Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe
Resource
win10v2004-20240508-en
General
-
Target
3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe
-
Size
69.1MB
-
MD5
9c0e635401b0bc6bb9f32bf61c831309
-
SHA1
1ba8408785b86eea68702003b200822f2b8768ad
-
SHA256
3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff
-
SHA512
d8adf0313061d1f9a32bc00fbdc9f414cc117e2017101bdcba7da34a3b124d759fbc029d62eb62aa89a135b964e33610e62d3b7a90200126578f7e2687b4b870
-
SSDEEP
1572864:YVo7Cqx85SMJ/A/8Ww5XF6aC0TIOR6+m8YKF60K7H:6o21/AUB5XF8WIOR6+PO0KL
Malware Config
Extracted
quasar
1.3.0.0
iSpring Suite
dragons.4cloud.click:1982
rAok3Bn91dJeJbDXOl
-
encryption_key
1KJfoF8pVLBGtN9uzB0i
-
install_name
Client.exe
-
log_directory
4K
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1980-1272-0x0000000000400000-0x0000000000581000-memory.dmp family_quasar behavioral1/memory/1980-1497-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid process 2964 powershell.exe 644 powershell.exe -
Drops file in Drivers directory 2 IoCs
Processes:
SystemMechanic_Ultimate_Defense.exedescription ioc process File created C:\Windows\system32\drivers\pgfilter.sys SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Windows\system32\drivers\pgfilter.sys SystemMechanic_Ultimate_Defense.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 788 netsh.exe -
Executes dropped EXE 7 IoCs
Processes:
SystemMechanic_Ultimate_Defense.exeAfhandlinger.exenfregdrv.exeincinerator.exeiolo.exeioloTrayApp.exeioloTrayApp.exepid process 2428 SystemMechanic_Ultimate_Defense.exe 2752 Afhandlinger.exe 752 nfregdrv.exe 2192 incinerator.exe 2264 iolo.exe 596 ioloTrayApp.exe 1612 ioloTrayApp.exe -
Loads dropped DLL 17 IoCs
Processes:
3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exepowershell.exenfregdrv.exeSystemMechanic_Ultimate_Defense.exeincinerator.exeiolo.exeioloTrayApp.exeregsvr32.exeioloTrayApp.exepid process 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2964 powershell.exe 2964 powershell.exe 752 nfregdrv.exe 2428 SystemMechanic_Ultimate_Defense.exe 2192 incinerator.exe 2264 iolo.exe 2264 iolo.exe 2264 iolo.exe 596 ioloTrayApp.exe 596 ioloTrayApp.exe 596 ioloTrayApp.exe 1664 regsvr32.exe 1612 ioloTrayApp.exe 1612 ioloTrayApp.exe 1612 ioloTrayApp.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Incinerator regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Incinerator\ = "{E8215BEA-3290-4C73-964B-75502B9B41B2}" regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 17 IoCs
Processes:
regsvr32.exeincinerator.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8215BEA-3290-4C73-964B-75502B9B41B2}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\LocalServer32 incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\InprocServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BF2E05D5-4FD3-47D4-B502-6AF23DFF1CF5}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\LocalServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\incinerator.exe" incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BF2E05D5-4FD3-47D4-B502-6AF23DFF1CF5}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8215BEA-3290-4C73-964B-75502B9B41B2}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8215BEA-3290-4C73-964B-75502B9B41B2}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BF2E05D5-4FD3-47D4-B502-6AF23DFF1CF5}\InProcServer32 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tetchy = "%Aortographies% -windowstyle minimized $Wrestling=(Get-ItemProperty -Path 'HKCU:\\Beskyldning\\').Strandboernes;%Aortographies% -windowstyle minimized ($Wrestling)" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 22 ip-api.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
wab.exepid process 1980 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 2964 powershell.exe 1980 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2964 set thread context of 1980 2964 powershell.exe wab.exe -
Drops file in Program Files directory 64 IoCs
Processes:
SystemMechanic_Ultimate_Defense.exedescription ioc process File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\driver\wfp\windows8\std\i386\pgfilter.sys SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\portscan.exe SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Practices.Prism.MefExtensions.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.AI.ServerTelemetryChannel.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Identity.Client.Broker.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Identity.Client.Desktop.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\nl\ACResources.resources.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\TraceReloggerLib.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Practices.EnterpriseLibrary.Common.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\EndpointProtectionClient.Net.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\SMInfrastructure.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ProtocolFilters.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\fr\ACResources.resources.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\driver\tdi\std\amd64\netfilter2.sys SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\driver\wfp\windows10\wpp\amd64\pgfilter.sys SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\mpns.exe SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\install_wfp_driver_windows10.bat SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\msalruntime.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\InstallDriver.bat SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\PDFsFilter.inf SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\install_wfp_driver_windows10_x64.bat SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Identity.Client.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\SystemShield.