Analysis
-
max time kernel
570s -
max time network
570s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-01-2023 00:39
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win10-20220812-en
General
-
Target
SOA.exe
-
Size
1.1MB
-
MD5
f890903c9b2fa054a4b22b4240870db2
-
SHA1
06ed4e7131287fcf01e49834180567daf9a13240
-
SHA256
a0c77b9f372d94ae8cbc32b27d319491cb65001b12963bc68b96b8caaf10dfa0
-
SHA512
b230749492b8d3ceb0824badc423c163c706df0c464849950523f2bedefa2ed7f50de83ee403611f1c5559f154f0fed7335310d23233701625de65bc09b9e883
-
SSDEEP
12288:xJEPCBEYJmzdicP0bYzJfKMVvS1yIuDBXolPu3fgzHIGEoTCqEUbeSh39W+ll8nO:rCJRVXbe8REgRJrn85cMNd
Malware Config
Extracted
asyncrat
0.5.7B
Default
ESCANOR2022.LINKPC.NET:6606
ESCANOR2022.LINKPC.NET:7707
ESCANOR2022.LINKPC.NET:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
sqli.exe
-
install_folder
%AppData%
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/4016-1665-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4016-1671-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4016-1698-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4016-1699-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SOA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1.exe -
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/5104-1244-0x0000000000290000-0x00000000002A2000-memory.dmp asyncrat behavioral1/memory/2480-1523-0x00000000066B0000-0x00000000066D2000-memory.dmp asyncrat -
Blocklisted process makes network request 2 IoCs
flow pid Process 141 3080 msiexec.exe 143 3080 msiexec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\HttpDebuggerSdk.sys HTTPDebuggerSvc.exe File opened for modification C:\Windows\system32\drivers\HttpDebuggerSdk.sys HTTPDebuggerSvc.exe -
Executes dropped EXE 6 IoCs
pid Process 2556 HTTPDebuggerSvc.exe 2860 HTTPDebuggerSvc.exe 4308 HTTPDebuggerUI.exe 5104 RegAsm.exe 2480 sqli.exe 4268 RegAsm.exe -
Sets service image path in registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" 1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" 1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" SOA.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" 1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" 1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" 1.exe -
Loads dropped DLL 10 IoCs
pid Process 3636 MsiExec.exe 3636 MsiExec.exe 3636 MsiExec.exe 204 MsiExec.exe 1924 MsiExec.exe 3636 MsiExec.exe 3636 MsiExec.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SOA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SOA.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 949 api.ipify.org 57 api.ipify.org 58 api.ipify.org 568 api.ipify.org 569 api.ipify.org 571 api.ipify.org 572 api.ipify.org 575 api.ipify.org -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 5004 set thread context of 3892 5004 SOA.exe 72 PID 4632 set thread context of 768 4632 1.exe 121 PID 3772 set thread context of 3196 3772 1.exe 136 PID 3080 set thread context of 976 3080 1.exe 165 PID 4344 set thread context of 4596 4344 1.exe 175 PID 3872 set thread context of 416 3872 1.exe 209 PID 4128 set thread context of 4016 4128 file.exe 234 -
Drops file in Program Files directory 24 IoCs
description ioc Process File created C:\Program Files (x86)\HTTPDebuggerPro\drv\Win7\HttpDebuggerSdk64.sys msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\Styles\Office2016.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\nssdbm3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\scintilla_license.txt msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\certutil.exe msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\freebl3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\drv\Win8\HttpDebuggerSdk64.sys msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\libplds4.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\nssckbi.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerUI.exe msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\drv\Win7\HttpDebuggerSdk32.sys msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\zlib_license.txt msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\license.rtf msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\drv\Win8\HttpDebuggerSdk32.sys msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\nssutil3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerBrowser.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\smime3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\softokn3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\sqlite3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerSvc.exe msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\cximagecrt.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\libnspr4.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\libplc4.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\nss3.dll msiexec.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{3AAA8F78-6858-4344-8675-C73E1573CA0F}\HTTPDebuggerUI.exe msiexec.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\e580fbc.msi msiexec.