Analysis
-
max time kernel
1218s -
max time network
1218s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18-04-2024 19:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://github.com
Resource
win10-20240404-en
General
-
Target
http://github.com
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___58QY7S8M_.txt
cerber
http://xpcx6erilkjced3j.onion/D935-A467-6029-0098-B8A7
http://xpcx6erilkjced3j.1n5mod.top/D935-A467-6029-0098-B8A7
http://xpcx6erilkjced3j.19kdeh.top/D935-A467-6029-0098-B8A7
http://xpcx6erilkjced3j.1mpsnr.top/D935-A467-6029-0098-B8A7
http://xpcx6erilkjced3j.18ey8e.top/D935-A467-6029-0098-B8A7
http://xpcx6erilkjced3j.17gcun.top/D935-A467-6029-0098-B8A7
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,\"C:\\Program Files (x86)\\Def Group\\PC Defender\\Antispyware.exe\"" MsiExec.exe -
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Contacts a large (1121) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2408 netsh.exe 4944 netsh.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ [email protected] -
Loads dropped DLL 1 IoCs
pid Process 3684 wmiprvse.exe -
resource yara_rule behavioral1/memory/5076-1457-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1458-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1459-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1460-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1461-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1465-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1466-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1467-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1477-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1487-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1512-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1543-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1592-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1593-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1596-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1606-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1681-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1682-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1683-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1684-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1698-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1727-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1728-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1729-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1730-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1731-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1732-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1733-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1734-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5076-1735-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" [email protected] -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\v: [email protected] File opened (read-only) \??\w: [email protected] File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\e: [email protected] File opened (read-only) \??\q: [email protected] File opened (read-only) \??\r: [email protected] File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\g: [email protected] File opened (read-only) \??\p: [email protected] File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\x: [email protected] File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\i: [email protected] File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\k: [email protected] File opened (read-only) \??\l: [email protected] File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\a: [email protected] File opened (read-only) \??\o: [email protected] File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\m: [email protected] File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\b: [email protected] File opened (read-only) \??\h: [email protected] File opened (read-only) \??\n: [email protected] File opened (read-only) \??\t: [email protected] File opened (read-only) \??\y: [email protected] File opened (read-only) \??\z: [email protected] File opened (read-only) \??\B: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 82 raw.githubusercontent.com 80 camo.githubusercontent.com 81 raw.githubusercontent.com -
Drops file in System32 directory 40 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word [email protected] File opened for modification C:\Windows\SysWOW64\RCXEEF8.tmp [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam [email protected] File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! [email protected] File created C:\Windows\SysWOW64\fpfstb.dll [email protected] -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpDF24.bmp" [email protected] -
Drops file in Program Files directory 23 IoCs