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\ProtocolFilters.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\btscan.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Practices.ServiceLocation.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\MessageRpc.Net.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\System.Windows.Interactivity.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ToolKit.Interop.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\gpp.exe SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\log4net.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ACResources.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\NLog.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\iolo.exe SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\driver\wfp\windows7\std\i386\pgfilter.sys SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\driver\wfp\windows8\std\amd64\pgfilter.sys SystemMechanic_Ultimate_Defense.exe File created C:\Program Files\iolo technologies\System Mechanic\bootstrap.exe SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.ApplicationInsights.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\EntitlementDefinitions.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\es\ACResources.resources.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\driver\wfp\windows10\std\amd64\pgfilter.sys SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\EndpointProtectionInterfaces.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ActiveBridge.exe.config SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\install_wfp_driver_windows8.bat SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\it\ACResources.resources.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\SmartPlug.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\SDKModels.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\install_wfp_driver_windows7.bat SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WWSDK.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\DriveScrubber.ico SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\PDFsFilter.sys SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\uninstall_driver.bat SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Incinerator.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Web.WebView2.Core.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\DotNetZip.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe.config SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Diagnostics.Tracing.TraceEvent.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\MacAddressVendorLookup.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\nfregdrv.exe SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.mshtml.dll SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WSC.exe.config SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ioloIcon.ico SystemMechanic_Ultimate_Defense.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\driver\tdi\wpp\i386\netfilter2.sys SystemMechanic_Ultimate_Defense.exe -
Drops file in Windows directory 1 IoCs
Processes:
Afhandlinger.exedescription ioc process File opened for modification C:\Windows\isoprenoid.asi Afhandlinger.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
incinerator.exeioloTrayApp.exeioloTrayApp.exeiolo.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI incinerator.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI incinerator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI incinerator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iolo.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iolo.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iolo.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe -
Processes:
iexplore.exeIEXPLORE.EXEiolo.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl iolo.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF2097B1-2410-11EF-AB84-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION\iolo.exe = "11001" iolo.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION iolo.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\iolo.exe = "11001" iolo.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iolo.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000bd2da28f744b2aeb97bf8893c65186f284ed775541a8ca9c67e9e23ac03bc076000000000e8000000002000020000000f3ea6e4dd0c9718a0914158f948536ef74644704e8fbaa1a0f1a7d6e1d3c799520000000fd394077e1af7375e14345ce676602551d58d70d89009cfd89619f5c2e9c938e40000000bc7b070c1ecf37532031645b50380d6209017ed1ea8af313a87f6c54aab5e83812156808772f21b2952ef7b7d6e7e5b644f816cfc00dfb2ec49fa0dd28cb63bb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20015dc51db8da01 iexplore.exe -
Modifies registry class 64 IoCs
Processes:
incinerator.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Incinerator.IncineratorImpl\Clsid incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\InprocServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C4831C1C-E17D-4711-BDF2-0FD935DC2F39}\1.0\0\win64\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\incinerator.exe" incinerator.