Analysis
-
max time kernel
2639s -
max time network
2524s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06-02-2023 17:24
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10-20220901-en
General
-
Target
sample.html
-
Size
735KB
-
MD5
38bdfb6524cd50986edfd56767b0cbb7
-
SHA1
52ce42056d55ec46f9172bc06a6c9970eccc8205
-
SHA256
108362642bb9fac45815b85a7020421d95f7c14496b502ebca0d39014be5dd01
-
SHA512
7ee8c541bacfb5857b80afbb9c559b9eeb02745f90d22d3a58bc8ce17fcdcfecf83a85c6d4a0ee9a8ae314b8d3a66c7d64791d66d0b597384495c87047bf4876
-
SSDEEP
6144:XCMMxjMxbMx0MxHMxrMxmMxlMxxghm92KGh3xGGjPQUaUmsnIzwOyw2hWTkDMb7V:X9MhM1MSMNMxM4MHMXQ0b2g
Malware Config
Signatures
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 3 IoCs
Processes:
file_shredder_setup.exefile_shredder_setup.tmpShredder.exepid process 4620 file_shredder_setup.exe 2788 file_shredder_setup.tmp 5044 Shredder.exe -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exepid process 560 regsvr32.exe 560 regsvr32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{736AF091-C361-49B4-A928-87C586130D33}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{736AF091-C361-49B4-A928-87C586130D33}\InprocServer32\ = "C:\\PROGRA~1\\FILESH~1\\fsshell.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{736AF091-C361-49B4-A928-87C586130D33}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
Shredder.exeexplorer.execmd.exefile_shredder_setup.tmpdescription ioc process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini Shredder.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini explorer.exe File opened for modification C:\\Windows\WinSxS\AM9DBE~1.0_N\Desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM4B40~1.0_N\Desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM7077~1.0_N\desktop.ini cmd.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$R86KA62\Saved Pictures\desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RKBSE5R\desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RYIFABU\desktop.ini Shredder.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini Shredder.exe File opened for modification C:\\Windows\WinSxS\AM6020~1.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM0935~1.0_N\Desktop.ini cmd.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RGLX0J1\desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RGRXJ1B\desktop.ini Shredder.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Shredder.exe File opened for modification C:\\Windows\WinSxS\AM7BFB~1.0_N\desktop.ini cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini Shredder.exe File opened for modification C:\\Windows\WinSxS\AMD7B5~1.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AMDDAD~1.0_N\Desktop.ini cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Shredder.exe File opened for modification C:\\Windows\WinSxS\AM4D7C~1.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AMA4BE~1.0_N\Desktop.ini cmd.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Windows\Start Menu\Programs\Maintenance\Desktop.ini Shredder.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$R86KA62\Camera Roll\desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RCK8VV4\desktop.ini Shredder.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI Shredder.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Shredder.exe File opened for modification C:\\Windows\WinSxS\AM6528~1.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM0683~1.0_N\desktop.ini cmd.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini file_shredder_setup.tmp File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$R86KA62\desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Shredder.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini Shredder.exe File opened for modification C:\\Windows\WinSxS\AM1C0B~1.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM59AD~2.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM9F84~1.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM11AF~1.0_N\Desktop.ini cmd.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Internet Explorer\Quick Launch\desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Windows\Start Menu\Programs\System Tools\Desktop.ini Shredder.exe File opened for modification C:\\Windows\WinSxS\AM3D76~1.0_N\Desktop.ini cmd.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Windows\Start Menu\Programs\Accessibility\Desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Windows\Start Menu\Programs\Startup\desktop.ini Shredder.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini Shredder.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Shredder.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Shredder.exe File opened for modification C:\\Windows\WinSxS\AM664C~1.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM4552~1.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM63CB~1.0_N\Desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM4F04~2.0_N\desktop.ini cmd.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTZ4UQI\desktop.ini Shredder.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini Shredder.exe File opened for modification C:\\Windows\WinSxS\AM4CF3~1.0_N\Desktop.ini cmd.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Windows\AccountPictures\desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Windows\Libraries\desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Shredder.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RXKNCDV\desktop.ini Shredder.exe File opened for modification C:\\Windows\WinSxS\AMDE56~1.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM2B68~1.0_N\desktop.ini cmd.exe File opened for modification C:\\Windows\WinSxS\AM690B~1.0_N\desktop.ini cmd.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Windows\Start Menu\Programs\desktop.ini Shredder.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Shredder.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-2368682536-4045190062-1465778271-1000\desktop.ini explorer.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2368682536-4045190062-1465778271-1000\$RTD46PN\Windows\SendTo\Desktop.ini Shredder.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exeexplorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