description ioc Process File created C:\Program Files (x86)\Def Group\PC Defender\proccheck.exe msiexec.exe File created C:\Program Files (x86)\Def Group\PC Defender\Antispyware.exe msiexec.exe File created C:\Program Files (x86)\Def Group\PC Defender\hook.dll msiexec.exe File opened for modification \??\c:\program files\ [email protected] File opened for modification \??\c:\program files (x86)\ [email protected] File opened for modification \??\c:\program files (x86)\microsoft\outlook [email protected] File opened for modification \??\c:\program files (x86)\microsoft\powerpoint [email protected] File opened for modification \??\c:\program files (x86)\office [email protected] File opened for modification \??\c:\program files (x86)\bitcoin [email protected] File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\program files (x86)\onenote [email protected] File opened for modification \??\c:\program files (x86)\powerpoint [email protected] File opened for modification \??\c:\program files (x86)\steam [email protected] File opened for modification \??\c:\program files (x86)\the bat! [email protected] File opened for modification \??\c:\program files (x86)\thunderbird [email protected] File opened for modification \??\c:\program files (x86)\excel [email protected] File opened for modification \??\c:\program files (x86)\microsoft\office [email protected] File opened for modification \??\c:\program files (x86)\outlook [email protected] File opened for modification \??\c:\program files (x86)\word [email protected] File opened for modification \??\c:\program files (x86)\microsoft sql server [email protected] File opened for modification \??\c:\program files (x86)\microsoft\excel [email protected] File opened for modification \??\c:\program files (x86)\microsoft\onenote [email protected] File opened for modification \??\c:\program files (x86)\microsoft\word [email protected] -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Installer\e609167.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint [email protected] File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! [email protected] File created C:\Windows\Installer\{FC2ABC8E-3715-4A32-B8B5-559380F45282}\_966CD4ED37489844400D0C.exe msiexec.exe File opened for modification C:\WINDOWS\SysWOW64 [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word [email protected] File opened for modification C:\Windows\Installer\MSI9261.tmp msiexec.exe File created C:\Windows\Installer\e60916b.msi msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\documents [email protected] File created C:\Windows\Installer\{FC2ABC8E-3715-4A32-B8B5-559380F45282}\_3F16219B047CF8432B7ADA.exe msiexec.exe File opened for modification C:\Windows\Installer\{FC2ABC8E-3715-4A32-B8B5-559380F45282}\_966CD4ED37489844400D0C.exe msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server [email protected] File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office [email protected] File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam [email protected] -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Capabilities svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\DeviceDesc svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Mfg svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 3092 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Internet Explorer\LowRegistry\Shell Extensions\Cached PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Internet Explorer\LowRegistry PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Internet Explorer\LowRegistry\Shell Extensions PaintStudio.View.exe -
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1c msiexec.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133579427647766664" chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1A\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings\JITDebug = "0" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1B msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script MsiExec.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\E8CBA2CF517323A48B5B5539084F2528 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList\Net msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C73BCE36FA1AA0E45AB2649A3FA0D390 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList\Net msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "51200" PaintStudio.View.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RarSFX0\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\RarSFX0\\" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" PaintStudio.View.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\PackageCode = "18627594958587344B2B3984171915B1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings [email protected] Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache PaintStudio.View.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList\PackageName = "PCDefenderSilentSetup.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList\Media msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList\Media msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\E8CBA2CF517323A48B5B5539084F2528 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\SourceList msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C73BCE36FA1AA0E45AB2649A3FA0D390 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix PaintStudio.View.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\E8CBA2CF517323A48B5B5539084F2528\DefaultFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\ProductName = "PC Defender" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E8CBA2CF517323A48B5B5539084F2528\Version = "16777216" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C73BCE36FA1AA0E45AB2649A3FA0D390\E8CBA2CF517323A48B5B5539084F2528 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" PaintStudio.View.