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\Elevation\Enabled = "1" incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\ProgID\ = "Incinerator.IncineratorImpl" incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\ = "Incinerator Junction Point Context Menu Handler" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BF2E05D5-4FD3-47D4-B502-6AF23DFF1CF5}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{603D0C8E-469F-460A-BCBB-BBF6E90A7C15} incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{603D0C8E-469F-460A-BCBB-BBF6E90A7C15} incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{603D0C8E-469F-460A-BCBB-BBF6E90A7C15}\TypeLib incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\ = "Incinerator" incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8215BEA-3290-4C73-964B-75502B9B41B2}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\VersionIndependentProgID\ = "Incinerator.2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{603D0C8E-469F-460A-BCBB-BBF6E90A7C15}\ = "IIncinerator" incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\Version\ = "1.0" incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{603D0C8E-469F-460A-BCBB-BBF6E90A7C15}\ = "IIncinerator" incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Incinerator.2\CLSID\ = "{D90EF6CF-32CB-476D-B57C-1A71E58E8301}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BF2E05D5-4FD3-47D4-B502-6AF23DFF1CF5}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C4831C1C-E17D-4711-BDF2-0FD935DC2F39} incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Incinerator.IncineratorImpl incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.SendToIncinerator regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Incinerator.2\CurVer\ = "Incinerator.2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ShellFolder\PinToNameSpaceTree regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ShellEx\DropHandler regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ShellEx\DropHandler\ = "{D90EF6CF-32CB-476D-B57C-1A71E58E8301}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Incinerator.IncineratorImpl\ = "Incinerator" incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\TypeLib\ = "{C4831C1C-E17D-4711-BDF2-0FD935DC2F39}" incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Incinerator regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{603D0C8E-469F-460A-BCBB-BBF6E90A7C15}\TypeLib\Version = "1.0" incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\Elevation\IconReference = "@C:\\Program Files\\iolo technologies\\System Mechanic\\incinerator.exe,-102" incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ShellEx\ContextMenuHandlers\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\ = "{9081C77F-9FAF-4551-A878-10A4249CD1FA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\NeverShowExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\ProgID incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\Version incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ProgID\ = "Incinerator.2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\DefaultIcon regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\Incinerator\ = "{F148A78C-91B1-45DC-83A9-291108F3B245}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\Incinerator regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5} incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C4831C1C-E17D-4711-BDF2-0FD935DC2F39}\1.0\0\win64 incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5} incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Incinerator.2\ = "Incinerator" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ShellEx\ContextMenuHandlers regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BF2E05D5-4FD3-47D4-B502-6AF23DFF1CF5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{603D0C8E-469F-460A-BCBB-BBF6E90A7C15}\ProxyStubClsid32 incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{603D0C8E-469F-460A-BCBB-BBF6E90A7C15}\TypeLib incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ShellEx regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C4831C1C-E17D-4711-BDF2-0FD935DC2F39}\1.0\HELPDIR\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\" incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Incinerator.2\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\LocalServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\incinerator.exe" incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\TypeLib incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Incinerator.2\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ShellEx\PropertySheetHandlers regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245}\ = "Incinerator Recycle Bin context menu" regsvr32.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
SystemMechanic_Ultimate_Defense.exepowershell.exepowershell.exeiolo.exeioloTrayApp.exeioloTrayApp.exepid process 2428 SystemMechanic_Ultimate_Defense.exe 2428 SystemMechanic_Ultimate_Defense.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 2428 SystemMechanic_Ultimate_Defense.exe 2428 SystemMechanic_Ultimate_Defense.exe 2428 SystemMechanic_Ultimate_Defense.exe 644 powershell.exe 2264 iolo.exe 2264 iolo.exe 2264 iolo.exe 596 ioloTrayApp.exe 596 ioloTrayApp.exe 2264 iolo.exe 1612 ioloTrayApp.exe 1612 ioloTrayApp.exe 1612 ioloTrayApp.exe 1612 ioloTrayApp.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 476 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 2964 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SystemMechanic_Ultimate_Defense.exepowershell.exeiolo.exepowershell.exewab.exeioloTrayApp.exeioloTrayApp.exedescription pid process Token: SeDebugPrivilege 2428 SystemMechanic_Ultimate_Defense.exe Token: SeDebugPrivilege 2964 powershell.exe Token: SeDebugPrivilege 2264 iolo.exe Token: SeIncreaseQuotaPrivilege 2264 iolo.exe Token: SeSecurityPrivilege 2264 iolo.exe Token: SeTakeOwnershipPrivilege 2264 iolo.exe Token: SeLoadDriverPrivilege 2264 iolo.exe Token: SeSystemProfilePrivilege 2264 iolo.exe Token: SeSystemtimePrivilege 2264 iolo.exe Token: SeProfSingleProcessPrivilege 2264 iolo.exe Token: SeIncBasePriorityPrivilege 2264 iolo.exe Token: SeCreatePagefilePrivilege 2264 iolo.exe Token: SeBackupPrivilege 2264 iolo.exe Token: SeRestorePrivilege 2264 iolo.exe Token: SeShutdownPrivilege 2264 iolo.exe Token: SeDebugPrivilege 2264 iolo.exe Token: SeSystemEnvironmentPrivilege 2264 iolo.exe Token: SeRemoteShutdownPrivilege 2264 iolo.exe