cmd.execmd.exedescription ioc process File opened for modification C:\\Windows\BITLOC~1\autorun.inf cmd.exe File opened for modification C:\\Windows\BITLOC~1\autorun.inf cmd.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Shredder.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxCalendarBadge.scale-400.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-96_altform-unplated.png Shredder.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ko-kr\PlayStore_icon.svg Shredder.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_zh_CN.jar Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\PremiumEdition_PopUp2.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\5311_48x48x32.png Shredder.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\WindowsFormsIntegration.resources.dll Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\Assets\toast.scale-200.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\Images\Ratings\Yelp10.scale-200.png Shredder.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\PPKLite.api Shredder.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\UIAutomationTypes.dll Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.StarClub\Assets\Stripes\NewCollection.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\HowToPlay\Spider\Goal_1.jpg Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\SharpDXEngine\Rendering\Shaders\Builtin\HLSL\LightedTextured.fx Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-20.png Shredder.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\micaut.dll Shredder.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup-impl_zh_CN.jar Shredder.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Retail-ppd.xrm-ms Shredder.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\sv-se\ui-strings.js Shredder.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\Microsoft.Build.Engine.resources.dll Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\1251_40x40x32.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2017.125.40.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-80_altform-unplated_contrast-white.png Shredder.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_OEM_Perp-ppd.xrm-ms Shredder.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\EssentialResume.dotx Shredder.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_dummy_plugin.dll Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\starttile.dualsim1.sad.scale-150.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNotebookMedTile.scale-150.png Shredder.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\msjet.xsl Shredder.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libmagnify_plugin.dll Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\Attribution\weatherdotcom.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_11.19.19003.0_x64__8wekyb3d8bbwe\Assets\xbox_windows_logo-01.png Shredder.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\RHP_icons_2x.png Shredder.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\msader15.dll.mui Shredder.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_yuy2_plugin.dll Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\SmallTile.scale-100.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\xj_16x11.png Shredder.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Bears.htm Shredder.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libremap_plugin.dll Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Solitaire.exe Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\to_60x42.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2017.125.40.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.contrast-black_targetsize-48.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-36.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1612.10312.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubWideTile.scale-125_contrast-black.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\LargeTile.scale-125.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Advertising.Xaml_10.0.1605.0_x64__8wekyb3d8bbwe\Microsoft.Advertising.dll Shredder.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\es-es\PlayStore_icon.svg Shredder.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_newfolder-default.svg Shredder.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_sortedby_18.svg Shredder.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msvcr120.dll Shredder.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailAppList.targetsize-64.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\BackgroundAudio.winmd Shredder.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\UIAutomationClient.resources.dll Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Emoticons\large\sweating.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\FacebookLoginButton.xbf Shredder.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hr-hr\ui-strings.js Shredder.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-text.xml Shredder.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Sort\AUTHOR.XSL Shredder.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\MSHY7ES.DLL Shredder.exe File opened for modification C:\Program Files\SelectConnect.wm Shredder.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\en-gb\outlook_whatsnew.xml Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreMedTile.scale-200.png Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SmsIntercept.winmd Shredder.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\osfproxyimm.dll Shredder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1160 1784 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 52 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
