                                                                                                                • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                  "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                  PID:5512
                                                                                                                                                                • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                  "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                  PID:5520
                                                                                                                                                                • C:\Windows\system32\calc.exe
                                                                                                                                                                  "C:\Windows\system32\calc.exe"
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:5736
                                                                                                                                                                  • C:\Windows\system32\calc.exe
                                                                                                                                                                    "C:\Windows\system32\calc.exe"
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:5780
                                                                                                                                                                    • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                      "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:5808
                                                                                                                                                                      • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                        "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:5848
                                                                                                                                                                        • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                          "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:5856
                                                                                                                                                                          • C:\Windows\system32\calc.exe
                                                                                                                                                                            "C:\Windows\system32\calc.exe"
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:5884
                                                                                                                                                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                              PID:5896
                                                                                                                                                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                              PID:5932
                                                                                                                                                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                              PID:5952
                                                                                                                                                                            • C:\Windows\system32\calc.exe
                                                                                                                                                                              "C:\Windows\system32\calc.exe"
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:5240
                                                                                                                                                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:5272
                                                                                                                                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:5284
                                                                                                                                                                                  • C:\Windows\system32\calc.exe
                                                                                                                                                                                    "C:\Windows\system32\calc.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:5648
                                                                                                                                                                                    • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                      "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                      1⤵
                                                                                                                                                                                      • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                      PID:5656
                                                                                                                                                                                    • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                      "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:5804
                                                                                                                                                                                      • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                        "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:5444
                                                                                                                                                                                        • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                          "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:6116
                                                                                                                                                                                          • C:\Windows\system32\calc.exe
                                                                                                                                                                                            "C:\Windows\system32\calc.exe"
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:5420
                                                                                                                                                                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                              PID:6124
                                                                                                                                                                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                              PID:2728
                                                                                                                                                                                            • C:\Windows\system32\calc.exe
                                                                                                                                                                                              "C:\Windows\system32\calc.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:1648
                                                                                                                                                                                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                PID:1684
                                                                                                                                                                                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                PID:2716
                                                                                                                                                                                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                PID:6268
                                                                                                                                                                                              • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:6428
                                                                                                                                                                                                • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                  "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                  • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                  PID:6540
                                                                                                                                                                                                • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                  "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:6672
                                                                                                                                                                                                  • C:\Windows\system32\calc.exe
                                                                                                                                                                                                    "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:6684
                                                                                                                                                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:6876
                                                                                                                                                                                                      • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                        "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                        PID:6944
                                                                                                                                                                                                      • C:\Windows\explorer.exe
                                                                                                                                                                                                        "C:\Windows\explorer.exe"
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:7028
                                                                                                                                                                                                        • C:\Windows\system32\calc.exe
                                                                                                                                                                                                          "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:7124
                                                                                                                                                                                                          • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                            "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                            • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                            PID:7132
                                                                                                                                                                                                          • C:\Windows\system32\calc.exe
                                                                                                                                                                                                            "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:6400
                                                                                                                                                                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                              "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:6168
                                                                                                                                                                                                              • C:\Windows\system32\calc.exe
                                                                                                                                                                                                                "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:6496
                                                                                                                                                                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:6476
                                                                                                                                                                                                                  • C:\Windows\system32\calc.exe
                                                                                                                                                                                                                    "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:6588
                                                                                                                                                                                                                    • C:\Windows\system32\calc.exe
                                                                                                                                                                                                                      "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:6352
                                                                                                                                                                                                                      • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                        "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                        PID:6704
                                                                                                                                                                                                                      • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                                                        C:\Windows\system32\AUDIODG.EXE 0x6a4
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                        PID:6868
                                                                                                                                                                                                                      • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                        "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                        PID:7048
                                                                                                                                                                                                                      • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                        "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:7068
                                                                                                                                                                                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                          PID:2420
                                                                                                                                                                                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                          "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:6436
                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:4608
                                                                                                                                                                                                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                              PID:4784
                                                                                                                                                                                                                            • C:\Windows\system32\calc.exe
                                                                                                                                                                                                                              "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:7176
                                                                                                                                                                                                                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                                "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                                PID:7256
                                                                                                                                                                                                                              • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:7744
                                                                                                                                                                                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:7760
                                                                                                                                                                                                                                  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                    "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:7828
                                                                                                                                                                                                                                    • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                      "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:7868
                                                                                                                                                                                                                                      • C:\Windows\explorer.exe
                                                                                                                                                                                                                                        explorer.exe
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                        • Modifies Installed Components in the registry
                                                                                                                                                                                                                                        • Drops desktop.ini file(s)
                                                                                                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                        PID:7884
                                                                                                                                                                                                                                        • C:\Windows\system32\calc.exe
                                                                                                                                                                                                                                          "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                            PID:7548