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2536 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4988 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3284 PaintStudio.View.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 3152 chrome.exe 3152 chrome.exe 4344 msiexec.exe 4344 msiexec.exe 4108 [email protected] 4108 [email protected] 5076 [email protected] 5076 [email protected] 5076 [email protected] 5076 [email protected] 4444 mspaint.exe 4444 mspaint.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe 3284 PaintStudio.View.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3284 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5088 [email protected] 3284 OpenWith.exe 4444 mspaint.exe 3284 PaintStudio.View.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 2772 4404 chrome.exe 72 PID 4404 wrote to memory of 2772 4404 chrome.exe 72 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 2552 4404 chrome.exe 74 PID 4404 wrote to memory of 760 4404 chrome.exe 75 PID 4404 wrote to memory of 760 4404 chrome.exe 75 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 PID 4404 wrote to memory of 5052 4404 chrome.exe 76 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:636
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:724
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:728
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵PID:744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:812
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3240
-
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca2⤵PID:3548
-
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca2⤵PID:3556
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3760
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3916
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3332
-
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe -Embedding2⤵PID:2056
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}2⤵PID:4336
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding2⤵PID:1616
-
-
C:\Windows\sysWOW64\wbem\wmiprvse.exeC:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding2⤵
- Loads dropped DLL
PID:3684
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca2⤵PID:2544
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3284
-
-
C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe" -ServerName:Microsoft.MSPaint.AppX437q68k2qc2asvaagas2prv9tjej6ja9.mca2⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3284
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k rpcss1⤵PID:860
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵PID:904
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:980
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵PID:580
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵PID:1032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵PID:1052
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵PID:1096
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2484
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵PID:1112
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1196
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵PID:1216
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1244
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵PID:1256
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵PID:1368
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1412
-
c:\windows\system32\sihost.exesihost.exe2⤵PID:2348
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1468
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵PID:1512
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵PID:1560
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵PID:1568
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1664
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵PID:1684
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵PID:1820
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1856
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1992
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1536
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵PID:2072
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵PID:2172
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2364
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2440
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2452
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵PID:2460
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2680
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2712
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵PID:2728
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵PID:2752
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2788
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2808
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s TokenBroker1⤵PID:2860
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2708