SearchUI.exeSearchUI.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c6b09bfecd0a5e47acfb903783e50a1e00000000020000000000106600000001000020000000d2cbf845515aeaed8aaf40da37fc34937b67703833c08f62c94c26c2ffc77049000000000e800000000200002000000050c7d7fc79f8f473f141f6f29e326431b4b3fea3229fd4ba20b9b9f79a99cef3200000000d9bea31f7c1f88ba88037eb12e71b8209a7310f3c36fe3300429f8d901f712f40000000b9a43addf77611fa7998579e69500e822defacf6bcb1eb95e55d6a66878c5a2fcd7e311f0d8405067846848e9d42eddfe5bfd6ac158fd0d5b374137cdda4cdb3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ca7702503ad901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31013455" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4046066014" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "121" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31013455" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "8666" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{1C39466A-A643-11ED-9424-42569F8D2136}.dat = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "197" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4046066014" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "121" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "121" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4055506112" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31013455" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c6b09bfecd0a5e47acfb903783e50a1e0000000002000000000010660000000100002000000060c43520d4ddb9e0603dc0fbd234a5662aa326d1571d236b78c02bb31bf1bf52000000000e8000000002000020000000acb87340ec9de42c63f977fae444046d2265f95eb83d373d0c79e1e68e8abb0820000000f66e7471e1b2245b34b4692b1c7eefd7e421900e2557e31cbad74ce9d15b10f44000000059d78a4255f38f64cbb0a94930eb73c1aa2b4cb41419711817340244060913b338756f354918f389a6159e85cdf706ba493d462468f74d5e878fe646cafbeb75 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "382517829" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31013455" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C394668-A643-11ED-9424-42569F8D2136} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "115" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" IEXPLORE.EXE -
Modifies registry class 64 IoCs
Processes:
explorer.exeSearchUI.exeSearchUI.exeregsvr32.exeexplorer.exeShredder.exeregedit.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202020202020202020202020202020202020202020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{736AF091-C361-49B4-A928-87C586130D33} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{736AF091-C361-49B4-A928-87C586130D33}\ = "Delete Files" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\fsshell.SxContextMenu1\ = "Delete Files" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 010000000200000000000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\fsshell.SxContextMenu1\Clsid regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\fsshell.SxContextMenu1\Clsid\ = "{736AF091-C361-49B4-A928-87C586130D33}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Shredder.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{736AF091-C361-49B4-A928-87C586130D33}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{736AF091-C361-49B4-A928-87C586130D33}\ProgID\ = "fsshell.SxContextMenu1" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202020202020202020202020202020202020202020202 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\runas\command regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\runas\command\IsolatedCommand = "cmd.exe /c takeown /f \"%1\" /r /d y && icacls \"%1\" /grant administrators:F /t" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{736AF091-C361-49B4-A928-87C586130D33}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{736AF091-C361-49B4-A928-87C586130D33}\InprocServer32\ = "C:\\PROGRA~1\\FILESH~1\\fsshell.dll" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133065238422491118" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\runas regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\fsshell.SxContextMenu1 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\runas\command\IsolatedCommand = "cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\runas\ = "Take Ownership" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AllFileSystemObjects\shellex\ContextMenuHandlers\DeleteFiles regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\DeleteFiles\ = "{736AF091-C361-49B4-A928-87C586130D33}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133065238422491118" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\runas\ = "Take Ownership" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Shredder.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\runas\NoWorkingDirectory regedit.exe -
NTFS ADS 3 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\file_shredder_setup.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\AppData\Local\Temp\Take Full Ownership of Files - Folders Context Menu.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\AppData\Local\Temp\advancedrun.zip:Zone.Identifier firefox.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 4616 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exepid process 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4812 AdvancedRun.exe 4812 AdvancedRun.exe 4812 AdvancedRun.exe 4812 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4860 AdvancedRun.exe 4860 AdvancedRun.exe 4860 AdvancedRun.exe 4860 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 1452 AdvancedRun.exe 1452 AdvancedRun.exe 1452 AdvancedRun.exe 1452 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 3968 AdvancedRun.exe 3968 AdvancedRun.exe 3968 AdvancedRun.exe 3968 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 2160 AdvancedRun.exe 2160 AdvancedRun.exe 2160 AdvancedRun.exe 2160 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 2168 AdvancedRun.exe 2168 AdvancedRun.exe 2168 AdvancedRun.exe 2168 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4140 AdvancedRun.exe 4184 AdvancedRun.exe 4184 AdvancedRun.exe 4184 AdvancedRun.exe 4184 AdvancedRun.exe 4996 AdvancedRun.exe 4996 AdvancedRun.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Shredder.exeexplorer.exepid process 5044 Shredder.exe 2208 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