                                                                                                                                                                                                                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                            "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                              PID:6472
                                                                                                                                                                                                                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                                              PID:7728
                                                                                                                                                                                                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                              "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                PID:7780
                                                                                                                                                                                                                                              • C:\Windows\explorer.exe
                                                                                                                                                                                                                                                "C:\Windows\explorer.exe"
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                  PID:7864
                                                                                                                                                                                                                                                • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                                                  "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                                                  PID:1440
                                                                                                                                                                                                                                                • C:\Windows\explorer.exe
                                                                                                                                                                                                                                                  "C:\Windows\explorer.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                    PID:1956
                                                                                                                                                                                                                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                      PID:2552
                                                                                                                                                                                                                                                    • C:\Windows\System32\control.exe
                                                                                                                                                                                                                                                      "C:\Windows\System32\control.exe" "C:\Windows\system32\timedate.cpl",
                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                        PID:3444
                                                                                                                                                                                                                                                        • C:\Windows\system32\rundll32.exe
                                                                                                                                                                                                                                                          "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\timedate.cpl",
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:4416
                                                                                                                                                                                                                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                                                          PID:7428
                                                                                                                                                                                                                                                        • C:\Windows\System32\control.exe
                                                                                                                                                                                                                                                          "C:\Windows\System32\control.exe" "C:\Windows\system32\timedate.cpl",
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:7652
                                                                                                                                                                                                                                                            • C:\Windows\system32\rundll32.exe
                                                                                                                                                                                                                                                              "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\timedate.cpl",
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:7892
                                                                                                                                                                                                                                                            • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                                              "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:7952
                                                                                                                                                                                                                                                              • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                                                                                                                                                                                                                                                "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:1
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:4836
                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
                                                                                                                                                                                                                                                                    "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:1
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                      PID:8052
                                                                                                                                                                                                                                                                  • C:\Windows\system32\SndVol.exe
                                                                                                                                                                                                                                                                    SndVol.exe -f 17498214 9906
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:8020
                                                                                                                                                                                                                                                                    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                                                                                                                                                                                                                                                      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:1
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:2128
                                                                                                                                                                                                                                                                        • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
                                                                                                                                                                                                                                                                          "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:1
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                            PID:4664
                                                                                                                                                                                                                                                                        • C:\Windows\system32\calc.exe
                                                                                                                                                                                                                                                                          "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:8176
                                                                                                                                                                                                                                                                          • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                                                                            "C:\Windows\System32\rundll32.exe" C:\Windows\system32\shell32.dll,Options_RunDLL 1
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:2552
                                                                                                                                                                                                                                                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                                                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                                                                              PID:1088
                                                                                                                                                                                                                                                                            • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                                                              "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:8036
                                                                                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:5144
                                                                                                                                                                                                                                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                                                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:5608
                                                                                                                                                                                                                                                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                                                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:5880
                                                                                                                                                                                                                                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                                                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:6876
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\calc.exe
                                                                                                                                                                                                                                                                                        "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:8164
                                                                                                                                                                                                                                                                                        • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                                                                          "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:8236
                                                                                                                                                                                                                                                                                          • C:\Windows\system32\calc.exe
                                                                                                                                                                                                                                                                                            "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:8260
                                                                                                                                                                                                                                                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                                                                              "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:8356
                                                                                                                                                                                                                                                                                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                                                                                                "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                                                                                                                PID:8388
                                                                                                                                                                                                                                                                                              • C:\Windows\system32\calc.exe
                                                                                                                                                                                                                                                                                                "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:8396
                                                                                                                                                                                                                                                                                                • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                                                                                  "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:8616
                                                                                                                                                                                                                                                                                                  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                                                                                    "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:8848
                                                                                                                                                                                                                                                                                                    • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                                                                                      "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:8888
                                                                                                                                                                                                                                                                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                                                                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:8944
                                                                                                                                                                                                                                                                                                        • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
                                                                                                                                                                                                                                                                                                          "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:8992
                                                                                                                                                                                                                                                                                                          • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                                                                                                                                                                            "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                            • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                                                                                                            PID:9048
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\calc.exe
                                                                                                                                                                                                                                                                                                            "C:\Windows\system32\calc.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:8268
                                                                                                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                            • Enumerates system info in registry
                                                                                                                                                                                                                                                                                                            • Modifies Internet Explorer settings
                                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                                            PID:8504