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{3AAA8F78-6858-4344-8675-C73E1573CA0F} msiexec.exe File opened for modification C:\Windows\Installer\MSI179B.tmp msiexec.exe File created C:\Windows\Installer\{3AAA8F78-6858-4344-8675-C73E1573CA0F}\HTTPDebuggerUI.exe msiexec.exe File created C:\Windows\Installer\e580fba.msi msiexec.exe File opened for modification C:\Windows\Installer\e580fba.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI1160.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification \??\c:\windows\installer\{3aaa8f78-6858-4344-8675-c73e1573ca0f}\httpdebuggerui.exe Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1416 292 WerFault.exe 239 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2792 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 432 timeout.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates HTTPDebuggerSvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root HTTPDebuggerSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs HTTPDebuggerSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs HTTPDebuggerSvc.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" PaintStudio.View.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\VersionIndependentProgID MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919}\1.0\ = "vbMHWB 1.0 Type Library" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919}\1.0\0 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\ = "IvbWB" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\ProductName = "HTTPDebuggerPro" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MSPaint_8wekyb3d8bbwe\SplashScreen Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix PaintStudio.View.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\PackageCode = "95D461321A43EC94B8CA54DA9339604F" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\ProductIcon = "C:\\Windows\\Installer\\{3AAA8F78-6858-4344-8675-C73E1573CA0F}\\HTTPDebuggerUI.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\TypeLib MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\TypeLib MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\MiscStatus\ = "0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\EFA6D6B88BD56724E9FE0AB5852CEEED msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" PaintStudio.View.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\TypeLib\ = "{33658027-1004-4E1E-8D35-C9146DF87919}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\Downloads\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB\CurVer\ = "VbMHWB.vbWB.1" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\ToolboxBitmap32\ = "C:\\Program Files (x86)\\HTTPDebuggerPro\\HTTPDebuggerBrowser.dll, 101" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\TypeLib MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" PaintStudio.View.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\Version MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList\PackageName = "HTTPDebuggerPro.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919}\1.0\FLAGS\ = "0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\TypeLib MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content PaintStudio.View.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\VersionIndependentProgID\ = "VbMHWB.vbWB" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\ = "_IvbWBEvents" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies PaintStudio.View.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A} MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\Programmable MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\MiscStatus MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB\ = "vbWB Class" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB.1\CLSID\ = "{20247C83-3429-47B1-817F-C99F29D2BF3A}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\ProgID MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\TypeLib\Version = "1.0" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB.1\ = "vbWB Class" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\ProxyStubClsid32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\TypeLib\Version = "1.0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\InprocServer32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\ToolboxBitmap32 MsiExec.exe -
NTFS ADS 4 IoCs
description ioc Process File created C:\Users\Admin\Downloads\HTTPDebuggerPro.msi:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\SOA.bin.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\AppData\Local\Temp\AsyNcioo.bin.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\AppData\Local\Temp\file.zip:Zone.Identifier firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 292 PaintStudio.View.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5004 SOA.exe 5004 SOA.exe 5004 SOA.exe 5004 SOA.exe 5004 SOA.exe 5004 SOA.exe 5004 SOA.exe 1504 powershell.exe 5004 SOA.exe 5004 SOA.exe 1504 powershell.exe 1504 powershell.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 4028 msiexec.exe 4028 msiexec.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 3892 jsc.exe 4632 1.exe -
Suspicious behavior: GetForegroundWindowSpam 7 IoCs