firefox.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exewhoami.exetakeown.exeexplorer.exedescription pid process Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 4140 AdvancedRun.exe Token: SeImpersonatePrivilege 4140 AdvancedRun.exe Token: SeDebugPrivilege 4812 AdvancedRun.exe Token: SeImpersonatePrivilege 4812 AdvancedRun.exe Token: SeImpersonatePrivilege 4140 AdvancedRun.exe Token: SeDebugPrivilege 4860 AdvancedRun.exe Token: SeImpersonatePrivilege 4860 AdvancedRun.exe Token: SeImpersonatePrivilege 4140 AdvancedRun.exe Token: SeDebugPrivilege 1452 AdvancedRun.exe Token: SeImpersonatePrivilege 1452 AdvancedRun.exe Token: SeImpersonatePrivilege 4140 AdvancedRun.exe Token: SeDebugPrivilege 3968 AdvancedRun.exe Token: SeImpersonatePrivilege 3968 AdvancedRun.exe Token: SeImpersonatePrivilege 4140 AdvancedRun.exe Token: SeDebugPrivilege 2160 AdvancedRun.exe Token: SeImpersonatePrivilege 2160 AdvancedRun.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeImpersonatePrivilege 4140 AdvancedRun.exe Token: SeDebugPrivilege 2168 AdvancedRun.exe Token: SeImpersonatePrivilege 2168 AdvancedRun.exe Token: SeImpersonatePrivilege 4140 AdvancedRun.exe Token: SeDebugPrivilege 4184 AdvancedRun.exe Token: SeImpersonatePrivilege 4184 AdvancedRun.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 4996 AdvancedRun.exe Token: SeImpersonatePrivilege 4996 AdvancedRun.exe Token: SeDebugPrivilege 4924 AdvancedRun.exe Token: SeImpersonatePrivilege 4924 AdvancedRun.exe Token: SeImpersonatePrivilege 4996 AdvancedRun.exe Token: SeDebugPrivilege 904 AdvancedRun.exe Token: SeImpersonatePrivilege 904 AdvancedRun.exe Token: SeDebugPrivilege 2352 AdvancedRun.exe Token: SeTcbPrivilege 2352 AdvancedRun.exe Token: SeDebugPrivilege 1304 whoami.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeTakeOwnershipPrivilege 3864 takeown.exe Token: SeTakeOwnershipPrivilege 3864 takeown.exe Token: SeTakeOwnershipPrivilege 3864 takeown.exe Token: SeTakeOwnershipPrivilege 3864 takeown.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeDebugPrivilege 96 firefox.exe Token: SeShutdownPrivilege 2208 explorer.exe Token: SeCreatePagefilePrivilege 2208 explorer.exe Token: SeShutdownPrivilege 2208 explorer.exe Token: SeCreatePagefilePrivilege 2208 explorer.exe Token: SeShutdownPrivilege 2208 explorer.exe Token: SeCreatePagefilePrivilege 2208 explorer.exe Token: SeShutdownPrivilege 2208 explorer.exe Token: SeCreatePagefilePrivilege 2208 explorer.exe Token: SeShutdownPrivilege 2208 explorer.exe Token: SeCreatePagefilePrivilege 2208 explorer.exe Token: SeShutdownPrivilege 2208 explorer.exe Token: SeCreatePagefilePrivilege 2208 explorer.exe Token: SeShutdownPrivilege 2208 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
iexplore.exefirefox.exefile_shredder_setup.tmpexplorer.exeexplorer.exepid process 1616 iexplore.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 2788 file_shredder_setup.tmp 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
firefox.exeexplorer.exeexplorer.exepid process 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 2208 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
Processes:
iexplore.exeIEXPLORE.EXEfirefox.exeShredder.exeSearchUI.exeSearchUI.exepid process 1616 iexplore.exe 1616 iexplore.exe 4928 IEXPLORE.EXE 4928 IEXPLORE.EXE 4928 IEXPLORE.EXE 4928 IEXPLORE.EXE 1616 iexplore.exe 1616 iexplore.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 96 firefox.exe 5044 Shredder.exe 4288 SearchUI.exe 4628 SearchUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exefirefox.exefirefox.exedescription pid process target process PID 1616 wrote to memory of 4928 1616 iexplore.exe IEXPLORE.EXE PID 1616 wrote to memory of 4928 1616 iexplore.exe IEXPLORE.EXE PID 1616 wrote to memory of 4928 1616 iexplore.exe IEXPLORE.EXE PID 2144 wrote to memory of 96 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 96 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 96 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 96 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 96 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 96 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 96 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 96 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 96 2144 firefox.exe firefox.exe PID 96 wrote to memory of 1596 96 firefox.exe firefox.exe PID 96 wrote to memory of 1596 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 2936 96 firefox.exe firefox.exe PID 96 wrote to memory of 3120 96 firefox.exe firefox.exe PID 96 wrote to memory of 3120 96 firefox.exe firefox.exe PID 96 wrote to memory of 3120 96 firefox.exe firefox.exe PID 96 wrote to memory of 3120 96 firefox.exe firefox.exe PID 96 wrote to memory of 3120 96 firefox.exe firefox.exe PID 96 wrote to memory of 3120 96 firefox.exe firefox.exe PID 96 wrote to memory of 3120 96 firefox.exe firefox.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="96.0.9809577\800852151" -parentBuildID 20200403170909 -prefsHandle 1560 -prefMapHandle 1552 -prefsLen 1 -prefMapSize 219987 -appdir "C:\Program Files\Mozilla Firefox\browser" - 96 "\\.\pipe\gecko-crash-server-pipe.96" 1636 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="96.3.1524467948\1943736211" -childID 1 -isForBrowser -prefsHandle 2216 -prefMapHandle 2212 -prefsLen 156 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 96 "\\.\pipe\gecko-crash-server-pipe.96" 2228 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="96.13.1055825791\389898524" -childID 2 -isForBrowser -prefsHandle 3444 -prefMapHandle 3440 -prefsLen 6938 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 96 "\\.\pipe\gecko-crash-server-pipe.96" 3456 tab3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe" /SpecialRun 41a9d8 41402⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe" /SpecialRun 41a9d8 41402⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe" /SpecialRun 41a9d8 41402⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe" /SpecialRun 41a9d8 41402⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe" /SpecialRun 41a9d8 41402⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exe"cmd.exe"2⤵