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://github.com2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc2aca9758,0x7ffc2aca9768,0x7ffc2aca97783⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:23⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2052 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2612 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:13⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2620 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:13⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:13⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4844 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3020 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4992 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:13⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5208 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:13⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5352 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5508 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5340 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:13⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5316 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:13⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5516 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:13⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2912 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5908 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3592 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=688 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1840 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=776 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3904 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1580 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=688 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1704,i,13900537931265878006,17946996461624278052,131072 /prefetch:83⤵PID:4348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_PC Defender.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_PC Defender.zip\[email protected]"2⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5088 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\RarSFX0\PCDefenderSilentSetup.msi"3⤵
- Enumerates connected drives
PID:3052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_XFC.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_XFC.zip\[email protected]"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Cerber 5.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_Cerber 5.zip\[email protected]"2⤵
- Drops startup file
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:2572 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on3⤵
- Modifies Windows Firewall
PID:2408
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset3⤵
- Modifies Windows Firewall
PID:4944
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___QEPF_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:1020
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___Y2FZU3N_.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "E" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit3⤵PID:3112
-
C:\WINDOWS\SysWOW64\taskkill.exetaskkill /f /im "E"4⤵
- Kills process with taskkill
PID:3092
-
-
C:\WINDOWS\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:4988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_NoMoreRansom.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_NoMoreRansom.zip\[email protected]"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_AdAvenger (5).zip\Ad Avenger 2_files\3b2d8f6a15a379f90883b1bc9709eada.png" /ForceBootstrapPaint3D2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Deskbottom.zip\[email protected]PID:2688
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵PID:4684
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵PID:4436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵PID:3880
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2524
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵PID:4192
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s PcaSvc1⤵PID:2360
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4344 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3664
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E53078773F91AFE7A307FD9B86EE196F E Global\MSI00002⤵
- Modifies WinLogon for persistence
- Modifies data under HKEY_USERS
PID:652
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2972
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:4228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3264
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\9529c757018b49d5a8905201b9e49126 /t 3280 /p 10201⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD54780f5ddd8eac232f73cb2b8193cc490
SHA10798d49866d4f90f73d3747000544378097cd233
SHA2564a6cbe21d403438e46f325bb107ae6907cd2545d0a03dc05b77db64be6702948
SHA512f8ab3476b3faa43d1d73fbf3bca01f4527b7040b4f96720047d855711ec2d17a4a97a473c075ed5b5e5acbadaa1c923b41f48d63ab5de9e4b6373a308c837f13
-
Filesize
44KB
MD5054eddc788c0f1f493b8c77bf7cc17c6
SHA1d4b8a02fcd9245ec11c79e5e282b25e83603cdb1
SHA256238219b3b6039bd51428cb678daca149e8611f2db3b3756897f98426d01a00a6
SHA51272433d5d3ee5417621e60cd745e0bce70330e529950ec44478cd87c4b48dedfc1d4adcf406fa1ffb6887804aab6f4ad6be7e96e2978a85127dc3a382f1cffdf4
-
Filesize
49KB
MD5e1f8c1a199ca38a7811716335fb94d43
SHA1e35ea248cba54eb9830c06268004848400461164
SHA25678f0f79cdd0e79a9fba9b367697255425b78da4364dc522bc59a3ce65fe95a6c
SHA51212310f32ee77701c1e3491325a843d938c792f42bfdbbc599fe4b2f6703f5fe6588fbcd58a6a2d519050fc9ef53619e2e35dfadcbda4b218df8a912a59a5381a
-
Filesize
24KB
MD5e1831f8fadccd3ffa076214089522cea
SHA110acd26c218ff1bbbe6ac785eab5485045f61881
SHA2569b9a4a9191b023df1aa66258eb19fc64ae5356cfc97a9dda258c6cc8ba1059ac