pid Process 4308 HTTPDebuggerUI.exe 3892 jsc.exe 4596 jsc.exe 976 AddInProcess32.exe 3196 jsc.exe 768 AddInProcess32.exe 2696 Process not Found -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 5004 SOA.exe 628 Process not Found 628 Process not Found 628 Process not Found 628 Process not Found 4632 1.exe 3772 1.exe 3080 1.exe 4344 1.exe 3872 1.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4016 file.exe -
Suspicious behavior: SetClipboardViewer 5 IoCs
pid Process 768 AddInProcess32.exe 3196 jsc.exe 976 AddInProcess32.exe 4596 jsc.exe 416 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5004 SOA.exe Token: SeLoadDriverPrivilege 5004 SOA.exe Token: SeDebugPrivilege 5004 SOA.exe Token: SeDebugPrivilege 1504 powershell.exe Token: SeIncreaseQuotaPrivilege 1504 powershell.exe Token: SeSecurityPrivilege 1504 powershell.exe Token: SeTakeOwnershipPrivilege 1504 powershell.exe Token: SeLoadDriverPrivilege 1504 powershell.exe Token: SeSystemProfilePrivilege 1504 powershell.exe Token: SeSystemtimePrivilege 1504 powershell.exe Token: SeProfSingleProcessPrivilege 1504 powershell.exe Token: SeIncBasePriorityPrivilege 1504 powershell.exe Token: SeCreatePagefilePrivilege 1504 powershell.exe Token: SeBackupPrivilege 1504 powershell.exe Token: SeRestorePrivilege 1504 powershell.exe Token: SeShutdownPrivilege 1504 powershell.exe Token: SeDebugPrivilege 1504 powershell.exe Token: SeSystemEnvironmentPrivilege 1504 powershell.exe Token: SeRemoteShutdownPrivilege 1504 powershell.exe Token: SeUndockPrivilege 1504 powershell.exe Token: SeManageVolumePrivilege 1504 powershell.exe Token: 33 1504 powershell.exe Token: 34 1504 powershell.exe Token: 35 1504 powershell.exe Token: 36 1504 powershell.exe Token: SeDebugPrivilege 3892 jsc.exe Token: SeDebugPrivilege 4280 firefox.exe Token: SeDebugPrivilege 4280 firefox.exe Token: SeDebugPrivilege 4280 firefox.exe Token: SeShutdownPrivilege 3080 msiexec.exe Token: SeIncreaseQuotaPrivilege 3080 msiexec.exe Token: SeSecurityPrivilege 4028 msiexec.exe Token: SeCreateTokenPrivilege 3080 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3080 msiexec.exe Token: SeLockMemoryPrivilege 3080 msiexec.exe Token: SeIncreaseQuotaPrivilege 3080 msiexec.exe Token: SeMachineAccountPrivilege 3080 msiexec.exe Token: SeTcbPrivilege 3080 msiexec.exe Token: SeSecurityPrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe Token: SeLoadDriverPrivilege 3080 msiexec.exe Token: SeSystemProfilePrivilege 3080 msiexec.exe Token: SeSystemtimePrivilege 3080 msiexec.exe Token: SeProfSingleProcessPrivilege 3080 msiexec.exe Token: SeIncBasePriorityPrivilege 3080 msiexec.exe Token: SeCreatePagefilePrivilege 3080 msiexec.exe Token: SeCreatePermanentPrivilege 3080 msiexec.exe Token: SeBackupPrivilege 3080 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeShutdownPrivilege 3080 msiexec.exe Token: SeDebugPrivilege 3080 msiexec.exe Token: SeAuditPrivilege 3080 msiexec.exe Token: SeSystemEnvironmentPrivilege 3080 msiexec.exe Token: SeChangeNotifyPrivilege 3080 msiexec.exe Token: SeRemoteShutdownPrivilege 3080 msiexec.exe Token: SeUndockPrivilege 3080 msiexec.exe Token: SeSyncAgentPrivilege 3080 msiexec.exe Token: SeEnableDelegationPrivilege 3080 msiexec.exe Token: SeManageVolumePrivilege 3080 msiexec.exe Token: SeImpersonatePrivilege 3080 msiexec.exe Token: SeCreateGlobalPrivilege 3080 msiexec.exe Token: SeCreateTokenPrivilege 3080 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3080 msiexec.exe Token: SeLockMemoryPrivilege 3080 msiexec.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 3080 msiexec.exe 4280 firefox.exe 3080 msiexec.exe 4308 HTTPDebuggerUI.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 2696 Process not Found 2696 Process not Found 2696 Process not Found 2696 Process not Found 1960 firefox.exe 1960 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 4700 taskmgr.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 2696 Process not Found 2696 Process not Found 2696 Process not Found 2696 Process not Found 2696 Process not Found 2696 Process not Found 2696 Process not Found 2696 Process not Found 2696 Process not Found 2696 Process not Found 2696 Process not Found 2696 Process not Found -
Suspicious use of SetWindowsHookEx 49 IoCs
pid Process 4280 firefox.exe 3892 jsc.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 3968 OpenWith.exe 768 AddInProcess32.exe 3196 jsc.exe 976 AddInProcess32.exe 4596 jsc.exe 1960 firefox.exe 416 AddInProcess32.exe 4856 mspaint.exe 292 PaintStudio.View.exe 292 PaintStudio.View.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe 4308 HTTPDebuggerUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 1504 5004 SOA.exe 67 PID 5004 wrote to memory of 1504 5004 SOA.exe 67 PID 5004 wrote to memory of 2104 5004 SOA.exe 69 PID 5004 wrote to memory of 2104 5004 SOA.exe 69 PID 5004 wrote to memory of 5084 5004 SOA.exe 70 PID 5004 wrote to memory of 5084 5004 SOA.exe 70 PID 5004 wrote to memory of 3320 5004 SOA.exe 71 PID 5004 wrote to memory of 3320 5004 SOA.exe 71 PID 5004 wrote to memory of 1652 5004 SOA.exe 73 PID 5004 wrote to memory of 1652 5004 SOA.exe 73 PID 5004 wrote to memory of 3892 5004 SOA.exe 72 PID 5004 wrote to memory of 3892 5004 SOA.exe 72 PID 5004 wrote to memory of 3892 5004 SOA.exe 72 PID 5004 wrote to memory of 3892 5004 SOA.exe 72 PID 5004 wrote to memory of 3892 5004 SOA.exe 72 PID 5004 wrote to memory of 3892 5004 SOA.exe 72 PID 5004 wrote