- Drops desktop.ini file(s)
- Drops autorun.inf file
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe" /SpecialRun 41a9d8 41402⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\winver.exe"winver.exe"2⤵
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe" /SpecialRun 41a9d8 41402⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe" /SpecialRun 41a9d8 49962⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe" /SpecialRun 41a9d8 49962⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe"C:\Users\Admin\Documents\advancedrun\AdvancedRun.exe" /SpecialRunSystem 41a9d8 49962⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"3⤵
- Drops autorun.inf file
-
C:\Windows\SysWOW64\whoami.exewhoami4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Downloads\file_shredder_setup.exe"C:\Users\Admin\Downloads\file_shredder_setup.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-9COGL.tmp\file_shredder_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-9COGL.tmp\file_shredder_setup.tmp" /SL5="$80214,1918638,140800,C:\Users\Admin\Downloads\file_shredder_setup.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\File Shredder\fsshell.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files\File Shredder\Shredder.exe"C:\Program Files\File Shredder\Shredder.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\Documents\Take Full Ownership of Files - Folders Context Menu\Add Take Ownership to Context menu.reg"1⤵
- Modifies registry class
- Runs .reg file with regedit
-
C:\Windows\system32\cmd.exe"cmd.exe" /c takeown /f "C:\Windows" /r /d y && icacls "C:\Windows" /grant administrators:F /t1⤵
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows" /r /d y2⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1784 -s 107561⤵
- Program crash
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops desktop.ini file(s)
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\3a241c952e5c4dd3ba5362b101235df9 /t 4824 /p 22081⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\File Shredder\Shredder.exeFilesize
2.3MB
MD563eb7f173f4142c6152516141a5ae028
SHA1bce359a87280b468ab2e7e94f2255ac22033026f
SHA256603e3efa9635e18ef41dc9ed0a389485acfbfb00275a21c57a61beb9591635a6
SHA512fa0e7b3cead0d728463f8e95bf042c4f998e4c3f9e6f1102705dd5954deffe0bc38c165dcdb768ab881b1cb193087edccf7563b66f1805f213f258cf763494d7
-
C:\Program Files\File Shredder\fsshell.dllFilesize
2.6MB
MD502860c8c4fce4422f70ea813ad8755ab
SHA133c09f19be0e673f856bd8fb8bd4e8674b216987
SHA2560a8e1467a7cfe8f50a604946e04d238fae314fde6ccc6cbb347d72c2d13fb7fc
SHA5123e3251778dc4400de7f93b60100b8322913c2f136e6218ea7f0097a447545e42fa47a95f8826dd6be953b3933330d132724ca75a03886cec8587ed8136e1d430
-
C:\Users\Admin\.oracle_jre_usageMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\LocalLowMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5aee722fcdc90fcfba473126bf8bed12b
SHA1df62a695b671a248b19f76cd6d420d1bcee9c27d
SHA256e759250bcfe36a1a745bc1cc241dea84b6c791141e93b322bd5027d62d3a4807
SHA512e51c09b66f06f247289841147cc6ebf2b70308cfac2c500915ed2b4775813e48422e60779e50351ac668bab548afaccb822a1486ae8242bc37697f16f3a994cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD525dcc9e1d9c9a8a92d1e68b195b3503e
SHA10ad8bbf868d1eb7cfa5d6a21eb3ee04a220d3132
SHA2565b1eeab1e2b7733b99d9fa4821f4b15e4e8815a89bbbf979f9d47b00c34d022c
SHA5123e9d838189634d7a203f7b9893249cb0b11e733168b4bd4d96b08877175689c73638269b0adc64243210f84185f83b5b81d4a08f9628f5f56705ee5dfc54c242
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5R8EIYMD.cookieFilesize
606B
MD5808db3b034a804014c2a4ef13ae68012
SHA1f5542ed9b46d73e832e8ffd046c0bc1859fb3d9f
SHA2563e492e41a2a97b5715f958c2d8f87a1f5a962ac074119e2e7f55725df86fd5b6
SHA512b9580eff657a921c25c0ed42c2c8b18dac4c5217ac2281d7d3b6e6d9ce9da715d8048029f0b1166c0582dd649e2f38dc4c2b22e15dd9420da741a39d6e125403
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\6EUGQDAS.cookieFilesize
174B
MD5e122abebe7ce5cf7f4db4f3d97993692
SHA1e969255dcf2cc29221fcc9e6a6a3bc5746b5d8a4
SHA2562c251f5318bb87271ea18ca78a67a3789490eb77b21b2820dd75dea1ab7c39c3
SHA512e8a8d5e321b0c259fa5be1053ffa1d16c4ea367987b9cdd60a884a9eaf7c5e3519fc07b9aeaeed8f3ac839ba516a7e3e9343cebd2f252c4435f71b69bc716fbe
-
C:\Users\Admin\AppData\Local\Temp\is-9COGL.tmp\file_shredder_setup.tmpFilesize
1.1MB
MD5f0a190bc6334030beb09f5ccc19d72f8
SHA184a2aa2ccd98524c958c8faeaf12d13da948d333
SHA25614278f7f7d5ed510f51d59d914eca6fe2dde6a51b86fa649d1661372680830bf
SHA51262b7e9de414becbdcb93ba256e7bc94a91ac0e22aefd33af7c8f30894bb8fcf5232d33f71f94011c362c4df70128e7e3ac888a7b0a799b0fdf40f0c2769b7524
-
C:\Users\Admin\AppData\Local\Temp\is-9COGL.tmp\file_shredder_setup.tmpFilesize
1.1MB
MD5f0a190bc6334030beb09f5ccc19d72f8
SHA184a2aa2ccd98524c958c8faeaf12d13da948d333
SHA25614278f7f7d5ed510f51d59d914eca6fe2dde6a51b86fa649d1661372680830bf
SHA51262b7e9de414becbdcb93ba256e7bc94a91ac0e22aefd33af7c8f30894bb8fcf5232d33f71f94011c362c4df70128e7e3ac888a7b0a799b0fdf40f0c2769b7524
-
C:\Users\Admin\AppData\Roaming\AdobeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\ApproveEnable.mhtFilesize
302KB
MD59bb61d7679396e38e4dc287cdf45b0ea
SHA1c74433e1ef2d2dfc691e5fb81aa218c3619cc3d8
SHA25624f67a4f7887b523ffaecb87dc4a414ea4fc2a84bf521eac4ac477622481c986
SHA512d0dc0df8ac13474f623dbe0996369aa3b125d54dca8d8f0a473f68a51e7a53f9431914a26c3f80891a619f0271bf396dcfa1c94b744f14d0ddd9b954f3692689
-
C:\Users\Admin\AppData\Roaming\AssertSwitch.dotmFilesize
1.0MB
MD52a038eb5c2fde2d9d828a0ff527fd1ae
SHA10e45a3e6793c1f2bc1144779232a103f4f2b8e37
SHA25643c3b1f4f90b8de4d47f9ed994b4720c66867c8f11030758236cf7b0079925ba
SHA512f8ed4e826cbbfbb4b94efe3e329377374aeb4f32aa45aa53ad1c5689a2edaea6469346c3d227013c8be88112386c734a33321562fc3ba88f1a7fbdba54e8a68a
-
C:\Users\Admin\AppData\Roaming\BackupWrite.mpeFilesize
749KB
MD526e01b935eaddcdd6ed6c66133352705
SHA19a866d65270af136a2955a9000a53e51a7343c93
SHA256a5e5f63e5ae78b98e4bf243ee2e4146edd4740282ebc9fbe0ee8aa9066b4f385