Token: SeUndockPrivilege 2264 iolo.exe Token: SeManageVolumePrivilege 2264 iolo.exe Token: 33 2264 iolo.exe Token: 34 2264 iolo.exe Token: 35 2264 iolo.exe Token: SeDebugPrivilege 644 powershell.exe Token: SeDebugPrivilege 1980 wab.exe Token: SeDebugPrivilege 596 ioloTrayApp.exe Token: SeIncreaseQuotaPrivilege 596 ioloTrayApp.exe Token: SeSecurityPrivilege 596 ioloTrayApp.exe Token: SeTakeOwnershipPrivilege 596 ioloTrayApp.exe Token: SeLoadDriverPrivilege 596 ioloTrayApp.exe Token: SeSystemProfilePrivilege 596 ioloTrayApp.exe Token: SeSystemtimePrivilege 596 ioloTrayApp.exe Token: SeProfSingleProcessPrivilege 596 ioloTrayApp.exe Token: SeIncBasePriorityPrivilege 596 ioloTrayApp.exe Token: SeCreatePagefilePrivilege 596 ioloTrayApp.exe Token: SeBackupPrivilege 596 ioloTrayApp.exe Token: SeRestorePrivilege 596 ioloTrayApp.exe Token: SeShutdownPrivilege 596 ioloTrayApp.exe Token: SeDebugPrivilege 596 ioloTrayApp.exe Token: SeSystemEnvironmentPrivilege 596 ioloTrayApp.exe Token: SeRemoteShutdownPrivilege 596 ioloTrayApp.exe Token: SeUndockPrivilege 596 ioloTrayApp.exe Token: SeManageVolumePrivilege 596 ioloTrayApp.exe Token: 33 596 ioloTrayApp.exe Token: 34 596 ioloTrayApp.exe Token: 35 596 ioloTrayApp.exe Token: SeDebugPrivilege 1612 ioloTrayApp.exe Token: SeIncreaseQuotaPrivilege 1612 ioloTrayApp.exe Token: SeSecurityPrivilege 1612 ioloTrayApp.exe Token: SeTakeOwnershipPrivilege 1612 ioloTrayApp.exe Token: SeLoadDriverPrivilege 1612 ioloTrayApp.exe Token: SeSystemProfilePrivilege 1612 ioloTrayApp.exe Token: SeSystemtimePrivilege 1612 ioloTrayApp.exe Token: SeProfSingleProcessPrivilege 1612 ioloTrayApp.exe Token: SeIncBasePriorityPrivilege 1612 ioloTrayApp.exe Token: SeCreatePagefilePrivilege 1612 ioloTrayApp.exe Token: SeBackupPrivilege 1612 ioloTrayApp.exe Token: SeRestorePrivilege 1612 ioloTrayApp.exe Token: SeShutdownPrivilege 1612 ioloTrayApp.exe Token: SeDebugPrivilege 1612 ioloTrayApp.exe Token: SeSystemEnvironmentPrivilege 1612 ioloTrayApp.exe Token: SeRemoteShutdownPrivilege 1612 ioloTrayApp.exe Token: SeUndockPrivilege 1612 ioloTrayApp.exe Token: SeManageVolumePrivilege 1612 ioloTrayApp.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exepid process 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exepid process 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
iexplore.exeIEXPLORE.EXEwab.exeiolo.exepid process 3040 iexplore.exe 3040 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 1980 wab.exe 2264 iolo.exe 2264 iolo.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exeAfhandlinger.exeSystemMechanic_Ultimate_Defense.exepowershell.exewab.execmd.exeiexplore.exeiolo.exedescription pid process target process PID 2020 wrote to memory of 2428 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe SystemMechanic_Ultimate_Defense.exe PID 2020 wrote to memory of 2428 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe SystemMechanic_Ultimate_Defense.exe PID 2020 wrote to memory of 2428 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe SystemMechanic_Ultimate_Defense.exe PID 2020 wrote to memory of 2428 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe SystemMechanic_Ultimate_Defense.exe PID 2020 wrote to memory of 2752 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe Afhandlinger.exe PID 2020 wrote to memory of 2752 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe Afhandlinger.exe PID 2020 wrote to memory of 2752 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe Afhandlinger.exe PID 2020 wrote to memory of 2752 2020 3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe Afhandlinger.exe PID 2752 wrote to memory of 2964 2752 Afhandlinger.exe powershell.exe PID 2752 wrote to memory of 2964 2752 Afhandlinger.exe powershell.exe PID 2752 wrote to memory of 2964 2752 Afhandlinger.exe powershell.exe PID 2752 wrote to memory of 2964 2752 Afhandlinger.exe powershell.exe PID 2428 wrote to memory of 752 2428 SystemMechanic_Ultimate_Defense.exe nfregdrv.exe PID 2428 wrote to memory of 752 2428 SystemMechanic_Ultimate_Defense.exe nfregdrv.exe PID 2428 wrote to memory of 752 2428 SystemMechanic_Ultimate_Defense.exe nfregdrv.exe PID 2428 wrote to memory of 752 2428 SystemMechanic_Ultimate_Defense.exe nfregdrv.exe PID 2964 wrote to memory of 1980 2964 powershell.exe wab.exe PID 2964 wrote to memory of 1980 2964 powershell.exe wab.exe PID 2964 wrote to memory of 1980 2964 powershell.exe wab.exe PID 2964 wrote to memory of 1980 2964 powershell.exe wab.exe PID 2964 wrote to memory of 1980 2964 powershell.exe wab.exe PID 2964 wrote to memory of 1980 2964 powershell.exe wab.exe PID 2428 wrote to memory of 2192 2428 SystemMechanic_Ultimate_Defense.exe incinerator.exe PID 2428 wrote to memory of 2192 2428 SystemMechanic_Ultimate_Defense.exe incinerator.exe PID 2428 wrote to memory of 2192 2428 SystemMechanic_Ultimate_Defense.exe incinerator.exe PID 2428 wrote to memory of 788 2428 SystemMechanic_Ultimate_Defense.exe netsh.exe PID 2428 wrote to memory of 788 2428 SystemMechanic_Ultimate_Defense.exe netsh.exe PID 2428 wrote to memory of 788 2428 SystemMechanic_Ultimate_Defense.exe netsh.exe PID 1980 wrote to memory of 656 1980 wab.exe cmd.exe PID 1980 wrote to memory of 656 1980 wab.exe cmd.exe PID 1980 wrote to memory of 656 1980 wab.exe cmd.exe PID 1980 wrote to memory of 656 1980 wab.exe cmd.exe PID 656 wrote to memory of 2480 656 cmd.exe reg.exe PID 656 wrote to memory of 2480 656 cmd.exe reg.exe PID 656 wrote to memory of 2480 656 cmd.exe reg.exe PID 656 wrote to memory of 2480 656 cmd.exe reg.exe PID 2428 wrote to memory of 3040 2428 SystemMechanic_Ultimate_Defense.exe iexplore.exe PID 2428 wrote to memory of 3040 2428 SystemMechanic_Ultimate_Defense.exe iexplore.exe PID 2428 wrote to memory of 3040 2428 SystemMechanic_Ultimate_Defense.exe iexplore.exe PID 2428 wrote to memory