to memory of 3892 5004 SOA.exe 72 PID 5004 wrote to memory of 3892 5004 SOA.exe 72 PID 3392 wrote to memory of 4280 3392 firefox.exe 77 PID 3392 wrote to memory of 4280 3392 firefox.exe 77 PID 3392 wrote to memory of 4280 3392 firefox.exe 77 PID 3392 wrote to memory of 4280 3392 firefox.exe 77 PID 3392 wrote to memory of 4280 3392 firefox.exe 77 PID 3392 wrote to memory of 4280 3392 firefox.exe 77 PID 3392 wrote to memory of 4280 3392 firefox.exe 77 PID 3392 wrote to memory of 4280 3392 firefox.exe 77 PID 3392 wrote to memory of 4280 3392 firefox.exe 77 PID 4280 wrote to memory of 3752 4280 firefox.exe 79 PID 4280 wrote to memory of 3752 4280 firefox.exe 79 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 PID 4280 wrote to memory of 4832 4280 firefox.exe 81 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SOA.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"1⤵
- UAC bypass
- Sets service image path in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SOA.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:2104
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:5084
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:3320
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3892
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:1652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.0.785738638\1516626808" -parentBuildID 20200403170909 -prefsHandle 1564 -prefMapHandle 1556 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 1648 gpu3⤵PID:3752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.3.1754837835\335958136" -childID 1 -isForBrowser -prefsHandle 2216 -prefMapHandle 2212 -prefsLen 156 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 2228 tab3⤵PID:4832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.13.1572072582\226292257" -childID 2 -isForBrowser -prefsHandle 3388 -prefMapHandle 3384 -prefsLen 6938 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 3400 tab3⤵PID:1496
-
-
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\HTTPDebuggerPro.msi"1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3080
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6864D1BE31EC71E5AB3375A4752E2C58 C2⤵
- Loads dropped DLL
PID:3636 -
C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerUI.exe"C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerUI.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4308
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4240
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D5E790E6A93328295E5E45DFC5AB62022⤵
- Loads dropped DLL
PID:204
-
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerBrowser.dll"2⤵
- Loads dropped DLL
- Modifies registry class
PID:1924
-
-
C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerSvc.exe"C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerSvc.exe" /install2⤵
- Executes dropped EXE
PID:2860
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4840
-
C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerSvc.exe"C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerSvc.exe"1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2556
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1616
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3968
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵
- UAC bypass
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
PID:4632 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\1.exe" -Force2⤵PID:1960
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:4808
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:424
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:4744
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:4712
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:4680
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:4276
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:4956
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"2⤵PID:3820
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:4792
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
PID:768
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:4952
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4700
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵
- UAC bypass
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: LoadsDriver
PID:3772 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\1.exe" -Force2⤵PID:2204
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"2⤵PID:4752
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:4708
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:4952
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:4744
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:4704
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:4796
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:644
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
PID:3196
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:2472
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:1740
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:4724
-
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵
- UAC bypass
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: LoadsDriver