SHA51266ee1eb39ad62f4be34f66359ed5d6b199bc71d3b85dc2230a65425db436bad8c36628bfe9105cf7c5ff02b75b9310c61092775b514381c1622a3631ae9212a7
-
C:\Users\Admin\AppData\Roaming\CheckpointSend.isoFilesize
430KB
MD52dc1bf0afd3cc75ad6ebff59d782569b
SHA1256e375aff7c51184f75eb932a4c2b99793ca200
SHA256ab66c2fd8c7ebf4dae5837c7fdf878666ffa2564ecdf1130dffeefc6d97937d1
SHA512a8dacfeaa77ae7aa93612c5618ba7dddc2534372442a82a668aef063b551f92485affa3eed4f516bbedca375d5df66b221489d5b925d8cf96d55256d3544832c
-
C:\Users\Admin\AppData\Roaming\EnableSend.wmaFilesize
733KB
MD530b1b56dea552bec99c6132c20f18700
SHA1c3eff40d4ae60af21b9b98b16e96bcc4ace73a3a
SHA25680a24df786d7c17bc13eeb8d82e1e3c95d12300e183980d89fdeca697cd461d2
SHA5126f3163e6e8ffc8741baaf96bf24ebf0fb9a3bcafa5b713dbc43a43f3c72fc243af014e7f0976e3968724c933a55b0e85a407d40af45c57c4900df63f29dd0ce1
-
C:\Users\Admin\AppData\Roaming\ExportReceive.tempFilesize
510KB
MD59e11ca752325ae699dba5462c68a28ab
SHA10bbd82639decb04a3c31d8cbda7f9145bb9691a8
SHA25663bdbf92c01366eca4eee0056e67a1daa5c7b3d32763e0510ffae4789fa7e785
SHA512f1b60135b3a676a0688f20f86a59ca89653e15f36f9207ab04a60d3b4118ea7d897350c0a75179719350d7084da342777aadcd3b268128f6fc05cf470840400d
-
C:\Users\Admin\AppData\Roaming\FindUnprotect.wpsFilesize
669KB
MD56cdc529b8ee4f33f8037a7305a9b15d6
SHA18ec9966df82877f5c6c38b26a6d7ecf5a815bc87
SHA256a59b849082a98a7c5b5b3fc59ce30ca3e9adc0bff5dfaca1afda551ed5d1c7ed
SHA512440aacc1eb11cbedace30f58900f2f8cde8d432aed8a8af6252ce39825b5d00c4acce495f6003b39259647bf9bb2beb2ab3298e4a7cd6aec75fd11cd1598e93c
-
C:\Users\Admin\AppData\Roaming\FormatWait.batFilesize
605KB
MD5d31faa0dc963de7487d077e8f647b680
SHA1762aa5c2903172297da81b90098f686dded0faef
SHA256d9a9786b8a2d703c00d5a160b25f0d7ec628fda9770575b0cd8c5d89bfe15609
SHA5124f0143fb940f3c1d8ad9379f99c5cfd8a15f8a2a72e2f73f26e8f0adc04a776435fec43ce5272b4882c06e336aa3739d85a6094b3f90356955f193d0dbf8be3b
-
C:\Users\Admin\AppData\Roaming\HideWait.MTSFilesize
717KB
MD532c1915b319801d39f678f14b2b39044
SHA11bded7207795661a64eee25ad1630691a32caf97
SHA2569dc17fa97afa986b171adb078d1301ab9879f89b732e40b4d66dcf6cadafd3eb
SHA512bca08bdec9736a6b306befc576e54b3bdf454820375cbfb240baf632a1861580598bf491e0498ef485c31c3edb3027346a24448281f2c94a025d15b131dd102a
-
C:\Users\Admin\AppData\Roaming\JoinProtect.xlaFilesize
573KB
MD53ec64484ced39dfde5fba79e7988a96d
SHA10b0e4cfee24f890604702d9635cd401054f984f5
SHA2561dbff98f2f2b78cf8707ebfc31c288b777b4e4af499ff6461596619b142049a3
SHA51292035b3010b734e05df0a07d84d3874d9fc906f81a3ee9a53a4837944c3c7ee9a2c41698cbfd3d840f57cabc281efae282b0afac39e35ce1c4a4f9621285fc61
-
C:\Users\Admin\AppData\Roaming\LimitInitialize.bmpFilesize
637KB
MD5e56dabe1487f17ce83fcd9fae4f2b1ec
SHA1905f0acb4b78147540f53a99f94e179a4e1236cb
SHA25641acf0f08708b162409975441f04bd009a00664eee47693d94bed1ec48bb9ccb
SHA512277cc823f6533071fdd26ce046e53ef85cefd6c25bf57420f7ef29dcab4dd849950b8916fdc46a1e785e74a773d26976d2ef7135173d3e2e4dcc40b2db910f86
-
C:\Users\Admin\AppData\Roaming\MicrosoftMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\MountSync.MTSFilesize
701KB
MD5d7cdb720923698403a8da9e887fb1111
SHA1cec4008a659f17db5d9bee8968235f5893579130
SHA25681dfb8e4ada8184d2362bd8c83da5c79ba1a41b83d0b92d49675e98dfc64b146
SHA512be514ce25a33e9e98e12d012d7ebb138a66549e4abf6de8fd828bbbc1170643d1f7eddb757d80e840dd288b3b7121dcf67e08f370b4d10a8ca4442f067c98fba
-
C:\Users\Admin\AppData\Roaming\MoveTrace.xlsmFilesize
478KB
MD5d13f9d8ea3c3b7877a42297c7bcfb931
SHA163c454125b904ccd14acf8dc94b4884250a6d4a9
SHA2568f4e3e56ee3f68fdf2c886e4c785cbd7925418772825a68c963402d4d6bdea35
SHA5127d4ac097fe97e5f001ca74f1e6da60c551c3377653ff7d5a0faab30726fe832988bf49a6daafe7767ca1f636e7944d92821e6f05707b37d59c1fcc7c6bbda8e9
-
C:\Users\Admin\AppData\Roaming\NewClose.asfFilesize
765KB
MD5a30cc9a3bb00fe64708d2333c7178c74
SHA104b97b1cf4b30dd817e3de24640d4c5873da7ea2
SHA256651208939d6918b8256f49066d9c2e1f075e0baf2892ad3319c7964a8c2a499b
SHA512de43593e9a935631306079964f55f06dd3b8905d559a11d1972829d59192886994f9ae459c7863f7772a4995a5793fd56c069f950e6836b7a4e7856479273657
-
C:\Users\Admin\AppData\Roaming\PingTest.cabFilesize
685KB
MD525a2b0b258ccfe2b02889d8c93f85487
SHA1c7469febf4935ce3ab7b4d8de8cb35715691ce82
SHA25664f451c71565750a3c5d02fcc93091014b047cf5385ab5598d80a83c841fe8e5
SHA5123c3fc0fa7dabe5ba632ae258b667b49273dabf32cf14b302a7f289d953f9a24d8c75e1a414f1503702f28d7afa9961c4004baa56524430cba292963a5dd5d19e
-
C:\Users\Admin\AppData\Roaming\PushMeasure.infFilesize
462KB
MD5203e933a033ae2bc302614ae86a778b9
SHA14e6aff4c5d0166db9a12012366da667e76129d38
SHA256ba5e71a26a5868f97983c872c40d198e9e28c774ece0b09fb5cd050af7b3e483
SHA512aabca277283556f4bb1b2e64937a830de283ff3055cc42244ddbc8a2fedc51e1b2d71b74d97b1e4e9d7652e7e65e512e7ceacf1905ab6bac80097b4c80ffb0d6
-
C:\Users\Admin\AppData\Roaming\PushUnlock.lnkFilesize
366KB
MD59d62de4f69d1af160e92887a8c78b0cc
SHA119559cd3283367026b32b43964c691df212d7f42
SHA256578b8a19b91ffae1c49265458d22b1de64202d21840bc83f9e67e70f6e16c63b
SHA512c8dae87a6cd030af799e8743e843b86b4639e1298220b74f0bf12018a865d4a34513f5378278b17b48700256007c079d05dcfa8fd57133fc4967aeffbead6a4b
-
C:\Users\Admin\AppData\Roaming\ReceiveUnblock.pngFilesize
271KB
MD576974ce2a15f20a082626a566df68d4d
SHA119c1c747e78572ff7ea3da7e4fcd765c886899f8
SHA256e37d0925bb02b2f4e00d8880f3856680848c15b49b569e12b560768c89fbc5d9
SHA512b0a4050bfad1dc6022e86827b7a771a6c6a1a93baf25e7f771d56b9dd78f5f030486986c6ee38b3cae29f2761d864df4cb4a1c5c404c0f00caf69acfbe2e56ef
-
C:\Users\Admin\AppData\Roaming\ReceiveUninstall.vsdmFilesize
494KB
MD5511742cc0cfee6ff0828459007403553
SHA10fa94df1f29eac4e73910d4948750b8da3c209aa
SHA2564cbbbce5617b8c27ed2cfe5ac94a2da05fbaf08ba09debec3c5493bf1e5cf3f3
SHA512122ee39e812be0aa3df409057871fc1c9b98b8e6091c99cebe4d33f979b9aa6fc241cd9975ad61348687eb1d633baa5d387aac4a6c080117e8f1bc6e0c79db0e
-
C:\Users\Admin\AppData\Roaming\RemoveUnprotect.sysFilesize
334KB
MD5daeb813b55a317a033fc3bfb9113b785
SHA1012be80f2bb8bb1e96542448e57d3ca58fcb22aa
SHA256958112edf138ef192f280e87495300316997e969b98fe97363a383be91e5f3ba
SHA512a87a4e2bea0c89c0d3ed6a9d1527a1863d810467321d3117fb8a541f31d7ac08b9a100abc7f79fb91eb9c46efebef1d77ae8a41370b7da83c47582d4a43946ce