SHA512372c486ac381358cc301f32cd89b7a05da7380c03fa524147c2ddf3f5e23f9b57c17485aaedc85b413461a879afc42e729547b0c96c26c49bbdb7301cd064298
-
Filesize
21KB
MD5e9a5315fe482aa6a84b4cd461a41a5cc
SHA106833b57adceda1c91eaa2072d368c54fe4995b0
SHA2566a00fd28670b7ddc6725260bf6cf4c345762edcc5e74e4eb77367b4969efa9c9
SHA51286dcee3ad5c69dfb9bf6f0e8246b1bf2f95a27188c17e1cab7b9270774c37b8d0e6b2acfd33f144ba74d17c849299a9c750dab9c8f1bff09147befb7876421c9
-
Filesize
3KB
MD53806e2dbfb6c2392531760da1e7d02af
SHA18877be2173003e7298b58b66070f9d07fec973f7
SHA256499e0b2bc1fac3abe4b691476a5188014d0a2103815023569cb86d3da6f0a11b
SHA5126d6274c2f42efb6c487274c5438447d2e35566cf8e66b5c384e646e20656642c59901593d8e5a74c65bb37b9bbe5fd9f87806ef9d1a01a93ba9c08434b521f1d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\7f74373c-3317-47a2-b076-949c957fe7f9.tmp
Filesize1KB
MD59b83dab2a62362c7842e743ffeb3cd21
SHA11bc3ec1f6930f2ebc67764d419ea0089d825ffa7
SHA25601d916d257ef97a167755f3d297b607989a7517991244c98e22426ab00c3a322
SHA5122f90058f5d696cec826aa4a08025d64d35a533d4f265366575ab0c7c0e9b6272f2b3be008d5b08426046b5c45715b19e71b0250cba8f6d3c9fd2bce2f97b1c05
-
Filesize
3KB
MD5bda42c4891d6238b9f809660730256cc
SHA15b4476617c83f111e92c007d0f348c5944239611
SHA256a0227115aa9ffd918b35cdd49c0d7051d88fbb0f04abf9a5f9f02290e9e9c977
SHA51241c34311c47d91eb29a5f04b8ab3ed0aed67f24f207a3e9f8304791b76695d90825f6f3c4057e7a0930b9af1d0b64b5b3ca6d942eeb31cfe041cf8cb20f09c82
-
Filesize
3KB
MD519fc682672f0bfcd252224182e295ed2
SHA1d105407fdb02bed4962fa3f1700e940a70d93b24
SHA256a69bdb26d48a546e2d445286805e2d052a27c08736eb5c9d61e781673641d861
SHA51228a20d597a562bf919765df9bb47b807e38c3694a031be2c9e17fd6bb757a6bd3582d56dcf6c7698cbb29e1c929f7ea403388daefc48e998a565f78c47cb98a1
-
Filesize
3KB
MD5e8fe288afbcdda7323b7d46343c032ef
SHA19e56db62571d42cc54895bfd8abe775e4a9c5791
SHA25649843a3bd636f18521d01d5fecf2a33f0455f4a2e3eabce2a8e842c85b793fc2
SHA51288907ea0f3b6b13c7064b4169990e903a04d66688ef3dbcd82e443415500a4b3c80d62b3f3996a51be141e7dff02043ff560163d35135772898c0377298368ba
-
Filesize
3KB
MD53d72863303195927f4609deaf18400da
SHA170c4ef8e5d65ad56ab41f141e80955a6e279a789
SHA25630cc488f34becd0d34e3496c5285368f5ca1524e8702071df1125f8c0ca578d8
SHA5120887d4f0628a7b7ac873fe7394d761035f692642f80e2af4e8294ba5b583a4c1d74df18dc58017006c1c381d423c38206ded794d479f4555b3e8a7ef3aed8236
-
Filesize
3KB
MD5279007b579e552dbf066158c8f2f0e19
SHA12ea64b100220a55e48a69a5eb5266f2cfa837571
SHA2567abf2ee2955b9f54750402fd355b047ad96cd6d1643703310087ee7691424ce9
SHA512776aae37571b672140605f0d9e48916cefdef4a24c5645487c87067701ccb5f7a4b1153081800b2632198cfc058c5066e65507c2f56a2ce7058c751160e3ca23
-
Filesize
1KB
MD5b6dd2c56a8a545036404a46f5b33410a
SHA1b43769624847ce77f76d445e4980b5694d20dccc
SHA25682d77ced8874af07ffc7249b2cc84b10a64e48a2a50e05d829f31062c48f1bd8
SHA512a72c06416dbc1d9dd046b4180887cbc98070dfb8ba79ae4f55f54de84fd7fe9a2ba01e027cd344d98454fd449e5ed068bc5c2289d0db920d0e5858d2f89a467a
-
Filesize
1KB
MD5bbd6d922592e7ec7c0fa8248ffafd505
SHA12192046b3d7d26d40c9cec96441e053395488fc8
SHA256c3b7aac505ffb6bdbccee728e389f52df2d51fecc4e2e9e3b90a0f114a773fe4
SHA5128ea092c7a31f3a6c89fb7c7e96900bc19f5a2f6573f99421b79bfb1664d563d766a8f1bd9c1f25600310f4c8331599350bce2e4259132c5d3082a6872f4fd064
-
Filesize
1KB
MD59a92f3f4b63ecec6f0d76c3642a98187
SHA154c519d4632c16d29b07408d0d7f3aacdb9db25a
SHA25667e9a6d508c8d413c42c698570e336ec2dc7c9dbe049ba7f213d6f40864538b1
SHA51215a7f276c0e5f57c48994b5e3b0253d50a7765575249648f4036b14e823fd50ae88c91ce2de9aada37129db01b62abc1da2853faff31c85d97f507115b9deaed
-
Filesize
1KB
MD5cb21b484d7f503ea5b6dd1c4a2da5012
SHA1c9160bacc8d3836ed7310509ef5e6641cd57ea0d
SHA256517c791ce282f7b35c84b78762127c2162706ab989d64c5d1c1da591bda2fa05
SHA512e078f80b09319696af1f06c0590ab5096bdcb7f43370103d29ae27ffaf919136e9b0b06376642e9857f24600115c6294b6bd922c1f97bf228a917b64a30e9e98
-
Filesize
1KB
MD5f6c5b91ca3a9a0263a5493005cb30b5b
SHA1c21443ca19e4cf31a3b66e0d47c79c3b8b3b24b9
SHA256d2acbb84efa6d99f7f8efb12bad96ee75d2bd8b306e55c80c280e412682e49b6
SHA512ebdd85c64d9267cfc009c71585dd6fda98d4a9172264622810b87a974e512ed220e3deadcb4447ed2bf8fae8a982afce584a4d0ddd4d5979d3770fc83fccf8f9
-
Filesize
1KB
MD542e71ab38c51ad5a5e731dd6cb99b28e
SHA1c8dbeac48363635282fd3a46434aec3c9e10aca7
SHA256254c25ab2553a84ee0267ac5c1e8f40b81cd3b662e379a1ec8f4475b4ce38bb3
SHA512e987e8f56c2f79f2e56ff872218b2fdc6b9d7a80ea3313c8910f9c4ff658036f2d1e620c0bf8aa4d29708d8cb299e1b04192a0b116ca43f3c668607f4dc8010b
-
Filesize
1KB
MD5ed9ac4b6228c7c759ae07806e9d480a5
SHA1c8766885313b9d50b3c05541f7a2010dfcc79cc8
SHA256f29535b26130174af0ed63326ada1f1e699678bc1e8a3015dd220ddc884f997c
SHA51215a1b3a6e4e1f994a5ea17fef35fd7617a5fad3d3be3c27b294887cb5d905689663becd6774424623ec5f13fc70a18c63544b3d59a90b15e22cd132b38a8cecd
-
Filesize
1KB
MD59a313a02bdf3e917e7adec9b4a17679f
SHA1a5aa31e6ae725f1e901ed8655a2cbded2a510bfb
SHA2565a255aaad69ed037ebdb7b6f6eaa2da1155c68de40f2d68c2c384a4a5fd9dd66
SHA512dc8fa0bd735ecf3db9ee45d6df9ee658734b4315aaa8c460ddccac2be47a5880111d1c18735ac446e6543083f858bb8d66599c37fd7e9cf6a32d2f5c92957452
-
Filesize
1KB
MD57b635e327eaf223a608352b84d784d01
SHA16bb8710380b59fee1b5d76c43248e9bb876ae8b8
SHA2569afdc0d2e98fdccd8620f580f3737f1b6020244eaae42c8914ef43762c37f40d
SHA51279ad9d6f8baaf201b3af48279523e4a963897deb57effb6ba7ce110c696525bee29586df8c916cde31b8c38ef0588d174001f3b9cd75b93c540beaa66148bc92
-
Filesize
1KB
MD5f67411a67eb791b36283b2012318c5ac