PID:3080 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\1.exe" -Force2⤵PID:3852
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:2320
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:3968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:5068
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:660
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:160
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:4228
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:2848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:236
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:4156
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:1008
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:1208
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:1012
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:1452
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:2152
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:2104
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:2588
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"2⤵PID:1920
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"2⤵PID:1116
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:1180
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:4596
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:760
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
PID:976
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:1388
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:944
-
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵
- UAC bypass
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: LoadsDriver
PID:4344 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\1.exe" -Force2⤵PID:4948
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:2320
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:3968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:5068
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:1180
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:2892
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1960.0.1331672477\292296569" -parentBuildID 20200403170909 -prefsHandle 1468 -prefMapHandle 1460 -prefsLen 1 -prefMapSize 221976 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1960 "\\.\pipe\gecko-crash-server-pipe.1960" 1544 gpu3⤵PID:3796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1960.3.998980127\1602484671" -childID 1 -isForBrowser -prefsHandle 2288 -prefMapHandle 2436 -prefsLen 397 -prefMapSize 221976 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1960 "\\.\pipe\gecko-crash-server-pipe.1960" 2360 tab3⤵PID:584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1960.13.247974588\554423779" -childID 2 -isForBrowser -prefsHandle 3432 -prefMapHandle 3428 -prefsLen 6553 -prefMapSize 221976 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1960 "\\.\pipe\gecko-crash-server-pipe.1960" 3476 tab3⤵PID:2904
-
-
-
C:\Users\Admin\Desktop\2.exe"C:\Users\Admin\Desktop\2.exe"1⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"2⤵
- Executes dropped EXE
PID:5104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sqli" /tr '"C:\Users\Admin\AppData\Roaming\sqli.exe"' & exit3⤵PID:1652
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "sqli" /tr '"C:\Users\Admin\AppData\Roaming\sqli.exe"'4⤵
- Creates scheduled task(s)
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8837.tmp.bat""3⤵PID:680
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:432
-
-
C:\Users\Admin\AppData\Roaming\sqli.exe"C:\Users\Admin\AppData\Roaming\sqli.exe"4⤵
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\vxqjgs.exe"' & exit5⤵PID:2892
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\vxqjgs.exe"'6⤵PID:4140
-
-
-
-
-
-
C:\Users\Admin\Desktop\1.exe"C:\Users\Admin\Desktop\1.exe"1⤵
- UAC bypass
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: LoadsDriver
PID:3872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\1.exe" -Force2⤵PID:4564
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:480
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"2⤵PID:4252
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:3276
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:2224
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:2792
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"2⤵PID:4604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:4976
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:1296
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:3204
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:4364
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:416
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"2⤵PID:1440
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:3856
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:2892
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:2984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:3392
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:4684
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:4984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:3728
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"2⤵PID:3340
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:4624
-
-