                                                                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            914B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            e4a68ac854ac5242460afd72481b2a44

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            df3c24f9bfd666761b268073fe06d1cc8d4f82a4

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            60KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            d15aaa7c9be910a9898260767e2490e1

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            252B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            be4289b3a8789d1ed7e344e9dd094d9e

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            8b5b62d5ac53273884fdd3614d45cedaf37d6882

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            85f9998468acc6ba3b647379646c9ae6dba7863c8624516d230cef643758fc1c

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            45a1a7c0f366fe17dd6c5285a970ef09fa9a333827f29829a1f727fe53f86a14dbb67bd7dcc8c69b6b238bdfd8236a3af4f325057516238dafe35bb9445dfc5d

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            342B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            74f0d59b000154dd15aad3e14c22424c

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            d9322848112b41a927a271dc136caa5695e349af

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            43bfbff4d0a7890caaf29fb7a176f215b7bcc4009d419cc41e39d9e61429a833

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            aac0be4bdb430fcb21d457d5e43d3a0918cc861c2f50bbbd9314d7ead6f68b7dcc46a0995b48c38799807e27b2d1c1dd5cc313c6af02cc99479db0679a337fdf

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            342B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            0adfb79c0e4bcf3066ea9ff1bb3ddfed

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            1c28acc3d88e4a65999e0825ed89fa2e0fb16c04

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            3878efd9b277667649f2ccd691e78b551c367e3d5556f9a1adc23fac414942d6

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            a0344373762fc37fdd0b8fbfb88815907efc3db8f5cb124637260311e154cd42393b238a6ae398842c2769950d53d9df8132ff66659ffb0089a4eb0184a3bd67

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            342B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            99dbab03de5c8044d6d262a372a0cc1a

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            e2f5f3c84efb4afca7fc67e22da897e5306fdaa3

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            07b74b1ac7e4986e92fa2ff190c9997fd2c580f36b9822f9da634cc64eb4dca8

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            6a5a95253449f20d37a62c51ca213a006889c04f45e0ef0a7095658b4d4a6fa9bc056be3ce1aeadd43eb74dad19ce6b316698e4af8ba3393b179f2245562614a

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            342B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            a7d6ad7e87c91ba3675499306d10bb5e

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            7e50b20f4328d2af1cfe1a400fed4bade8b3e2d1

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            24e082d8c346e2f9d81ff24d3bec7459a6669cf4cd2825b5ee8980264eb837d1

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            26d9143d9ca4263c27a45c808a74942fb6b3e95c75bfbc315b4893992f384b60f0d2ad788d174a2925894deb66e6bb5d8a12f8d8f064ef981381668505965307

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            342B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            a1d27ba90316e17261897a38782540a7

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            3f52034b0e6452777093379819835bf571dcc5d3

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            2523b3d16c709dbdf090000f8e76d039c36e361852ba2e626f66767dc403a7aa

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            c0510813e1b19b9368753f8c7b0735f052c77792e1c5809b4832f5f107308ffd09072a57538d18e470542450350bc5feee761512698d18c96a271599525d20c4

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            342B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            ac40ef6c93085d7ff52fbf8e5ccef251

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            406a6163de654c8a92dc1fe2ef1bf79c5f473ffe

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            9ea01da044091e55cc72dd911056244c37a9584838b4c75dbbb43d5d3e984ad6

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            a3f37e313339a6a0673f183beda5d91c2fd864a1a4c718ea155ac4e82df10fa4d83e80db97ac2e322290975c635550ab8aaeabffb363e80d01117a87edae2eab

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            342B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            cdd78bcce3b6a1b25bb7caf4dc504222

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            028f6e88bd534264bb0c87db1fff3e7f68a261fa

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            95695f292826a738ea4eb4b8c1bff04f3d407f497b6acca6d4fca07553c92de0

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            2d3291ed678802f032ddb1466a2cbbdd63abe6eb6225cf26f038983cdf03fb8bb42dd595adfd6006bede918fd246f559c513e6379e3e978804d138c8b6760a55

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            342B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            26c878669239093efde35a12b13158e4

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            afdd1c3a8382e2fcc7242b3e44ec25b1c92836fa

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            1a23c2e284fc5a36682161de8d09e75e7d4be8a85660aa8612207d4680ab1c4e

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            968fb2dba27015434105f9d0cc6ef38649c09aa59f6f9d4450a8fbe6cf2d876728b7954619a3946ba0f62de31fde70c6b680318c7922dae5a774616b464d77d7

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D12AF41-47E2-11ED-9332-6A94EDCEDC7A}.dat

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            7KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            f78c72ca5190968455e608089893e1e2

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            aebd81c750ec70e60732a657c6d8e728a9e1445b

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            96f0f8061a3f33003448412628b39ffece859a2b1fd0bacac8c515505fc58d5c