-
C:\Users\Admin\AppData\Roaming\RenameConvertFrom.i64Filesize
621KB
MD590dc963de12f19d11b0cb955fe0908cb
SHA12e91a12b0ad41c2620da3b07b69fc294faf18226
SHA256a4515ad879718e79f9d4aadf7bcd77de3dee71b3113782651c2cb925fe94ae75
SHA512f30efbbf896c8418bcd05039c0ca23f3b8a6397cffe67a6c4e8eef5519e95409f38deefb3a7f7a7b1b49ce6e61bd77569b37e3442941d1a8eae385fa29157388
-
C:\Users\Admin\AppData\Roaming\RequestConfirm.tiffFilesize
526KB
MD58b8a05cee9fc63dd5be3a537c73e40ad
SHA1178922b7da9b85d9b80793f1f98f6f52b853778b
SHA25691719998a922c1b550e07fb67ead9a166a39854b017e1bd493d7416e684b4c5d
SHA5129203e482cb8ab085bed047621a6e9eee45707e060548985abd28c3ad5d3a41cf77f9fb4d9ac32de9782306c0369283bb695c80510b2d6b9ac783f56846b1373f
-
C:\Users\Admin\AppData\Roaming\RestartExpand.icoFilesize
398KB
MD5f0f580ac60954e93d648cc6d8aa408f3
SHA13c4281b463d033870ff75319dcb7430360d8e6ac
SHA256072068277a644abd384604043845bdac0abc9551ec4fcc5d4b62330776af38a0
SHA512aa29c867337087fe54eeb1fa4bbed6e0249bf210a366b8007732bfabcaf6d58fca46505e3c8a1e66bbc62d4bdfce942192cfa601cb5f715751de98fd79d6d85d
-
C:\Users\Admin\AppData\Roaming\RestartPop.eprtxFilesize
350KB
MD5d22c3a5fd9fc07eb0d8fe1d8820d6735
SHA1ea8ea77f1d1dc910201bedd282c082518c395c7b
SHA25622a6a1aeeaf7179bfd89b046fd545190445fce96ef092fab2df13a9e3cbd4f0d
SHA512a41148897505cb429fd1164b25075c89dd47901f70b04153b91876a9e6771c20dd89b90838cf9564b5db8d789baf1c049f4284619e12113ad47ed22b32bf98fb
-
C:\Users\Admin\AppData\Roaming\SelectWrite.tiffFilesize
589KB
MD5bdf21f1d37df9b4ba911050f889024d2
SHA189a709bc3786828f94731a7c7c8df92c1e4eebf9
SHA256184e9ab681d0d634d31aa9d997ca1f7ee7e41be5342c8a1e2e2442b11978628a
SHA512d01059dce1b99c1c0095762562819ae226465a000ed0ce66a9210d680dd5b85928abb1a74c0ebb5aad738956bb77ff203d70a1357a6f453ab7ab80d041ffdc17
-
C:\Users\Admin\AppData\Roaming\SendResolve.pptFilesize
318KB
MD5c20d6cfc6adea718b6dafd7d0fe92a8d
SHA17acb9bb228967d41a253bbbf7a282020fee7eb7d
SHA256d7729e2f420702069b6a7214754f65987af1057eba76377cffffd820f2dae6f0
SHA512c72aa1c656ad57e82058b39332ee0c3119bf3686154844be8ac489f8c273d9a7310766ece650a4a38797b00a09e68978e86ef4e53d43388bedd4c902feba844b
-
C:\Users\Admin\AppData\Roaming\SplitClear.pngFilesize
446KB
MD53538b3b6cfd6b8068028e00acdc79614
SHA15b748a1ee38afdfe024dfefc819033372b19db18
SHA256a75aa96ae6942ab9223f240d0a1f0ea9aa677343cb70e7fd3a514763972fe6c9
SHA512e1d400eaf20e483f7e4857aaff1d076792810659e998219d2cd1082f7955e23349b0b4142520eecca98b1e20db43254e5ab1382e62825808a3ce7e9437ffa348
-
C:\Users\Admin\AppData\Roaming\SunMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\SyncCheckpoint.asxFilesize
653KB
MD5c4c03dd7cb3ca8f32fb4a5f00c1a9074
SHA10ea2b99e9f89e8cb13c9cb5c5f7e31205faa74a3
SHA256ac7c2e98a7197cb2f801ca0e1539c4868e6d0fc47d1cb596ee64bc4694302958
SHA51214baac77ef75592e65bdfca68e4c22159fde9443182e41ba1b1d5849772a55d6a02a76ca21c1977ebe2b698df7a95195cce67f4b3e53c7376354f972b6ba5c11
-
C:\Users\Admin\AppData\Roaming\SyncNew.potFilesize
286KB
MD5f47ace998e155a9af837b6140957feb1
SHA1bfc01c17f97c851b1041ba9ac5bc1f801da5b6ef
SHA256b6ddf98652a5b0337fc270c96b1443d11b6da48d1f4dc855982da89d59d161f2
SHA512a073d04410636c4f0dc531476b7b4604631f761966b7e85c0a77f188a2c9466bc49b3fe2123aa312e4a1aead40e8f3c6b4a4e0b7198d5ac7d2e8772b2771f082
-
C:\Users\Admin\AppData\Roaming\TraceSplit.dwfxFilesize
558KB
MD5fa52f4887b7147151b5b09bfce183a44
SHA104bfce864096998a458b9cd095fba8abb35805d2
SHA25652cd78238e4e7dbebbe1de743ad50631581bb3fe5700a797c275a7af3525685d
SHA512ff6f0d970bcfabfd84a18435fc2344ccefe98625c6cb23b6d1a4e96af92065a75b00e4bb65f88163726c619a79d93cc7c71fd56a65da27fd52c9f74464125e27
-
C:\Users\Admin\AppData\Roaming\UnregisterRevoke.dwfxFilesize
781KB
MD58835e560fd9e625ecc682bd8b1f96906
SHA17644db480cf8a58dacf294bf7d6efe7aa55d8937
SHA25646955a7021ab371f9ef6cc9f2beff644afe05ac314166a63e1057c7537d747ed
SHA51223755dcc105bb5aefb0181cce26751b1445284072923b2c914906359c92c968c08fd3ad7842c644e4d8b07e6f5a72b4f080340d0a0892ccd5565cff62b210106
-
C:\Users\Admin\AppData\Roaming\WaitMerge.wmaFilesize
414KB
MD58ba18d052768b6f14b3cb5f66b52a83a
SHA127aaa31850ebf68b899de6574be53a13a491c938
SHA2563f4e5cae0b5d64bbfc64391889e5296d28175265b1257923b28023e4ece77830
SHA512302cdc406d06d20226f4694ecd05874538f3643f9eba81d24187e3f1efa183c564263f52dd88cab076fd24a91ad353219ceb495c0887c109b809b5a33f0fe457
-
C:\Users\Admin\AppData\Roaming\WaitPublish.xslFilesize
382KB
MD543480214c9aed49996334cad4b8b95d4
SHA12f6378be7d7334b92a65a3b652930cd997e0f807
SHA256195b4d80e3fbbe62248ed9c24502a51f062c1d728c8705931f6b9e0c34df8988
SHA512905434228effa8d5a496338902dd5828a3e7fea115059cf43fb376a3d8a62b330ad3d957282360cf908dd0486932e657e19bbf6ba733424ae1fc48f05e80b323
-
C:\Users\Admin\AppData\Roaming\WriteSend.potmFilesize
542KB
MD54871a7306605a63f62f0ad2a5d3ef786
SHA1fb32372f98593b3e0ea34b4de3a43ee212b4b9bb
SHA256e2ae7225b0374f97102e5f0dcfbc2d6a3f6c0a17309359ef91d74d68f1589b10
SHA512a6f5f0f5a2e0a7c0e4376e09d45163736c2875194bca323a42904c80009350cf179ecf99a0a905578ea7742398f3e8176a593086a3b22373d6b6e1c8fcb29e36
-
C:\Users\Admin\ContactsMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\DesktopMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\Documents\advancedrun\AdvancedRun.cfgFilesize
768B
MD5b2f383fa6135434b6ed359c678c5d3aa
SHA1e610a2c6c1d728498b0a71fe48a144be0f8b4440
SHA256becf78f2b19c06b5c4bef03d791223af2ea466eba88accc55ec4748cc94e143d
SHA51246dbc88dd7a7debbdaa6bb9890b91b2d304f91c9f4c4ce03be50442714b55a858217a613bd97959f84d0e5d49e071a002a89f2e0b69bc28e86a280e3a7a684de
-
C:\Users\Admin\Downloads\file_shredder_setup.exeFilesize
2.2MB
MD538debb1ffd53d8c1c00a972d2c5e6676
SHA18e6ed5bc7c0f07559f82f381cc9f8c8e5f5d9da8
SHA25672714927de74b97c524c5fa8bc1a0dec83f038dbbed80b93b5e6280ca1317f41
SHA512dd1132ac929030da10dfa3a1dd0005e5b33f1c6b2269c0256070fe618046dadcde5a9e5818bdbdaf108dde11217a08e7adfc4c7dd37d0e88ce6d6291a167ae3d
-
C:\Users\Admin\Downloads\file_shredder_setup.exeFilesize
2.2MB
MD538debb1ffd53d8c1c00a972d2c5e6676
SHA18e6ed5bc7c0f07559f82f381cc9f8c8e5f5d9da8
SHA25672714927de74b97c524c5fa8bc1a0dec83f038dbbed80b93b5e6280ca1317f41