SHA1380cc6db967b060062293e2ff8046810b4211fe8
SHA25612aaef96f5f114a502534255ed63a645285bfa37ec0e95ce3bf754d5cc2d1cb1
SHA512793540c576a2746a9b09d595f95746e13295560b37b262a7005e9e55449eb265e557d3ce1c8e218b5c9db4699070f29d89be64dd9c3da092091e3b373dc69110
-
Filesize
1KB
MD53f30461f38347ce8f0e71b28bfae42ac
SHA1199fa11343fe88f14872130441ad44f1559d9aa9
SHA2568246c6f6ecbf178ecabe82a7ab1c49c2502bd1b7682c97a6df464c3f5a9941e6
SHA51298f9d864c10c1ae3639965a3d9496f188dacc5bc8b00072d35ec9b2ee4a9c8126ca37e8439eba263b85e3e12ae491b9f4f80878af744dcaf691fe142a0bdcb0f
-
Filesize
1KB
MD50486cf865b6f1320c0ad9c3fd16d9ada
SHA1d92ce84e577c54804fadd0e0c2da8a68ced2493c
SHA2563818a71ed296d824a614fe007253f6721bd601ee216b7b7eeb63542fc89c4138
SHA5123dbb26c37fba822d2fbba271fc5fd4fb860a310fb735c36cf1b8d67f7db25fb5976eee599ecdb23e30272d54dc8fcd0a38e34e9296101e8fbcbefe28235896c2
-
Filesize
1KB
MD57ed6888246ba283a59f89945035a22aa
SHA16019ae6aeaeba55868b9e33fa5807d738c97b7ce
SHA256034047e24c4a5315aea64cba5fc5c80cd75ecd35dfa11bc29aba78029c04f5ff
SHA51233955cc8ff02ef3fd08d05b8d17ebc452aab9f092af33fbfba3e30f4b08fba209c2652e2cfefd0b9ac760c871b770fa8088930c0b0f0fbdfeada6a48f9b4e32f
-
Filesize
1KB
MD5c522457bdc37fa9424ff01989961db24
SHA1ea7038f4fa42cd7eb3213c61ed76b80d0d79865c
SHA256cea2d0a39f723c00de8a69a784180ff277bb347900f00a43c9b8052dbae43b25
SHA512b2072e1aeab030d7024bd3eb5975a19d840624dffdd5f829aa091666fa85687bce02b9e5178dea4a280247734c73e961c84833b218851ea483bd6116b97146d4
-
Filesize
1KB
MD5b6d32b14629137ec1ed9eb917c17781c
SHA1ac36e966e7ec5b2192ed58b2e00239e3cef9fa4b
SHA2566e192c269f509eee0e84365ba0c6acbfb260b53c74b987da2c05ad01c2ed9c28
SHA512cf5e403a428614cb8f10487558096b7d7bef779488855243710151ae5a86226f604162910901988adcc3ade97090f758a89f945639bc9514b8875cec9ab2c7e0
-
Filesize
1KB
MD546adfc0627b8fc1655ebc5859d5e26a8
SHA1e82e2ea585c4861f2d5800185a963f9c31f7933d
SHA256915c1b74cde7a290702b3273b1268fdd5670705ac4059586222c748b2aa3b83b
SHA5127e24d7c2058e859115775268acf1e84372abfe2b384ea753e907538fb5dc0a13e030ae0b319e64a16a18dab666875e0204a316f0673d4c3a017b57a3ed860392
-
Filesize
1KB
MD5c60c298289178a3d03d8d9f8d299e29c
SHA11d147a1de6471b22814b907678545d6062a095f5
SHA2567607fda934b417127665a35f1ffe3036ca9588105640674ce327e279791b7b85
SHA5128fd64d16463f699a2fb9c3422e4699df22570602ba4a26e307549e5c1cc939f266b8c3f721a8bf0b1a054060e984139ff42bae2a59d3412214b4430e86ce4ba5
-
Filesize
1KB
MD58e3b08b99abc9004d13d412d5025d5c6
SHA1a52c55a8f4bab0fb3b004df9ce3e8813f812a242
SHA2568a9b21228b5597d5781466140589515c9bca2c7d8682837dee9fa07bb7421be3
SHA5122b49946502e806e48a1420c6492e4143f2763d68befba45644fe8b1ebdaf77ad1ec72909848dd371e34b9639db4b06ed2b84dcf034b60afa9d6fda2c52de9fac
-
Filesize
1KB
MD59bae1c9264bb217bbf765e6c1367a015
SHA193566f7ee1dcbc55133d97c82cd6f31b40e656a5
SHA25685dcd01958d8e92828728b8d49a1cbac8070c639b00b976644a4c3ae952ba8c6
SHA5126bb06d396519b5d77dd0834f9592f6a2aadc06fe15c1ad9ac14de5b4879ef146f0af720f3fca2105613154dc704c79fb7fd53e8ae4f04564703965d8b8c275dd
-
Filesize
5KB
MD5f0b41e290ba00837c72b508854edb239
SHA18323493780f7006b5e61cca52e1a9e39c7388b89
SHA256021638fd343eca562c9f58e5c59c15a13024fac81118bdc88775eeba46f5b81b
SHA512d8e068d6b350ecfee776642c5d711f2d27c09240b1ceaff0830f7236d3813a77cb329ecee8c1287f65d529b98092e2c86623f7072fdf15ca6bab092ae3e80d7c
-
Filesize
5KB
MD5ed8d17e205eade25b740b9db320fad0a
SHA14122e5ab0ee0af3f9dbabfbae5ab67f514e89ed1
SHA256bc28f3c13ae73fc19c0b7b7ccaacfd1c2cf30e52abdbe4eff5fd01a2ab70371f
SHA51295b70b5a9c5c654594c3a72a26ec2efdc93b0de41c015f4b589523e945e10bc90a7c5a442e95b072be688aacd57230aa35ff29aff533bcb17f46a1d392705378
-
Filesize
6KB
MD5af15ce71b8ee6f2b68b0d1162339404c
SHA19e2cf6116d08ec7177f26208b6a06389a891d4de
SHA25664d8dbdbdc8781ad0bd1bc07d34f9279faba0bfab52c68605243f74cd0bcec51
SHA512de7f61c05fb668870e9eec44b28d41d46baec811116cc72bcb8874ae5adb3a12104838f4e592e2abb1a8e11a9058a8405a100146e78a30e8d1b341c9c7703d71
-
Filesize
6KB
MD5dea05b597dbf03c34190ca40d8833433
SHA15c84170b750bc8a6cd196039df7c0136a74b9aea
SHA25667214ec617d5aa4de0fb807e56e1ff9371b33df3cc9f1daa03f672d4ff3ecb6c
SHA5123c942aa56a4267e7ec20619c97338cc9c9e395ec20ca46c341e87b3f303ddb268484773632aeb034939abb5183da44222d203613a2fd5343a9927ccee9a0fcd3
-
Filesize
7KB
MD5d504b3187d8a2bc7e1212d9464b07c43
SHA19536a05b32ddec3d49b77809f572f82a73b9eeef
SHA256e8ed97cc473540566cb67db5c9c6356321aa147667c7e855bfcf096957416225
SHA512cb7ad765e5c37b8631d4405b08d0597fe832c041921837bb99bcb92edae51dbb318d35dd2b1c534c3368cb520fddb8f64d687757b4d3d04532c8bda4939c3400
-
Filesize
6KB
MD545c014cd6ad15200744fd4f085dd67bd
SHA1ab318c7f80d2f72efd9b209de5ccbf926352bad6
SHA2566d39d84f00386b64ddbfca2db3f88b92295914fa0cd5d9068ded5d8584175c8f
SHA5128f58090e667cee3cfdd5aaecf394b8e27f65f01ee8f25962acec0bd296b07c352b8a8427aa3167e70cf0576f5118c5ef3e1c615b65adeb01bb0b357bc863c3dd
-
Filesize
6KB
MD5408cb205e391f571156814a22e918240
SHA1d70731c1494028d2d8136b1d6f43093703d072b2
SHA256ebef8c833ab056565a9ef768c8f6bd5d7783aef70eaefe53412dc1cd986ae9ee
SHA5127846241625e398d6eb1fb1188ce09ecfca5ff4207561d740922f53cd18fde77eaf5636d19ecd47d0b5715cd7a4c726508d70340ba436e82e54e84f23a126b577
-
Filesize
6KB
MD5b6991eff7d18769703a365fc5ede38ac
SHA1e7e3af31ee61b69068c8528412c6224c8ab58032
SHA256fcb381e96c5d8e7acbc29eab7be05e1c06f8d050e46136a1044825db209c5832
SHA5120b1935d29ffabec058d64438ac16458ab1e6c708b9623b5f4c4d811e8329735c40d1c1a1ca3c7867c89e8d2de0ac1abc1aee9f652c6101f5b3bfd17e7f7c0270