of 2264 2428 SystemMechanic_Ultimate_Defense.exe iolo.exe PID 2428 wrote to memory of 2264 2428 SystemMechanic_Ultimate_Defense.exe iolo.exe PID 2428 wrote to memory of 2264 2428 SystemMechanic_Ultimate_Defense.exe iolo.exe PID 3040 wrote to memory of 2668 3040 iexplore.exe IEXPLORE.EXE PID 3040 wrote to memory of 2668 3040 iexplore.exe IEXPLORE.EXE PID 3040 wrote to memory of 2668 3040 iexplore.exe IEXPLORE.EXE PID 3040 wrote to memory of 2668 3040 iexplore.exe IEXPLORE.EXE PID 1980 wrote to memory of 644 1980 wab.exe powershell.exe PID 1980 wrote to memory of 644 1980 wab.exe powershell.exe PID 1980 wrote to memory of 644 1980 wab.exe powershell.exe PID 1980 wrote to memory of 644 1980 wab.exe powershell.exe PID 2264 wrote to memory of 596 2264 iolo.exe ioloTrayApp.exe PID 2264 wrote to memory of 596 2264 iolo.exe ioloTrayApp.exe PID 2264 wrote to memory of 596 2264 iolo.exe ioloTrayApp.exe PID 2264 wrote to memory of 1664 2264 iolo.exe regsvr32.exe PID 2264 wrote to memory of 1664 2264 iolo.exe regsvr32.exe PID 2264 wrote to memory of 1664 2264 iolo.exe regsvr32.exe PID 2264 wrote to memory of 1664 2264 iolo.exe regsvr32.exe PID 2264 wrote to memory of 1664 2264 iolo.exe regsvr32.exe PID 2264 wrote to memory of 1612 2264 iolo.exe ioloTrayApp.exe PID 2264 wrote to memory of 1612 2264 iolo.exe ioloTrayApp.exe PID 2264 wrote to memory of 1612 2264 iolo.exe ioloTrayApp.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe"C:\Users\Admin\AppData\Local\Temp\3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\SystemMechanic_Ultimate_Defense.exeC:\Users\Admin\AppData\Local\Temp/SystemMechanic_Ultimate_Defense.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\nfregdrv.exe"C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\nfregdrv.exe" pgfilter3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:752 -
C:\Program Files\iolo technologies\System Mechanic\incinerator.exe"C:\Program Files\iolo technologies\System Mechanic\incinerator.exe" /regserver3⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Checks SCSI registry key(s)
- Modifies registry class
PID:2192 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name=ioloTrayApp dir=in action=allow program="C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:788 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.iolo.com/landing/thanks-for-installing-system-mechanic/?utm_source=smud&utm_medium=product&p=a50de83f-efec-48d0-b4dc-3e98620fc509&pg=bf06aa46-be9b-4ecb-94f1-047d8c0a149f&b=00000000-0000-0000-0000-000000000000&e=11a12794-499e-4fa0-a281-a9a9aa8b2685&l=en&sn=&appver=24.0.1.52&inapp=0&utm_campaign=33⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Program Files\iolo technologies\System Mechanic\iolo.exe"C:\Program Files\iolo technologies\System Mechanic\iolo.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe"C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:596 -
C:\Windows\system32\regsvr32.exe"regsvr32" "C:\Program Files\iolo technologies\System Mechanic\Incinerator.dll" /s4⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Registers COM server for autorun
- Modifies registry class
PID:1664 -
C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe"C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Afhandlinger.exeC:\Users\Admin\AppData\Local\Temp/Afhandlinger.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$defeatists=Get-Content 'C:\Users\Admin\AppData\Local\Temp\gesjftigeres\tholeite\fingerable\Strategier\Gabrielle.Sel0';$Preregulating=$defeatists.SubString(37841,3);.$Preregulating($defeatists)"3⤵
- Command and Scripting Interpreter: PowerShell
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"4⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tetchy" /t REG_EXPAND_SZ /d "%Aortographies% -windowstyle minimized $Wrestling=(Get-ItemProperty -Path 'HKCU:\Beskyldning\').Strandboernes;%Aortographies% -windowstyle minimized ($Wrestling)"5⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tetchy" /t REG_EXPAND_SZ /d "%Aortographies% -windowstyle minimized $Wrestling=(Get-ItemProperty -Path 'HKCU:\Beskyldning\').Strandboernes;%Aortographies% -windowstyle minimized ($Wrestling)"6⤵
- Adds Run key to start application
- Modifies registry key
PID:2480 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath C:/5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5af7b07ad92b0f2e7653aa83017dc58e1
SHA12c35bd2cfc632d9305b6b6d6bc39785d5a18cb07
SHA256f150bc78c52b926748f890be86b916ba98bed29ad3573ae572283ba22bcbfee9
SHA5122923a95421a02629244d59740672888ecf9c5f16a1fb728bdcd0fc6a6cc70a572b96a06419f808b2b93bff971c0518c07e68301c18309f5379c1bceccdd9b00e
-
Filesize
471KB
MD522cc601e2e4c1ba16181453689bd00c7
SHA178b48b9621f498ccbb3eb40c49855d880d0a1ef0
SHA2564471f5c4cd0490df6671e82614967422ba7ec91b813850e86b5d9a446e91e426
SHA5129492bf4e697660df91ca696fe68896ae375c815d691a7fd25a92768be5b64ee8c084d2fd1bd146db60cf5c21ab57f723c72caa4566fd7aedcca9e6b85ba56cb0
-
Filesize
90KB
MD5a26a37505f094367b1f59585a44310b1
SHA16bc11e681b693802b159cc0b3f81d23a1ef02f0e
SHA256b6dc600b2c91f1607fbd8fa13c3d8fa0f1f51f6cfee1a4d489025b650e698b39
SHA512803d8ebcd5cff56ed2cc2949485be42a850812f113bac0b9ee66cc29364214bc482dd5a4a1d80a805686e1380b57ad0628e7524d9c44ddc5956ae8ba8c38f58e
-
Filesize
99KB
MD54e12a037bfa3c33ff67ffd1a6e6a7309
SHA16a75106b90c679e7da6f387db6caa437c79e995d
SHA2564d811ec13f61efba06e797671e8eb0188f9072b5059251eba418a1e6e6e626af
SHA512f22e5cf405f54b3dc77a368745d4503a8c0b8d7780404b74eae446eb6a3cba99e36bc35479408d7a6586206dcf78c9022ed99dd0648113b54fb42de2e1a9d336
-
Filesize
125KB
MD5783efd3e7f292424358a526c5ea3ee67
SHA1c953b99c77b416749161658c476d47cf2c687a73
SHA256314a86a28cc956f40b412920b1c4722562ef648ea712d3f35ff59846d845e781
SHA512ca511e8779f0c6b257659ddd1a42a7e929107aae2674a5e33002445e8c02d60232296103adea8dfba61bc26a19877cc2a58652ddd8d69aba9438225f0f177351