SHA512dd1132ac929030da10dfa3a1dd0005e5b33f1c6b2269c0256070fe618046dadcde5a9e5818bdbdaf108dde11217a08e7adfc4c7dd37d0e88ce6d6291a167ae3d
-
C:\Users\Admin\FavoritesMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\LinksMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\MusicMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\OneDriveMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\PicturesMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\Saved GamesMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\SearchesMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\VideosMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\PrefetchMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Program Files\File Shredder\fsshell.dllFilesize
2.6MB
MD502860c8c4fce4422f70ea813ad8755ab
SHA133c09f19be0e673f856bd8fb8bd4e8674b216987
SHA2560a8e1467a7cfe8f50a604946e04d238fae314fde6ccc6cbb347d72c2d13fb7fc
SHA5123e3251778dc4400de7f93b60100b8322913c2f136e6218ea7f0097a447545e42fa47a95f8826dd6be953b3933330d132724ca75a03886cec8587ed8136e1d430
-
\Program Files\File Shredder\fsshell.dllFilesize
2.6MB
MD502860c8c4fce4422f70ea813ad8755ab
SHA133c09f19be0e673f856bd8fb8bd4e8674b216987
SHA2560a8e1467a7cfe8f50a604946e04d238fae314fde6ccc6cbb347d72c2d13fb7fc
SHA5123e3251778dc4400de7f93b60100b8322913c2f136e6218ea7f0097a447545e42fa47a95f8826dd6be953b3933330d132724ca75a03886cec8587ed8136e1d430
-
memory/560-881-0x0000000000000000-mapping.dmp
-
memory/904-598-0x0000000000000000-mapping.dmp
-
memory/1304-686-0x0000000000000000-mapping.dmp
-
memory/1452-272-0x0000000000000000-mapping.dmp
-
memory/1932-676-0x0000000000000000-mapping.dmp
-
memory/2160-358-0x0000000000000000-mapping.dmp
-
memory/2168-403-0x0000000000000000-mapping.dmp
-
memory/2788-755-0x0000000000000000-mapping.dmp
-
memory/3864-819-0x0000000000000000-mapping.dmp
-
memory/3968-315-0x0000000000000000-mapping.dmp
-
memory/4140-161-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-184-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-124-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-125-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-160-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-158-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-183-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-182-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-181-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-126-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-180-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-179-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-127-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-128-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-129-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-178-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-177-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-176-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-175-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-174-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-173-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-172-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-171-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-170-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-169-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-164-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-168-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-165-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-167-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-166-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-163-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-162-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-159-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-131-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-157-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-130-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-185-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-156-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-155-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-154-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-153-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-152-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-151-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-150-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-149-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-148-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-147-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-145-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-146-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-144-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-143-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-142-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-141-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-140-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-139-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-138-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-137-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-136-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-135-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-134-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-132-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4140-133-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4184-450-0x0000000000000000-mapping.dmp
-
memory/4620-818-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4620-798-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4620-957-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4812-187-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4812-188-0x0000000077850000-0x00000000779DE000-memory.dmpFilesize
1.6MB
-
memory/4812-186-0x0000000000000000-mapping.dmp
-
memory/4860-229-0x0000000000000000-mapping.dmp
-
memory/4924-555-0x0000000000000000-mapping.dmp
-
memory/5044-886-0x0000000000000000-mapping.dmp