-
Filesize
6KB
MD5036f3a82bc2c962a0b0e289790b11137
SHA1b64f9ddb0efbb8b9bfbba6284a638fa5f695f7a6
SHA256b32e5d5134e60d0c9f9cfa857f96107804afed3608459536d57d9fafefbc7450
SHA5123934c737e77b65fc3780b273bbe9c9a89ece14a1e93b40a37a1132c65d0c5150d3317bdeb6e260f3f42d04f26e5e8dfb4ed55a38d53d7466f0ad2240a96c6ccf
-
Filesize
6KB
MD509ff9f99142fdc6e3458978b19f7bdc4
SHA1e22912290eca9da5bfc8182145bed5a5089b5942
SHA256fa3df3d05da38f1684e582c258c0f82b171dcedf7bfae04506d21275b4ea1020
SHA512999f394011c93b558756c6f2045ff13d8872b9fd9d17a91158bb49831b302146ba8ba54703fcba8744f2d6fb83daa4432588c771be49a843fbcbdad52741ac28
-
Filesize
6KB
MD5ee7f54713ed853e1d6237cb251c3a08b
SHA1e479b035faf01c799a8c33ed310ff259b60bdb3e
SHA25621a88fd56eb6950db2a5d952763d5289ceaf494b7fbc945acb52c604d0d10e81
SHA5127a9cd6a8cf6d9f9545c251bf842898cc843aa0de18d38283848922a2b50828b81d64c4cf134712b1391415f15d3f403dce44123de9438962f3157aacffc192a0
-
Filesize
7KB
MD51b37eac8a70ad807e59850e844b54dc6
SHA1a12c3c6d17cf1596c929d58cfa37018fb5ec8e65
SHA256f23186b8fbca33b89dabee8eb8b5d7aaa7a371ae7e360ecbba126c80c86ddf9d
SHA51264e2a6dad8f95c6ffaf1dfbb30892432b2070660c04194dad4e6fc38f652ce0db1fe68304863875d2fec85c574ce8443c09800c8908637f2ef3783b21035914e
-
Filesize
7KB
MD5fd6fb4be4124b7a9148eb3e285be2a15
SHA164b470617551180353ef4f504e7fd54bee056f6d
SHA2560941e9153530dc36d920da7814a861e509a59143662bd72908ab30c0a46d19b2
SHA512f40126ec4218a0bf62251453e8fb1e6bbff781d86ba8b8448e260321d76577f56f9378ed07ae17d0b6ca58f91e174d166c990a5c623bb79674388d79e308cb0b
-
Filesize
6KB
MD570eab7b4d8200954a44c508877afb52c
SHA1fff1a54dc5c9cebc6ba70f093249a1b65f86a9c7
SHA2563dfe4af6e2dcb7d855424247d5ed36b6b573fa458b13dd28c3ee98b43b553497
SHA512e531c3903e86e9994ebeae68de06d201b023d836a7ce6a241c4485d005eac046636aab54b7f4d7471cd4d2b68cf4904be76792b5fc12863766fbe127dd2ffc47
-
Filesize
6KB
MD518bc34865bdb68fe54d0aa9d91eb8d5d
SHA1c65107c6a913d099d79175744ee834a87c73995c
SHA256c4752123e5ae70915723f74a726cfb93bf4465a2b8fd55f6ee1f3e88cba8ce39
SHA512457fce47359f47faca250f759789747ec337757010b79358da0764907aa4d0856fc3c84b5f1ff8a5a8b3afbfa414a5f6343068e9e87e01e488efe99a40b5f2e7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe57f55c.TMP
Filesize120B
MD501c324913d47c9270cba657624d04ca3
SHA161ce7bd3dbe339760f0a0b84b39d17011d069431
SHA256ae279c9b306c30b7f8ccb681845c3c8e743fbbb704de0f408b193ef0691fef2c
SHA5122d67cefba940b9061b0e75ef661a44c90fc8b849e033aeed12cfc7aa892b888e973b75b60406e9dd8bcd8cfc70b3aa118f9f6323c85bb3d319c1aba268389038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\blob_storage\1de2acb9-5c5f-4c20-aceb-002dc9a03544\4
Filesize446KB
MD593857ddb925d953198f5f72b5f4e9361
SHA13a34c73475866b616fd5341cf0bda0f70a490df9
SHA256d0e94d0118ac8f5bf1b4df3f8991d33d2e5431ce4fb3e6e365a09955a035b097
SHA512780e6c5a718cbe1b96ceea91cf67a787adb9b02ee3178fd4defb5934b74316b51f795044f7ca6d6fe9a59db65c6a7e975292171aa93f03318f148f3056ae538c
-
Filesize
136KB
MD5dc4ff912739ae5f6e93718063bee5892
SHA19a09549ef642f10c274a9ca3a4b889872af28fc8
SHA25622a98139f37aa69d85b87577925dcd7eeeec698fc50a3548e4cce0e78bd0247c
SHA5125e0c978aac6ee3c191478c32da09a3174d6e4acbb6602859656561d06c99e81fa8091763463cd23c26e960f7a63cc36a7311c4ab5e8691ac592b0f5db98c0e6e
-
Filesize
136KB
MD54914b0f5f5a4927ba35ec9c2faad8386
SHA1fbca76867961ef657a70159cba15680c0d5ef7c9
SHA25640538cc2d7e72ef5e3ca44f18134c382a7d8dae4ff59d0f4745754f0d055cf5f
SHA512265b7c5dba5871af284cc62b2b9fd9e832ab5eb4078861f164296cc67b35be7a89a1c8752faae4f2f547da80d906d43de7c030c3b58bb224b48fcd14d9168553
-
Filesize
109KB
MD5105fb7d69af8ba44d3f78ad75665e78a
SHA1a46c88d5921c303f090d28a06f3e2468220435c0
SHA256819dea68d24283a0762e0b6a8c1e299cf8b368f01547e9b586fab8982cf67ecd
SHA512f62d7e84925fdac9613948c67bdde27d0057c933866d68575973c55bf9bca1182efae6b4100095f8ef14888f577e2e9dc0f705e83916b9f02ec97f4311db1082
-
Filesize
110KB
MD596d584c3ca3a4cc93908f3f8b761b0c8
SHA15803be6f3c123a2c9e9ef9c532560e59d6fbb8c9
SHA2564f8c70475ec903339bc0fde82ceca3253a198b60b48c6fcca656027c853dc651
SHA51252b52a702c25d45501a464caa1d38840d8b2961213c6e3933dc1e7c6f3cd865c042c8f0b32107ed94521cb812b23ed126f7e14395874e07f848b6b682315897d
-
Filesize
98KB
MD553e6583d407f2e9ddc4ef47a955c706d
SHA14428f67e38885f032f4111cb38a5226f1d25af5b
SHA256b2b555899140c1063fb6f6029789d9a9e6ae1843352b2881c4d4fc60356ee44d
SHA512c11b6d40a05d1ae54bc28af2b4278308485d8ee3c9e8e7d1470bc5e848b0546a18269d54af2bd345b32be0ec59bb5871b26d6d04068f9c915beb97a06d1fa6db
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1KB
MD5d027361fa608aeb9d3de83b7a4681042
SHA14f49e241c4898964c493ec41c0db41509f309e3e
SHA2565a514452a8d48468df1ed841ea16c512def7515df5c02a8eedd9075bd69a6e2a
SHA512fba4d91f901df32f921cb62707a67e9230e56d2d6d646ea38249136b83b4a354dd0d9bfee0ea58f38787a39ee140f4875d82f483bf70dd17bfc8f127c19a078d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json
Filesize261B
MD51e5ea04d3821813238f4bbd19f277b17
SHA11bdc1c1e0ce61d7cba60c07e3f4f9b26f2eb1b2b
SHA256d0c8ec3657205b2e0a586c22ea2ab186884b8670e42112e90d30100043812745
SHA512b0d15d20a1b53746ec6a71f5aff75c9a24cd2ad43b01e5e4dac8977e53885b7666be1409026be5264b62939dc76f51e4dfec66f23a602981cd29844d8f8dc73c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json
Filesize2KB
MD5404a3ec24e3ebf45be65e77f75990825
SHA11e05647cf0a74cedfdeabfa3e8ee33b919780a61
SHA256cc45905af3aaa62601a69c748a06a2fa48eca3b28d44d8ec18764a7e8e4c3da2