-
Filesize
58KB
MD5eaa84840d1d941c4902e2d66dab0e12d
SHA14b3e8dd5c1096a15fd01f035a8bc589b238e3851
SHA25647f8b8e2f8764cadf8531e35c2171e3ea084f2216932fb94d99243bbb507c88c
SHA51234d43b8f0cd594c396e3602242cf9e97ae32b892d2ae8d08ff6913f75ca6f0b87fb132261dbd1c474f204c66e3d67246c0e3262b1f111cbfb3efc5b7eb524ed7
-
Filesize
119KB
MD59bfe59d2c751d1e7c995111e1571da0b
SHA1331379c17cc69c0f3a4ff7e6969f0e2a3c55a6ee
SHA256182ee364c9ff421c04c26ef537791e7d83d8f615c95d5b0374a8197836b6aeb3
SHA512e94a5d1c750afbb32b453f131b897882d22e03c7364ff65a17fd090e71c30590758d4f6f43bdccd8f8ba146eb9a0f12a1dc8c530c0b94994054d2c2a9fe79bd7
-
Filesize
377KB
MD51ee57089b208e9f12317d509e9a18e07
SHA1a7745e69b3d921b900a1e850ac10916a82d60105
SHA256dd0951ad341e6ee453d0cc40ee4ff4969848885ea773d7a282a862abf7abf159
SHA512557670a9e017dbe0f1382a9f528e9e53955ca2fe203f800420b671db401fc19dd951a288f7c0a187b33e486f0c589b719a64aceb8766a7a53f1d5b590ac3ef3c
-
Filesize
1.6MB
MD5fb228beba97cabd51b9e4a6099d55fca
SHA15e695d4e3a5e093224e568893ac22f937ef94517
SHA256188f56cab17be6cb005252f3029be213c027a17e33b8e89a43643ddcd78fff96
SHA512f20ac02fed4c79368bb3da058bbe4cc07940a2825921223494d80779e681cbd4748ce5c87b65f84832eb6db19570bdeb1049e134004530bc094eb8ee3deb14e6
-
Filesize
38KB
MD51c4b7b8b9cd1c6672016fe5220c6f41f
SHA12e76a7d17655ad7068120191d9d8f1b6fd497736
SHA25651b59720c5aefef16bc277e8aa4810da540ea3c976a44d4a42ab0fe3a3915abc
SHA512b36a942516c29cbeb6b2143cce7135baf60e88bc1f3eff00ba8193220063bf042c7f12a65e6928c69acb7db9258511f0b9a1b1097666df6c3ae663046128dabc
-
Filesize
147KB
MD52a532749f77d7ef8c54798b5c5d4105f
SHA12e73508b69d5fb8a8c60a19a4155703c18255afe
SHA256f1043059a9a6630d152bb6a56effb3f1e295546ab4cf791487762571866b740f
SHA512cc607232db9e354c6728a9d150a111fdac8ca6f5a0ad3bb644b72b3336f6c39836004eea06ddc7dcf7bc1b30cac72a3d7f83ab2d7217ad4cd409b6e8ba1f0518
-
Filesize
29KB
MD56df78bb163d443d95b21f58808320af7
SHA1a0263ec61435d1ee4c18a92a06ac3ea2c42eb730
SHA25679e7be6be7509a1a5263f0292f1462a57744a7c52c4da6475c70a5054d08c327
SHA512d10510ec52c57061ab8c516b30b6fdc1a4602def69482ee0e230e1a161d7a08ca98280ba71478668c36c541d4ef944b17132db46a8d7298dd1f4749add61d372
-
Filesize
234KB
MD569f5b8f16afa0e00862f442401aed9ee
SHA13ba5a721be48a244b4fbfa5a54eaf0c33625648c
SHA256bb9f7254ec7d7107a4cdc2f0b63e9f6bdfe28767060ff91b939cc12746e56d29
SHA512eec8b816eecb07234c409057d2fc5ca89a942949ca4c6ed8179447723393fd0c88cd773d4e9ecbb568073013c0275ccd66307b94111e016d90f6444a772fba8d
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
591KB
MD5bd1a7840c9ded5cb20b587c389b1ec92
SHA11f3d771ca49cb05cab8994d703c5f67390c4c0d6
SHA2567a1232ad71b1172d08a4f218d7078417b086465eaa3b90c12a6d344dddaa419a
SHA512be4fd68c78b0a896c0c1bfa0b075decdb309adbfdeb99da2fc87bdc62321563bc8fcebf95f3bd9283086c19af73308c439efdd6a565458ee55421d7a63dfa61e
-
Filesize
1.0MB
MD5b8902ce2804534c4fb560161b7faea59
SHA1381b5f7e55d0b504562e58c2ea18bdeb5139c49e
SHA2567bc5416af877936c0324476cb6a1e0b50ddbbd7469e1f37c67367af1d0c4a2a3
SHA512e8281c0e93b566f653f24126f8884cedc7ff3a401d746976399571e63563574c8acd1f7f63647bfe4ad697d588c1f2de2a59b6402714a9a73af57aef2bfce425
-
Filesize
8.3MB
MD5db6a27a9f9a56a5fa66712dba8e644a6
SHA181cf5591075cabbafac03c392b0648eb9b285582
SHA256433c8ad03f741b381d79f4e2750824d556178d8d5f209e3919e69c91921b65fb
SHA51268c9c27d5c5f84af61a888ce68cdf9697715f0c4e2901c3447abd00b5972b04916e1f00e54e9b117410e843878f7ba6c08869c525f44ff77658805db62ff93b7
-
Filesize
184KB
MD5faef01b70b8e775a92d4b9e2383f2749
SHA1a35b2fb5fb243319ac4c9b776dad416d76d3aeea
SHA256c8a5ca93d8e40dafd48759226f70f90af8ccbc3a8df45d4e6fd5dc5626b05ab9
SHA512c4b482e1249555f9dabbee97b030792617a250362aef175dfd9877a875808a9e91278ff6d3cfac04730a8e919095f01a4c27254a94191433704dbbd6d7a78ab8
-
Filesize
193KB
MD5e4b20eceadd0a1d030b407b02b913ebf
SHA1bd1bfad57bbafe2b96fe72fd9fa791d5784290cb
SHA256f48e85c97f8e473240db925d00ee871be9e2e7b684b313b911d5c2c14c47078a
SHA51295b5819c9c27b123ff9c6a8a8703b6bd8857c006c67035d62c4ea58acda41266bc8a8c43847a010d28e4dd5195b04cf0d1dc409f0ce7d5bf59b36cd5d6845622
-
Filesize
310KB
MD5b75ec9317947076d38e274a07d1afc8e
SHA11b81a764f3c1ac71306f0d82c2244cd0f691915c
SHA25608e964778e2fd28dbfc1186915d809cea84c9af3bbea07f45a6d0326e1aaf180
SHA5127f2251330e94460fdf4851669f6ceea0c0a25ffee92c1619dd245ea9a3ecf8de4f47fd1b777f26aa9d636a9caa94de035b548e87db3b08e4a843b7070d8e27b2
-
Filesize
24KB
MD535b1ff58fcadf2d8933f0615968f1b46
SHA14ff382514eecfc50800d5025da80175670346b5e
SHA2563620ae00d315397ec464d1a4ded9eb55046efd32cc75e287b9f494c7d256f222
SHA512141bd0c3e95987701b557516e7613baa7ad987cce13a4c623189e2742d7ea203f25e21942c24360aafe252a2feb924dc4c7c89cf85ba0893276e8730a39f632e
-
Filesize
6.5MB
MD5a3dbc556c029f3ece9f7d1a40e2f2cd1
SHA1ba1278593d66e677c586be5526bca7a60be3cc1b
SHA25637617dc0ebe5f261262e98e61837fbe460009dccdcb0f6eaed51f9f0b1a2a785
SHA51286a9e3df06f1e0fd05a8f676a9c5ddd01076265809fcb5528d5e0b0f3cceeeae4623c52813266dc2c59a3a0544bb9fc52cd868d29f5ea0f861b5cb3bae62fd36
-
Filesize
48KB
MD592a6df47283b49b207045fa7a4502bc1
SHA1718e9ff5f0fd9143de4f8fcf135d78165f991e9d
SHA256d714695c9775bd7dbb1fa40882bbe03216acb3994b94514a68892454eada0358
SHA512f2b08a4ae33e87a786fe25a2d902c8acb002faa4893a1f21d5608cbe070477af1b9c553c8960486a65089ad1e0be1491cb93cc60da9f3394c893525fa075d645
-
Filesize
30KB
MD5f3fbbf03cf1231fdee90331f55b3886d
SHA1ffa8952867916999ff5353466650ed226b99d31a
SHA2565bf16e0b5084ca5e68bb1b4e2e087fa5d45d2dd7dedf58057a7a53cb73dd266f
SHA5120afc3926996230dd943b64899136bb8e080dfe8a06dd4dfac161ec2d32c1db6a2dedd95cfae19e49ba8c70e7311e3ca52fb81b7c1397d24236116e148e15ba31
-
Filesize
4.2MB
MD5f7b41f2d1093a9050e9642a1ff8cd56b
SHA1667dfe97dd3cbaee88d5f4e908ccfd8940e59de5
SHA256ac3976da509cafffba007fa782b3193bebd8e444868b8a8c354cb5343e970aff
SHA512df90070cd96261cec7c5c58f71a9f39b9a6649721dd06583cede21b154802732daa90869c145ee77140e441f89f32f92305ed1a07ba90e0c87f14a1a62554ced