C:\Users\Admin\Desktop\2.exe"C:\Users\Admin\Desktop\2.exe"1⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"2⤵
- Executes dropped EXE
PID:4268
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"1⤵
- Suspicious use of SetThreadContext
PID:4128 -
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4016
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\RevokeUndo.jpeg" /ForceBootstrapPaint3D1⤵
- Suspicious use of SetWindowsHookEx
PID:4856
-
C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe" -ServerName:Microsoft.MSPaint.AppX437q68k2qc2asvaagas2prv9tjej6ja9.mca1⤵
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:292 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 292 -s 42202⤵
- Program crash
PID:1416
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
575KB
MD54facbaab17f633d153a7b53fb483b22f
SHA19e0e7bfbe927b1a77133380a2f76531b9416962a
SHA256c557b766a00fd4ba6950c08c6133c20e4dd800139a19d271d46d6feb31ebf870
SHA51286cccef12998201c28c257204cdcfdd339ac5e65c5d6627ffa6e5d88f57bdd94812dd7f657bbd3b01b88679abe92343496be775f2d7ac1f3d59573a0b696d832
-
Filesize
1.5MB
MD55b3c641fd1b48108810cc12b1971ffc2
SHA10d38bdd2d0654391b4737db591f2f1e19a9d8a3f
SHA256f6c8009319b95d3d94c8858d831563b2568f98dda478b6a784ba5a828374e7fb
SHA5124c2888ad3632bcb9efe06fc15c65c7a0ff9f5382e272ff7402f00a701a8aa3a4d9e467630085dc47fb9735ded898e995af1e6259472f0f4954d77b55f2f8944a
-
Filesize
1.5MB
MD55b3c641fd1b48108810cc12b1971ffc2
SHA10d38bdd2d0654391b4737db591f2f1e19a9d8a3f
SHA256f6c8009319b95d3d94c8858d831563b2568f98dda478b6a784ba5a828374e7fb
SHA5124c2888ad3632bcb9efe06fc15c65c7a0ff9f5382e272ff7402f00a701a8aa3a4d9e467630085dc47fb9735ded898e995af1e6259472f0f4954d77b55f2f8944a
-
Filesize
1.5MB
MD55b3c641fd1b48108810cc12b1971ffc2
SHA10d38bdd2d0654391b4737db591f2f1e19a9d8a3f
SHA256f6c8009319b95d3d94c8858d831563b2568f98dda478b6a784ba5a828374e7fb
SHA5124c2888ad3632bcb9efe06fc15c65c7a0ff9f5382e272ff7402f00a701a8aa3a4d9e467630085dc47fb9735ded898e995af1e6259472f0f4954d77b55f2f8944a
-
Filesize
8.1MB
MD5d6ab0e25b4f76ca11acb71eb290938d5
SHA10269f40ec4936edf9eed2b1065a631dd895776e4
SHA256555b66eabf40ca228d6a285862e622b662a528ffb68aa01a3bb27b4132188de0
SHA5125417a45ef64accfc7fc5b282c089b2046677f74249436ab4112ff5626cd6ffe5e9524012f093faf13eb108199a0c281ed5f5f7feef6a7db38ed1408d10e6039d
-
Filesize
8.1MB
MD5d6ab0e25b4f76ca11acb71eb290938d5
SHA10269f40ec4936edf9eed2b1065a631dd895776e4
SHA256555b66eabf40ca228d6a285862e622b662a528ffb68aa01a3bb27b4132188de0
SHA5125417a45ef64accfc7fc5b282c089b2046677f74249436ab4112ff5626cd6ffe5e9524012f093faf13eb108199a0c281ed5f5f7feef6a7db38ed1408d10e6039d
-
Filesize
3.9MB
MD5591dde57b17d9fcbdbc892cf1a7d3610
SHA11c2c32d101010165c471c6d5b01ef67c3224f6ff
SHA2567d7d55ab604078e69070e2d162d77ee286e2faf748a52401a64f79824cb3b59d
SHA512fc4bb5858a2b568c344a9b419176ed6e239e468c4eec9e76eba5a35c8bc97b5947bf1f7055544c5fd5b4d67d11e1ade5496057168b0fcf53afffc4595fb67bc6
-
Filesize
1023KB
MD5a2fe19b6b766a12017c8be442ad0cef2
SHA19e5bed747e57e7c7141fabe3d9cb12c863d4b2f5
SHA25635b71d192854edc95248f77deb824f034e903447319459aaf454269650fd51d3
SHA5129969acf85432029810cd1eb2f7a65a3bc19d603749ecdcd2301645ad342bfc29d977c067a081a395afea4f9a5d199c982c4374d2fe6a2cedd9ff659af2101c7e
-
Filesize
97KB
MD5947c624c4bd48f8c66fcd00fc0f947d4
SHA15266036308e0d0eb837cc3126dba5a0b6ec270fc
SHA2562e89606775ed719b9d950ae9d37e819a2567426fbe5c3e0aad8d86fec693b67b
SHA5122fd940253eb2c4f9da9ceb9516b811f28bd8187fb3d819a86f0ec37f98c30d0a9b510652b0f615fe15cdcec1bfeff435da7b42407bb29faf2b1d58ce13508fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB
Filesize765B
MD5489604472a0f935f807e6ccee3765d1b
SHA1a22b4f0ffcd3ca2452c19e3b4194cdc9de993eba
SHA2562576697432ef84a598691585cf5f36ed75495c75c6995f8d8034d1ded6e77ada
SHA512bb9ca05d15f2f190e23faf1c4c9a45f162f633f8aa57e64211668af2b6d3cb8024ce98aff422fd692af3b56b411ee0b557d8fa8dc5c9443b1041f50fc9311190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_76733C28E3E87E78CF09C0BB924E316A
Filesize638B
MD55bb3a7b49a37c3779191bd7f47907cef
SHA1e2354bee50a4917196a91802b58ccb8e3134a603
SHA25651f64e03e277e5de8996d01da031719ea9c4ddb20128a1fbe59d516c5b5c2550
SHA51256620afb89f221dcb4e1b634628b412e782131c1e794a1e7c4a21b5456332dc1a1f4b5d9b20ac726df084afa82b1965bdda10e4e5a7ea84caeb03d732104c548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize1KB
MD5cfaf91432a9e1cc792b9b16cc95c44bb
SHA10ae839e74212a994e0b2bcd30a1bb9cf93673b1c
SHA2566c956f216d2c9a6b3f83f129e4fa5798de43a030424e3011a212d190fcf3b0eb
SHA51211f195c5364b5e05ac10338c3f70a0a623370970eac7adf84b34ea87171a8bca379c91fdf12cab5999503efc6dbe7528d80ea1bad45b24f92f34527aeea83546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB
Filesize484B
MD5261c51de4ed03163b1f7c94ff06228b6
SHA145697a123ca9f64f1e9ce85b8f2a9e793ea739ef
SHA25612c3b059f1fa6b9d29c30a5d39feb1bd6cdf1f44f4379710d87b8483ce40e27c
SHA512ad36f404f7e2e175ea1c46739d481070585e9c6686a1d70e318c6b18a317ad1f83d7db71ea9e9222362a64fa967c12913241f8e29da22917d057c81550bffbd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_76733C28E3E87E78CF09C0BB924E316A
Filesize496B
MD574436c05154d1efbe9fb13b7383e4b36
SHA1d0b658327b41d63e96b261e9b17967aa266f821b
SHA256e2c8fb6a10f354e7dad273ee21b5597bcd59a4dad700f2436e6ef0c18dbbc94b