SHA512a55382b72267375821b0a229d3529ed54cef0f295f550d1e95661bafccec606aa1cd72e059d37d78e7d2927ae72e2919941251d233152f5eeb32ffdfc96023e5
-
Filesize
870KB
MD57f728acab22868ca02cc1ba0a14f5d64
SHA19e3e82b152447b8bcd27583fbdab7aa91ca4739d
SHA256586f9a9af50b2a3321e77d2b4583741cc4842967af9429cc371534f7179caec4
SHA5129bc8bb97e6d4f18ec484fcd792466cb5df0bf0447cbaa19a41258ef80e599e8a2b2c83c700f32f30bef578b03614af1b554844d051435dc9f510ccbd56686800
-
Filesize
75KB
MD5e4f28b570442d3265959a64038a8001d
SHA16166a3cd2922f507aff6d1015c2a395df866732b
SHA25640992d00fd633724a88190c36492e9a9941008b6bdbe47ad82995472f0489bd4
SHA512307156a56a47672517eb55fd059e84bbdf7af9e0a563ef6148a20a12377413f84a1092748521745cd23529536ff139b16bac91a0b1317c8a6c5ff24d04fe9994
-
Filesize
437KB
MD522c615e3ede5c9ce4b0e6b157d3cb5a8
SHA14ade6563786d60e20d7d9e004cbb669db2f61f96
SHA25636652fe4c6d926fe6398d49a448b138fc4eca926341bc7feece230dcd540dca5
SHA5120dfcf308be70663966625a23c5acd8763a0e2644da7d5965aef168764a44c4200d5116af8f27dee0b8da12783f50d3ece95ec29b53e690673d0a1b859e2b8328
-
Filesize
1.1MB
MD59a38c29ff9e12ba2892381eb51c79934
SHA176fcf6bcaac32f624fa0154a9177e44469b5886a
SHA25645b75a116aa3b07f90a7c2d9a83c2cde524797df88bb5e20f9dc1e74d8527861
SHA512c26d8c252d6f18a2ae4419bbfe27099862a625cbc40d8f104fa20cb361da112ebe6a17935ac3613c24b58f9c291d2219e55f59e0fa40b81f92fccf190115e734
-
Filesize
181KB
MD510d74de972a374bb9b35944901556f5f
SHA1593f11e2aa70a1508d5e58ea65bec0ae04b68d64
SHA256ab9f6ac4a669e6cbd9cfb7f7a53f8d2393cd9753cc1b1f0953f8655d80a4a1df
SHA5121755be2bd1e2c9894865492903f9bf03a460fb4c952f84b748268bf050c3ece4185b612c855804c7600549170742359f694750a46e5148e00b5604aca5020218
-
Filesize
236KB
MD50575625e5ced1be9f4018c5afa456406
SHA170f86daa07564d318c2825e08e2f70e8bcbd7967
SHA25637e612d9c4d2fdc46c132a1ebac107c720e45135f5c79956140f8d38a951332f
SHA512992f17fe1348d9f4d5f3870302a268998194e8d59c1087b3474568434e8dd90aeefe57aff7d0caa91fcfe7239cf9e9f38094b3767ae9d9bb592c41942282088f
-
Filesize
1.0MB
MD5b4d04928e9a135b023592a2922da704e
SHA1a21543834176e54c960157b6db41ea0a513ba002
SHA2560046fadf9e0a0a8b91b5cbac23ce3108de5f8b3bc577af7f4a18757e1d76a69f
SHA512c934ffd66e600a030b652ef68490371ead2f713a70eb127d7abdb2a139cc1f59b9dcc179f75d5e979dcaf9dde62ec85c37172dc4502e857f7e7dff61b0541931
-
Filesize
916KB
MD5f315e49d46914e3989a160bbcfc5de85
SHA199654bfeaad090d95deef3a2e9d5d021d2dc5f63
SHA2565cbb6442c47708558da29588e0d8ef0b34c4716be4a47e7c715ea844fbcf60d7
SHA512224747b15d0713afcb2641f8f3aa1687516d42e045d456b3ed096a42757a6c10c6626672366c9b632349cf6ffe41011724e6f4b684837de9b719d0f351dfd22e
-
Filesize
837KB
MD5c2c0e8a4b2790140ea1aae223669c48f
SHA1664a18b5db524fad9e43df2b9c3c0577562082a7
SHA256b23eccb36868753a1131a9a6b88b33324b3cdd7e232fb80cb5df4e2994f5a9e6
SHA512df22757f866564887154c54a053f919f03a27ced1446b95979b02b8960ec499167f6e9c3a1f76e8359ad044c8a5ed2c6addc4874a712f75726a24d3029a8587e
-
Filesize
564KB
MD5e63eb8701abeafc17e18807f996a2c4b
SHA1e11387f6c188416f43e1a72f4ffdd759f4e43e54
SHA2567eafd43c18f9613d762567cb5e00d58df71208d6b94c23d634daec42170e0d6c
SHA512d996ea9566a588bb30fbaeb38435026804b80770a22a1438589e86e47f13ef07187538a105613bfc907bf9a6a377805f69d9e9de071e7ae57aeb11d4ac98a136
-
Filesize
533KB
MD57808dde5c4f694e10a02079121ef8ffa
SHA1c40cbe977a1abcd34506ea80f101677c1b64503d
SHA2568b33efd883f9c13bfef8544018f823ae6ed3469ac476864469cf4a3abb4c203b
SHA512aa64707a077fcf9cc41e7db85e5160214442a808caed627b5f083ac0da8e87bf33f3545162e06f51483ce498706912e94b83419d825aba11d7bc184d602b9e76
-
Filesize
10KB
MD52bb7a31b5f742d86dc3da75062721ca1
SHA156b13fb8ee798225754f9e5041344481ceb8d898
SHA256efb2c2a1a35d64c72c38fe933c11035e3d8c3849a36ecb37cd10c903a4267ca6
SHA512b362a589519def2b2ff167bc76e4268fcebf690e9c17fbf710055312eb9cf9f30bba0264767fa60f912f5368e1808ae0f1aecca2c109d039ac846a9fd6414bd6
-
Filesize
5.4MB
MD5dd0cd5436709146f9ded29cdab6f9847
SHA13edf49f80bb9c4a46ca9379e25c8366d94be7d0d
SHA256d0607369ec47f863c1b6bf52527c54a5bbabb97736c22f46eb01c45864a68fdf
SHA512253766a39558d4fe1c61274dbbc6e04631aecf2f1247bd9d3dce75b970e2628d0b0530dbb321ce8475a0e30e2aa2b970aa821a7f38920fc19d55c4765a129cbb
-
Filesize
21KB
MD5b84df77564555c63c899fce0fcec7edb
SHA1e63e7560b3c583616102cad58b06433b1a9903b0
SHA256912ebab4ab2ea830b961df778dd854e555c89e05e25b7c02b3737429115405f9
SHA512857717981c44a6a5fbb1bd34308e981c448746e0ea2d5bea94516fea20d0186e00a3547ad0b948c10fd9493e3ca00c0899927b0fa51c240697faacbbecca033a
-
Filesize
92KB
MD5e1313b2911f7bf6d2015b4bc1083bbcd
SHA11a9b89aedcc2e1f47df24e26e7ca9dd132142176
SHA25630d271f0c2bd9dfbab62bc37237e3eb43e6d2ccc6c3431062f06f918260cd86a
SHA512a92a17db4da8b35fa704b740c1de768e4f628e0358471e0324cbce2e6254fccb26a0647e18fb597dcca190f1271d7b5a0a3e58508e37c540a9b8fe9f82f4b97c
-
Filesize
26.0MB
MD5ac4dd343a832e3a1cb98f5864af9fc6e
SHA1c751cf764456f5a912e08710ab71524ad95bc291
SHA2566c41ea6ba27b732d307aae4c7c6ee5c179d970d1833b1a7a05b3c4781b0797af
SHA5123ad3cf4005aa28d7302b341a9f0069fcdf076ff92fb4844bfa9e91f33d93ad275c9e37393f2bd50885cdc33e4fb28170b2348ce9728871abf43bb4dee533affc
-
\??\Volume{39cd0eda-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{b2d40473-8263-4df4-bdf5-653e92ac4e84}_OnDiskSnapshotProp
Filesize5KB
MD541ec19e145ced0ec1de825760660aa8b
SHA102b73c84c383565900a3ea4cc00c274c70153be4
SHA2563782af10455d67d0c65bcbb77ed25761f759bb1382a61dda7271f28503008b9a
SHA51233c78e1ac7c3e741cd2e5f5d4a3beae101bf71fc333b26f966657488b27e830538e26214d133042e60a627fde2309448b4a18b090a70f43fbba8faa91dc5d099