-
Filesize
6KB
MD5674b6821636f8da9c95e6b1ca6d53510
SHA1c1906d93b96527e962eb8a3d9a8193d99b42060a
SHA2564c4127714365d39797bf1da6cc6b269d2599fb66fbdb957dba71a3329ebae417
SHA5124c49dd52c48606eb68393f56998b69d991602b061c570163d6f25a6ae5aaf3bed4d3b4b77bbd79939d1986e755e44a0f0f8f5c6846cd5900c572c87d560cbdf7
-
Filesize
1.7MB
MD5d02efcc9790421cebab9a09bf1f7c2e6
SHA138ba527acfef8efa9a9a612eb3ddf29fee04391c
SHA256f3912beeb776790a657dacb62da4ea88fe92076f9146c46eeeec90f6a0938987
SHA512bc35eaa331bafd1c5c2e79b20c3a06736a5739fc7c3eb55f6bbb3f8a47edffccd54e5f3b35ddebdb6eaa6a695fbc824d0b707ee05b7392a9579b9211ee7432ff
-
Filesize
5KB
MD5d07521206ed9244754356a6d495ca10f
SHA1331c8481d9f360e0107b34b007aa1dd41414adb4
SHA256507a6682dad955fe21d7d982844c4ec73a27f40f0bdd0425560ea87e9c19a239
SHA512ed8905b2483f251d6f9b7fa9728adb9c16b66eafadb51fd72f8088417fda16ad13714f74118f4d790e01537f1b3c005b254a0048a3cbc4671fa910efcbf4faf7
-
Filesize
1KB
MD5dcf99fb08cee63e476aa9f56bc361ab2
SHA1860c5b5d1b69f89c435996892171b08e79e98cf1
SHA256b3cf6bd09f7bd0544ba4ba7cd135c5550f5c5f0a95bcb87b042b31d3631393ea
SHA51223f4efb792c6ea168f345ccdfbc542b375517f1b129fd9988d703e4412a479826ed65eb4115f5c0725d80d4027d171912c338167e219807f695d6cba3c4da9d7
-
Filesize
58B
MD53491f2167b114aa02e394d7a7617dfb3
SHA118197628f7326ddea29bef2eb17c67eabf588236
SHA2567323e0837c7d08b5dccf233b6498492cb33abedbc6318f20df4876908d7a27fa
SHA512c04e0c574ccc082dcc116de4958c5ea46e9ff71e66fc11d0f073a0730e5deb9477ebecf5755b1f54d767c1c78a50cb26c122db7a5d3d43216f6e2ee380691fbe
-
Filesize
4KB
MD5137f24204d0b7e11e60debec38adcfcd
SHA164fa18d99e1c77049ac9514ac830995c03f3746e
SHA2568ea54f240ed662fc0fe31a0811f1418b8c5353bf8dd92fd76c3103f4883f6866
SHA51247ed7ad901f82eb35c5d772f502026ca85fab39ae8f95f2db982e8ce9f8ce50467da15ca9020a3e7a99c65b596f5db568d2f5dfc5736d55aadc305f94146df5a
-
Filesize
25B
MD5d4b65e291a0a2f9b37ff56e345599aca
SHA14f1b230effde1af0aa5dac6724ef242cad0e6afb
SHA25641b577540b4810cc73a7a8b0fe1ad37b2396d604329f9d502009464e108f6ece
SHA512487b204e6ba56ef757092adace04bc55151cdfd58f3071f6194dc77d8c5735a633258367800ecd242dd3d009ea123567731f2431fffc2ad06280f40f0a16a286
-
Filesize
95KB
MD5165eeecd5628448aaeb740d3c4add2e6
SHA1b1c5b46e1529af3706d2b8f356d2e0934d94ff96
SHA256b149154ff94bb44d89937d533dbd1facf0c7a4cf1eaafa7da785736edff68a7b
SHA51260ed577d5de651754a8f962003d47de0f9c7dde31dd6f4d918461b62b214f8f11a5ba6b7d75419931bc855bcff5d8f214efa3214f12b233d94ca3daed42d097d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5662474f1c80b5424878d4ba7b9dddd4f
SHA1002f51448fa6b3b058b9322d89cdfa647b06268d
SHA2569632cab3f11b8f336798cb1397a9e9ba840cb26be0fca5c807ba62326bc0a446
SHA512a9f9704929bf43f2f036b8ec84971173872b484491bdde49d8007a7b86aaa53c600fd879d4510fd0b9298ddf58c054d9e6456dc4de97681cf417bf5593026147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aba15079974fad4ac1d9b6d38612ffb
SHA1fea2d8b8ab186452662dc969d448677e941461d8
SHA2565cebf6619df8ee47a50d3492532ba3e64da8a079feb296baef27c974a50d826c
SHA5121a36cd31c0c38bb9cfdbc6f50e761a3232db97322e118820d2b1b9fd9879cf421da0693e9ca92f9ff8906b045e4c39dc6ea2063221cb79e5a9a321138a924618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f6a4e76925d6d0fb516f6b676c1a92
SHA1d2fd269d330e4a753bf698161fb7b0c5402ad62e
SHA2561ffbc99ec18b52e623fc4e9c12df51d9d6375adb94a25582e58cb32d828e0f6a
SHA5125de91797e188079458d88ca0cb6384ec63df739f5d57bb530fd1b7289eb12106472b30dad50e1b61ea73242dfd2e76cbee9a16b24e76a20e79921f0ffa7d2646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec02f4acdd20701064a2b9aa1c741dc
SHA194243c7e3066900bb2ac07f29af23878d2146c88
SHA256517aaa7b1d6bd2f70900fbb67c8f7ae830a10fc6da944f541b32178db737db5b
SHA5127809535ecf1a21b409ae00aaf2b328cd72c2294fa196619e24c00f92e7459f70a8592c16eb7d69c32af03bf45dc9c5b0b5dcb7ec892af9b1bbd895354dac7c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddcfbd1f92d227acb4d1a99ed01e3458
SHA14c4f07ca682709077939f3cb640c9e11f5510049
SHA2562471d3349e867f72624683f45c1a8648bfab6ec1c71ce25ec66d97d3d7669f02
SHA512fefb0e90ce45b32737f88dd4bea525e4da239c201283fbc93f4d877aedaf5a2fa78146475f0020088193c8824f934af26c221210f76828a4fa5a8cda68a27a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce403375b6c755729a40efe6475e262
SHA14670497de26016da73548318ccbb59a18eea2daf
SHA2561b9b5136cca026531e65ae0e436fbdbe7ea1d81375286cde6a4bbccdec7b14f3
SHA512c1820e00d1d7d379b5b511cc94592d568cf26bdd41d8aa602ccb4e899f99fb1f30db84ceb3aacaca61b7ce3840036d49e4152d9967d53bb10f41dad8ffa1d219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d23beb1547ca95a47fc19c159ae09dfa
SHA1a367e4a4a4eccdcfbf351b6bee210259fecfc1b1
SHA256de4efc65217d0eefaa8d5a1655b2ab946507530b05c497ae010cc02269be984f
SHA5127cc4f4c1ab5abac1ffe836ba1f201cd5cb7a65679ef6d59b77e50ff6d1d242f81c5b905207253ec4b860e407089cb8204677e801b59473268ef033370f0b2cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ed86142603691c0c80779ca138d63a
SHA16562584185980fe570dc86f0d814b93386f877c0
SHA25649800080a063d985f3e26d6a9f31f3751e35708a135d589fc4662e3bef11a919
SHA512993bb7d6e53ba43ab8c93050814d1c779994adb00bdd221459eaa4cb92426f738bed07c7c79f4da7e2ebb255abb28095de4231644cb717be7b1b385a38f229cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54489c36bf32cddc99442043e7dba41a8
SHA194446cdb7af2ebf72396acc94b47b87fba88e95a
SHA256ee865a25b88ce30b5ad31bdaa4355d77b896dc1a2f589f2f9bc34603d3163977
SHA5121f4dcf03b3e0732aa8b29637ac87380ee2b6a6b3c51269aa1d663c6503c10ef74d057d5dde6c39f135a5058ce0171814b92b9e445d71f4340ace0030902e7de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96586185290ab1a5efc0f9a4084a384
SHA1bc7fa5e8d36b077264004f9e1437aa72354e9209
SHA256608fba98061c27cfdc061ec91bf517a2ee3a3799f7a4cd1ed6caab0fbfa6b8fb
SHA51243a7f4b707c79dd3a1a3b341dbe4758b9932420bebc3f0bff591acd7b2cb0c385acb3c8ba5819936426baf0021d05c657409beef55f010148db864d1ecbbd1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2624374905a9e16a071bb9883c93318