SHA512e6a4ddde76ff40dbb09bd69c2ca76312beec336fea480aeccd116dfc4dd5a16ad75399257ab6f84a42b4f4dcac36c02168551ffff991cde1ac5b8327c401a4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize482B
MD5110023b6773ed6a8adc9eff1aff204cc
SHA10b51f3e99b579130131fba95c8673e6241cd4979
SHA256ed948ec382f4bb67209dd859c1197b6d91adfd80fbd7c5ff13d88eb31d8718ad
SHA5129c148d3b7a84dedee2521faedf866c6e85e455aa4668816e64c29c829078d702e6776586cf2ce71e1e5739fa1c12c7fc734db4916490ac28392f7697bb413c45
-
Filesize
1KB
MD58f4ba7b37890617c43737e431c0f2d3f
SHA199e2aa08b1f5d0dbb4e8ceadfedcc88c433654c5
SHA256fc8a9265c1dbcf55912abdd747c068c7e3c78f0f61a6f29cb71c7f76cab35443
SHA51233209bed5d66a6eb5ba6672565dd2233e7ced50bfd2334b585258d0d8cf2d06aa59972c29745a7f830c2352a3be5e2990b876048153ef8201daa28dda7610fc0
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
1KB
MD5cf4a9af17e1cfc780689730b51e7b2f0
SHA1771461f01328b2342f177b3b4d4421e7af69d2fd
SHA2562364110c09ec5161718a3cc568e6c9cb412ecb019296b957da9e33a57deded97
SHA5122da4c2e9b09db9dd3cca30d158dee56a2bc4a4b481e45203c75e38f115280bd6e3e9f92bd6c7f6b705feaac797332bea4481de2f29da47a6347625ba5b5b162f
-
Filesize
1KB
MD5d820201a513f096dd6f044c40dcdb65e
SHA1365f76e2bf8cbbf45facecb72392b6f6e0b327f6
SHA256200c189ef2338a41fd7cd77df52a01af3bb6c487857c606dffc502fbf7958156
SHA5123963b117beafa4d95c20e0facea782f224afdf650d6087b6a08cf079878119fa7e6e5e12866ddca68368712745ca59f992f58277361cc5fd4ccc0cef316ff701
-
Filesize
1KB
MD582e7f0293933a47b9b31dab54781639e
SHA14196d23a8b9e8701c8b1dcf242ce455972bf7288
SHA25677b3b579ddf462ec637cc4ecca96bfa65cfefaf11a4d1d7f946265ce4eb1f826
SHA5126ed49699bf322142c8d8a04f24d0262b380c7fdef77bc057b1f7accf272e09306a0e9c32e6cd75d77504deae36ca5ba0e90b6b28fe48eac62135ebc8fee76b65
-
Filesize
1KB
MD511212cff17a2889082b1b0246b129da1
SHA100abe0d076349efc78f34d825b75fae6edeac424
SHA2564ac67db98d4a7d507cf73978be33f1bdce041e7e7f1762f45e01e8e191b8c046
SHA5126ff1b1268b87e31af48acf6fcefaa01fb0da023920455cb50d47afc5ad89a71d4abd4da086cc153046894bfd2cf2c25db559fa48328c9c3f380f3dddd58fe440
-
Filesize
10KB
MD51bcc56a28142b1b9fd77ff08292832f2
SHA156505c8e0d33d68de04a0e97f6db5ec886020c13
SHA256f43c369d11ed771375fa842d8f589b7d998fd149620f6392078db45137c6713e
SHA5124e34a28b5820bfc62c534016baec5ddf40c3f38816052728681a1400922c9a5e81f9c8a3d438804b54c5170945fd52f5dc7d5a51227d27749bb9564feca2c4e4
-
Filesize
11KB
MD5a7b2e4eb210a3b3f1719588b171c4fc9
SHA1b4abbed06c6359909f446023628b2cacd71d6655
SHA256f1c57ceb4da62793e1c8da4b01cf868605e94ec52abc24a8d8d8b94006de937e
SHA51244aec844c375ef065233320ca812d3a1552d15c3949320be637aa7491a8fd151d5553423fe86fbb06564c8f9bd6294fd9065639c988a25f2f49e9ffae7cfb536
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hret3y5j.default-release\startupCache\scriptCache-child.bin
Filesize710KB
MD5697e5dd4205a9c8230745960ba0210bf
SHA196cd1f59ae30d77b507f96999a4a1ca8503d0aea
SHA256a9d07c845a75cb7790b6ec3ac78cee1c2048f17887cfd339ed1bebab8bc319c1
SHA512b160142fb317a0fa55b58934c8c11a9deeb7255582ffd1a440fa3bcf8eee8d8fb82e677123b4fdaf54be41ea01ffdcf7d605b7b8bbfbeb1110b1e66e4193192b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hret3y5j.default-release\startupCache\scriptCache.bin
Filesize6.7MB
MD52aae05bf198a488a0642e270c61f01bc
SHA160bcab0a428636cdbba90994969a98ad6b42c6b7
SHA256afc271d0bfe66e8b29cd79351520e383a593da9a12136398aadeb8f965d13483
SHA5129f71c498371731bea4382b00c641ab7d9c33d3433f4fdf7c840142f4319efb66b555407df6cae57207f1ba1d55b544f28e5644d19ece1ee65b0e549f9f1b306d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hret3y5j.default-release\startupCache\startupCache.8.little
Filesize1.9MB
MD560922182c228495fedd67be2e3726e10
SHA1e7d17e98d81d457e75e50012e2e33d1edef11604
SHA2560830e7bf3c9f5562b48973685b7763c497d40939de4bc924d159763156bcdd96
SHA51217ba38b7a149c864eb7be510b2de3036a52e6db3a9e6ed8b6b8aa3547f9c27912a8131c712918626ffa28e818cd9e9c1203294fe32e29d494a011713d1a022df
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hret3y5j.default-release\startupCache\urlCache.bin
Filesize1KB
MD553448ff0f2e62dfbf1e039024f97222a
SHA1bc505757ccf3521f2e299333326957207e39e7c3
SHA2564dccea4b0e53cbde64b3a793430f2b748a10c858149b1d8e8c0f5d457f22f0be
SHA512f1aee6011a5988e7a15aa268bad96ba2e5079ab11fd2eb15335ee9ee79348206bb6b237905da231f3b40571ab9ec992d55c69cd5db5985efb1eebd8e10884eb1
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
224KB
MD54275bff433ae0f1397dd932d348835e7
SHA1840a709b2e7367ff4464dfe3f5fbe517d767c09a
SHA2563bb9e381b74ff153f676a7de429a9872ee7460e208f99e084b0ec5a4a8dee1e6
SHA512d445c01997a4e6f3a1bf53f9f0dfd327e72681f37498f04ecafa629cb7f1c300b7d05c7aa603dd90c1d474e1ca09ece48379ee76ea2f88d47fb5f40c51af8a1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hret3y5j.default-release\SiteSecurityServiceState.txt
Filesize1KB
MD5ac85672b7f231d0cf8c57e324ff3e5d9
SHA106ef193f39b1b90ef1ed09579505feea40bb6a3c
SHA25649e5e4da2092aa48693de78dbf459b5b4de0ef838805efd1ec998a7004439c01
SHA512491467446afcbe247ee5f118698f6d9b77d8a61a14cf220025b724252a292ba800b184c58c7e4e3165611590a140bc5b7ae66618216d9e3a0841b0193db6c7a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hret3y5j.default-release\addonStartup.json.lz4
Filesize1KB
MD5bc4bd0071af0574fe57b6756f0b26071
SHA1dfc6af6b87b58391f67679a24c28495503f9e75d
SHA2562f0cb964330decccb1375985d126d6cd2fec171e344cdd6e21026fa9459d8ad3