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            66b832dda2a8bb2f83f7d09af5dc8c4d446d7bf10429eac46a6c2cbc421c863ef52718dc6f71af8bb7105998c1c429d9d68889a96eb6dd9f5d47c10d4dc40460

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D348F21-47E2-11ED-9332-6A94EDCEDC7A}.dat

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            3KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            c77e88155d57a9434d4fce13504df4da

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            f3c04d2ce4d5ebc271a2a8db3bca6a529c512b21

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            f50f129cd0457b2de9214d825af2323cb2b2418802f0c9db877c8d7e87abb72d

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            51d515974985219105bfc84ba4d6c6d6ac8f0a4018a86efa21737216970b9c681f3fd29666c00a1ad374a256ff1804b8903a6fd4730ccc53d777625d91b0cb96

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5E2E3931-47E2-11ED-9332-6A94EDCEDC7A}.dat

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            3KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            5217d5d28cb7c512840f4fac5f2e7094

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            e10aae61e9101cc52561107fa621dcb9a6589e6e

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            3fceb455a7db69b0193cb2a6d8c12e5099764bc343a9502f69b5186ac05017fd

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            d9359aeade5897ccadf8e02f25d247dced34d348854c62adab970c7624e2fa66bec2767df08e066018264c1c20a2a6ec096d959cbd703413671f81c88d9a5114

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\9d91276b0be3e46b\pinned.lnk

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            271B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            489d59f070cb12df34aebc229fbb89f8

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            d4c981126467c4cd0b71096067c0d0f695f12b86

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            0356d7e3d47760a2b0645789b0efb3e993740d7ab9b955d9a826637a9a3f671d

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            0ba19f6b3f70bbf61afd3ef42ff977eaefdca3ebf7b613d0259f6884fe3ca76c4a9672c98c9ba5b08d3746ab12ac40fa140b43e9acd362391205652c999bb4e0

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HI0CN18K.txt

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            601B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            ca0223aa2e3e299365a460807f1e38a4

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            310c7fa9cb0de567dea9911f1e3d73c01c2e316a

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            264773933d3a267e3fdd4f77a2a08b8102e70950f3215f530f6c75d1b96e0e3e

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            ff46827e97e830c7ec4fb46c61a3480bfa0dbadfef327f55bff537482ed642c24b1b1868a3e572015ff01c118115b87ea97b48cfcf84f1996863b19ac0d3d3bc

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            3KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            34dc0788fe02cc31b36a9146dc327fbe

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            8bb595272210411b2802dfca2be6ffd0a6e11208

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            8f9580b014d0eb20b8a96ae39b8a92ea65382d8db8a55ced8d7348ed1f5d50da

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            57f0872db4e721a51ed3ba26584dc0874c2d6892822e5bf3285573a1d6c0be68c91b18121fb9157fa6e244e3ca0ef9ee516b21f7c6c72021ab411468febc0aba

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            54B

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            29e0bb4b89bfa23aa9565e026dc7bbbd

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            05c82db8c89fd338ab6620d02daf27c310edeada

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            871d529e9ff384d631ffead4b17a550c393668b98c2a988626716418fd2bae03

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            66f3d363eb4e510dc45666e19b9a16c6ee46adece75b751ae05c1c7cf15445cc1fa1f38c6889dab37f6fd071b58fdb84e11967e041f07350404756a3d8d9f570

                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\vlc\vlcrc

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            93KB

                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                            478a4a09f4f74e97335cd4d5e9da7ab5

                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                            3c4f1dc52a293f079095d0b0370428ec8e8f9315

                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                            884b59950669842f3c45e6da3480cd9a553538b951fb155b435b48ff38683974

                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                            e96719663cd264132a8e1ea8c3f8a148c778a0c68caa2468ba47629393605b197dd9e00efad91f389de9fcc77b04981a0cf87f785f3c645cdc9e4ebd98060ca1

                                                                                                                                                                                                                                                                                                          • memory/860-60-0x0000000071E91000-0x0000000071E93000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                          • memory/1084-55-0x0000000076151000-0x0000000076153000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                          • memory/1256-88-0x0000000072E7D000-0x0000000072E88000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            44KB

                                                                                                                                                                                                                                                                                                          • memory/1256-67-0x0000000072E7D000-0x0000000072E88000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            44KB

                                                                                                                                                                                                                                                                                                          • memory/1256-69-0x0000000069D31000-0x0000000069D34000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            12KB

                                                                                                                                                                                                                                                                                                          • memory/1256-66-0x000000005FFF0000-0x0000000060000000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                                          • memory/1968-54-0x000007FEFBD11000-0x000007FEFBD13000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                          • memory/8504-266-0x0000000072E7D000-0x0000000072E88000-memory.dmp

                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                            44KB