SHA10e31bebf8493ce5b57a38391d5f4b496226b8025
SHA256a0a405c550342055460b75d09e42aa3f616aae68202ed8d95decf234258cc3ce
SHA5120f066163c6e2ef57ece7474ff820831e3def57b12e6ce9a239efa357d88f8ccf7f363674ad5033f85273ca35ea739c1c3e0f124164948ab0368b13542706e78e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55604faf033399c0699467a1ccf7fa685
SHA152aff151a08dda81a105373a05ad5b5db3ee2f98
SHA256a232d3bef0e9efd2ccbcc96c388676f3bdd125f80657fc5d4d11577ea95a5b3d
SHA51242b04c79191f299f55aadef2c93e818b42902ce18ab68b0b746627b5ff47d98129d66f537ddd1a7b4a51f865bcb12d0cbf055a71207a7ae06cc0c742ba4c2560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f65ff72d4d505f742019e28f89cfc6d
SHA128056d3202a0d78a0dbfcdea4e82dc99f8cd34ce
SHA256b8956d035f97c3bca2fd600f2a66246ae558e9bcbd968ba0c2499ca11589b9fd
SHA51282b9a6b6308346675355f7b538ef030eb056d06a15e6431ba477d5daf8eeea3465c80a866fe54d6cdfff57d0e475117c59c9b0f7242c0f18d5e5ace3e6df5069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534911440c2c0ea07b3f5ebab97f7f538
SHA1d2948a2c83f940a2b5ef85912e76824a41d267e0
SHA2561a02d13172dfa3c163ff445753176ecb514da25ac56d300c39218fd1e44a84da
SHA5122430723d1713c1d1c0429a42122d22fa645885c6865e0255c36768c20dc8cbfaa8167a7fba43aa6c0ca87111edf0837d2e2a629f42bcc35155242accbc289c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de3e014febed7911657fe08aebb6bc90
SHA168479e30c04001b2c8f546d6f74a6568a48a2727
SHA2562015ff858fd802870e638cc4791281ae787a21b02dc939d69d859a9482fcc241
SHA512ae076dfec0d38e094066cc1e01500611021df7f9af223b06ca04bc11f35c781a4757ffe0e6928e8918dc62590bd1f49f82f08ac63268cb812811fb1cd461246e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c53d84249b077232362b56ac235685
SHA1ed34be9325539ac47786f89898b1a85ebb8cf5f9
SHA25604f3f37c4b9bed57e015d24f4ee49c08e312eb405534cd8d0df309745164f265
SHA5125f23dd4cbde2476df8ad0f206bfc579abbccd10917e993e50c046d84d26852f6ae93ab321b6a7b91e0cf592b65df72c618eb55d9a4ac05f090b74e2c9910a99c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa9516c440556e13e4e57623a59ad24
SHA1fa2f02a3e33f8fd4306ae384404f660baf8fd793
SHA256aceb79aa1131f98d224141dc4274553ca08434fae33e38dba1785946c55aa801
SHA5129808ff27e4017d02ee0aa6c1dec3b450a50db036d0aa275f93d9cb14afbf5a0d623dd5d0e634924bbb5c65f32871697a4d6548fb51a29ee7021e1aa200401147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df57434330c14de281334e93f9e9d5db
SHA152323bca7ccfb044cd4f2e716a56a581cc75f6f5
SHA2565a93f0e34ab6dd07e99eef63fdb1db3ba84eee541e05c784f56799303ff73dec
SHA51239b3fe3d7799f0940f150d347aaa3bf2e37973269f3da313504934e345677f73a1f8e9b9b7d2e9f3513150790c1a0311932c54383856b77362ba4ee60cee1b12
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
343KB
MD55d9a588764e76e9016d729e2977da1b4
SHA17e618075aef8d20eb490e9099eafea8d632ed323
SHA256a2509c90e5da3aa0acec6a8f042721d6f80e6b701942e81842294bfe8aa6ffe5
SHA512a04ab8734522771a5320c1f1ab77a3b43bed3bc6314a9af85ed4472ebd1c2acc1b3d67b287d0d9e27df6f1637441c5685f6cb8ff97bbcdd0b5329949f292deb0
-
Filesize
37KB
MD5573e47b1009cd190121e5cc88563d41c
SHA1152eb9ab8dea6caccd4287f9b525617cc14cb1e9
SHA256f018ab2a229bef73da87351a8448c98dd4749794f6ac0f974672c47e6c5f3dc5
SHA512f5976dd33b138c5a328efb5e841bec483c46283cf56165b5e6bcd7610c5c10b658fd0287ee3d8f6d6e3f6176a053fd21604ed4039f7bb7bc218a899ec6a80f46
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e9cc749fbc55566eb4c599962a824794
SHA1a0bc6109bde01a681402189848fe8244636f58e4
SHA25640f2cd9a37621009849255e408b4a6d4606d58a00c457584a8c799e82e97392c
SHA512cea129162b17539671e6846db5977915eb4882772b95be03f0af4e1286c086a919297de5cd3c46373ee3e9d735b298755dfaf16aa6b96a56a3c20414ca0cd4d0
-
Filesize
1KB
MD55a221a0a2222e5219bbff18f8caeaece
SHA1066f111a84e7245b1c655d4b549a636133b92505
SHA256f22625fb8f01df4910dc57c2575f811857e1d08c5c6eea3e6b6f3d3bb6e8f9f7
SHA512c892324ac463b60e283e3f670df547ad54f84065070e3b9df85a5f672cc3f70768eed5d257e7d872257d07d8dd3ddcc1b570017974b8185384b04048673ff54e
-
Filesize
76KB
MD5570dd0b08099a433e647b61ebda329b2
SHA19cc5492b6ada7d23151a8ce4b0ab7f069a619fd4
SHA256119601631ccb44c47472c7085b7d3dec6389bb0937032113e023b41de91abdeb
SHA51260b36fb14baf37f1862d46db1b569e7e59da3dc106b3f650953589f2ac80885867b359723ca6f0618c7549fbaefe62c7b8dbb5e793190418f06d146b24bf6183
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
4.0MB
MD5bb7365846fadef8de9092fc864e0791a
SHA11189bd36b249f766a3c215a6580c8b16b6b44d97
SHA256283f7f59997eba437b2ad5c5e14ec83ba198ec0f572250e8487dca8fd2d2bc73
SHA512e7b5d11672bf0be7a3eeafb73f25f361dafde4b0e2670d37bc2919570266e32ad56f846431d50cff8976f1d26619cc55bb5bfdc064d10e32d642a58fcb97bf8e
-
Filesize
9.7MB
MD5760280933b7359793f6d6882c5d31ae8
SHA18ea087502c3786028ec1cac03265a9b6bd204a4c
SHA25683d456a6143078f0238aaacfe8c3b519bcfdc549ff965e415eab5478b7d0ea55
SHA51207dd92a4f8fee1550859d54a970faec2df51f1d29040d0da9e990e0fee09abfcc5fae3b4877e7a9064ea24738b057dfc02ff44622cb04d38a3e6ffe4207012dd
-
Filesize
164KB
MD5ad6c6bd1a9f0436942468962f2c63aef
SHA1879ccfe45e59a523980f5a2b73c0f6329ac67981
SHA2569e8199987ac9a9601cd01af5c40ca30852b3c2d4e085fbb20415b44a254ad290
SHA5126bdbdf5ed6753b1098dbaeaa6b666e28fcf263580d84e668946dd17801ef0676cc478170133b9436b3702f9c95cc9bd5ef9c0e56e54df6af5ac608f06e11d2bf
-
Filesize
93KB
MD5861f72e8a07439f99f2c99469b84ac54
SHA1e8a998865b4b4101b7d14a1ad6ad90c12e50f411
SHA2564394e68fb132bb9f68706e92ceef9f1da338982c0974e1569825cda5c05a8d8e
SHA5126fae6bef86a24727f781aa57de8a9d7aca7bc1049f238ca516bb230ae75e4975f9d4fbb85edd22f5ed901d6ef0dda58e3a3f6f0192d818cae573e7eb5bcd7fd2
-
Filesize
340KB
MD51c7b763115cd2b1962032b1c52099a41
SHA197043a0538274ef6de0eb047064782f5a9cba4b6
SHA256779048608fdb7542d24b23109df1966ce3fbe640150406fad2ec88b3fea70624
SHA512ec81602d2f0d4cc15f2b18906721abee02fa34a556105b7369cac63eb4e5c2577306d2c4a8c0c3610aa214a0eb37862bfa83648b4ebef93fab82327224fea1ba