SHA5129cd3f9140a3beca18114253556281c48e0a2401d8e7bb01b518a0615caf6a1f4a8cece627c00caaf9cb3f7cf3a57a224ec5233682b5b3f8e933619b85488551d
-
Filesize
381B
MD5ddd547a9822aa5fbfb096d3408f7fd08
SHA1c78dd57ac93644040da9125dc1e43e6d5d35b5d4
SHA256cd24b02d93961e45e8171c74dd69b00bd14b348324753c2e4372f481b8c19c6e
SHA5120d55c1440e8ff26affda1337004bcffa586063593c32679d6d8c94d8ad04852877352425c987c55021b9eefcbdd8d75c3675fd44a65efd4bb9b1e577fc675280
-
Filesize
512KB
MD56e342629ceb8774ea1ef47fab304421f
SHA1227f7b51567df973038964ce1dafa472e8b8f1e4
SHA256a9b14d22ccaf533f8aa7f8bac220488ee988f66fc713b841134c6af36b33b0fc
SHA5121cc19f20831d30886b85f0f0131b536151f78aea13494cdcb48126c3c98c6000fb42198cd55aab3c9e9ee7db7d28c1ad83b0492319d8cb19d8b23a1632ed9669
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hret3y5j.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hret3y5j.default-release\gmp-widevinecdm\4.10.1582.2\manifest.json
Filesize373B
MD569236425227c0bd3e5c21034285822e8
SHA12dd63dd2c47e00a536fade01d3a7cea26c2305ec
SHA256e328dfab8c729a9398506cc3e29fcc0342f72298d54f476f33c9b352e84c10b7
SHA512738b0bbbfa01b2fe8b987026860c22f3593d19d605a76683161cc5c18237440344dce0c16ba07b80953ab03885f06efa2d96a334461ee7acda76506df6a22ae9
-
Filesize
96KB
MD5815e95a43fcba8065fcfa02b30f9591c
SHA1eb0df07e210a61afc5c19b155e9be23ae86c0cb3
SHA25652bbea1cb3f31d0f1beae256192125ed6cda10f8f1cd2552f504da60b78821d2
SHA5121f20fb08386c28b2fce78d7343caf44aaf2817fcf7ea167563039ebad37a11ad91fee3aaa322e49d38c7be31448f080cbb07650c6ba36a261f7a3ce606265d8c
-
Filesize
5.0MB
MD5170189243054b50235ada1d09d49ca8e
SHA18169e29ee278107b7f3c199088867ce5f43659a4
SHA25605e0740d7b0fc5c098340843ebad07f60c2c9f9cc36c493d9fc224f3091f7a7a
SHA512a79b0053dd03ae223eb6ecb0fa0ffc5c4b5359beee44f85afb1fd261d47c6f284d2484a81ff8e198429e4b76299d5e74d3a5064357e36a12b187e8f25929933e
-
Filesize
8KB
MD549ad8ae8265fb0ca4d3721dbad02fc82
SHA177d852f35aaa286c28fea988fcc6b0b2948edab4
SHA25644762d7e3f92afb525333e4614522660be9d3a080e0ca32e382330b4b1774594
SHA512d08cdb4401d5b410d57b2b7deb20a89d2c985b2b186a375bb8280a0e4f66b2b2fbd76ed3cd6c6363af2b943ea70c7be708d66f9a5a12085b95670ba2d60d0236
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hret3y5j.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize13.0MB
MD55e97436cdab60ad3f553e04ba8af6ef3
SHA1949941299438c718543502e36d98993d83b17808
SHA25645376bd9ad12597336bdec53d65fbd460f2512b48cede1f3390f830bbfe26929
SHA5126def1206c59528d0a920fdfdde5d36a8605ae14576a3e60325b73d83d47a4f9c3e0e7cb48642bc7a5475146b366d3e243f5927f8ff17730a19ba4bc97c94d607
-
Filesize
266B
MD5184c4c84246295dff099a6b0434dee2f
SHA1c1883843452d391f35f2e69dc75574d1c24cae16
SHA2567687ace3af2d4f618ed7cba9bb366c18a787c09acc8049a6e6d03c025cc95797
SHA5125fd57819014871de8dad24bd3087624f541d114f84ee0db517f875a1422f8b9a1020c02141dd6691b6d7231b5d7609908fd7f537a47f1cd55586a9e5e234f2e6
-
Filesize
10.4MB
MD5da7e08ef168ee4662ff1878202303a36
SHA1df3bc617162a0f5f5e854403f5dc1e00e093e498
SHA256ed9e8f5fda10a14fbce76252b111a031bc4f3351e9eb342ea4edf6b6d16add69
SHA512bd248c68077a6aa1d6120cd3401770b09762cd75010a30b40cdd46196c726bce2fffa9036a2e3f47bbdbe4b935b9252c7ea38f4947d5ef187831d274a13b8974
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
25.0MB
MD505a3fce0c8109dc00a78b1d35e39df8f
SHA1193016af5a0d3dd4df3900fbfa75cb15c0cd8bb6
SHA256bac912fea1ab51bcab2b876cfa500f30faf93b621f83fb583c957d98dccf78fb
SHA5120dab05ee88a70df9c2cbb178b6d628074bcff6530a200f7204d3d461a01c90d40f82298cdb8d632a756ab9f74b150571f06bffe8c2177017378600466eb1b0eb
-
\??\Volume{420c8c0f-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{23865cd5-dd08-4d48-8dfd-a22335e48544}_OnDiskSnapshotProp
Filesize5KB
MD59621930d296f792425118ba3cc9e0d86
SHA1d8be6531fdd09e6521260c1f53515d260294ec92
SHA2565a9360ba989bb558d9efc91569ed00a4efd52b0752d738d41c4416a8aacdcfbb
SHA5120d867046dd02c24b016ac29905cc0f07171b7723f475a5211c87e40c36347206a327c9d354248419a523b49c68a9344d32abc04484df934e43c51f9742145a7b
-
Filesize
575KB
MD54facbaab17f633d153a7b53fb483b22f
SHA19e0e7bfbe927b1a77133380a2f76531b9416962a
SHA256c557b766a00fd4ba6950c08c6133c20e4dd800139a19d271d46d6feb31ebf870
SHA51286cccef12998201c28c257204cdcfdd339ac5e65c5d6627ffa6e5d88f57bdd94812dd7f657bbd3b01b88679abe92343496be775f2d7ac1f3d59573a0b696d832
-
Filesize
575KB
MD54facbaab17f633d153a7b53fb483b22f
SHA19e0e7bfbe927b1a77133380a2f76531b9416962a
SHA256c557b766a00fd4ba6950c08c6133c20e4dd800139a19d271d46d6feb31ebf870
SHA51286cccef12998201c28c257204cdcfdd339ac5e65c5d6627ffa6e5d88f57bdd94812dd7f657bbd3b01b88679abe92343496be775f2d7ac1f3d59573a0b696d832
-
Filesize
3.9MB
MD5591dde57b17d9fcbdbc892cf1a7d3610
SHA11c2c32d101010165c471c6d5b01ef67c3224f6ff
SHA2567d7d55ab604078e69070e2d162d77ee286e2faf748a52401a64f79824cb3b59d
SHA512fc4bb5858a2b568c344a9b419176ed6e239e468c4eec9e76eba5a35c8bc97b5947bf1f7055544c5fd5b4d67d11e1ade5496057168b0fcf53afffc4595fb67bc6
-
Filesize
1023KB
MD5a2fe19b6b766a12017c8be442ad0cef2
SHA19e5bed747e57e7c7141fabe3d9cb12c863d4b2f5
SHA25635b71d192854edc95248f77deb824f034e903447319459aaf454269650fd51d3
SHA5129969acf85432029810cd1eb2f7a65a3bc19d603749ecdcd2301645ad342bfc29d977c067a081a395afea4f9a5d199c982c4374d2fe6a2cedd9ff659af2101c7e
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627