Analysis
-
max time kernel
891s -
max time network
863s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13-07-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
target.vbs
Resource
win10-20240404-en
General
-
Target
target.vbs
-
Size
1B
-
MD5
7215ee9c7d9dc229d2921a40e899ec5f
-
SHA1
b858cb282617fb0956d960215c8e84d1ccf909c6
-
SHA256
36a9e7f1c95b82ffb99743e0c5c4ce95d83c9a430aac59f84ef3cbfab6145068
-
SHA512
f90ddd77e400dfe6a3fcf479b00b1ee29e7015c5bb8cd70f5f15b4886cc339275ff553fc8a053f8ddc7324f45168cffaf81f8c3ac93996f6536eef38e5e40768
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Enumerates connected drives 3 TTPs 6 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exeexplorer.exeexplorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Drops file in Windows directory 19 IoCs
Processes:
taskmgr.exeexplorer.exeTaskmgr.exetaskmgr.exeexplorer.exeexplorer.exetaskmgr.exeTaskmgr.exeSearchUI.exeTaskmgr.exeSearchUI.exedescription ioc process File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4032412167\4002656488.pri explorer.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri Taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri Taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4032412167\4002656488.pri explorer.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri explorer.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\2717123927\1590785016.pri explorer.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri Taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\2717123927\1590785016.pri explorer.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri SearchUI.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri Taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri Taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri SearchUI.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri Taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exetaskmgr.exeexplorer.exetaskmgr.exeTaskmgr.exeTaskmgr.exetaskmgr.exeTaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
SearchUI.exeSearchUI.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3712 taskkill.exe -
Processes:
explorer.exeTaskmgr.exeexplorer.exetaskmgr.exeexplorer.exetaskmgr.exeexplorer.exeexplorer.exeSearchUI.exeSearchUI.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TypedURLs Taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TypedURLs taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TypedURLs taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\GPU SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\GPU SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies registry class 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeSearchUI.exeexplorer.exenotepad.exeSearchUI.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616209" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133567065789565016" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616193" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Rev = "0" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616209" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 03000000020000000100000000000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByDirection = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "526" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133567065789565016" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 14002e8005398e082303024b98265d99428e115f0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "397" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg notepad.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} notepad.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{D6D9E004-CD87-442B-9D57-5E0AEB4F6F72}\FFlags = "18874385" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 020000000100000000000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Sort = 0000000000000000000000000000000002000000f4eec83032a8e241ab32e3c3ca28fd29030000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "364" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Rev = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616193" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Runs regedit.exe 2 IoCs
Processes:
regedit.exeregedit.exepid process 4484 regedit.exe 4252 regedit.exe -
Suspicious behavior: AddClipboardFormatListener 6 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exepid process 2976 explorer.exe 4784 explorer.exe 2652 explorer.exe 2392 explorer.exe 3644 explorer.exe 3644 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
regedit.exetaskmgr.exeexplorer.exeexplorer.exetaskmgr.exepid process 4484 regedit.exe 4296 taskmgr.exe 4784 explorer.exe 3644 explorer.exe 628 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskmgr.exeexplorer.exetaskmgr.exetaskmgr.exeexplorer.exedescription pid process Token: SeDebugPrivilege 4296 taskmgr.exe Token: SeSystemProfilePrivilege 4296 taskmgr.exe Token: SeCreateGlobalPrivilege 4296 taskmgr.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: SeShutdownPrivilege 1256 explorer.exe Token: SeCreatePagefilePrivilege 1256 explorer.exe Token: 33 4296 taskmgr.exe Token: SeIncBasePriorityPrivilege 4296 taskmgr.exe Token: SeDebugPrivilege 3808 taskmgr.exe Token: SeSystemProfilePrivilege 3808 taskmgr.exe Token: SeCreateGlobalPrivilege 3808 taskmgr.exe Token: 33 3808 taskmgr.exe Token: SeIncBasePriorityPrivilege 3808 taskmgr.exe Token: SeDebugPrivilege 628 taskmgr.exe Token: SeSystemProfilePrivilege 628 taskmgr.exe Token: SeCreateGlobalPrivilege 628 taskmgr.exe Token: SeShutdownPrivilege 3644 explorer.exe Token: SeCreatePagefilePrivilege 3644 explorer.exe Token: SeShutdownPrivilege 3644 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exeexplorer.exepid process 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exeexplorer.exepid process 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 4296 taskmgr.exe 4296 taskmgr.exe 4296 taskmgr.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
Processes:
SearchUI.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeSearchUI.exeexplorer.exenotepad.exeTaskmgr.exepid process 4132 SearchUI.exe 2976 explorer.exe 2976 explorer.exe 4784 explorer.exe 4784 explorer.exe 4784 explorer.exe 4784 explorer.exe 4784 explorer.exe 2652 explorer.exe 2652 explorer.exe 2392 explorer.exe 2392 explorer.exe 984 SearchUI.exe 3644 explorer.exe 3644 explorer.exe 3644 explorer.exe 3644 explorer.exe 3644 explorer.exe 3644 explorer.exe 4784 explorer.exe 4784 explorer.exe 3572 notepad.exe 3644 explorer.exe 3644 explorer.exe 3644 explorer.exe 3644 explorer.exe 68 Taskmgr.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
taskmgr.exeexplorer.exetaskmgr.exetaskmgr.exeexplorer.execmd.execmd.exeTaskmgr.exedescription pid process target process PID 4296 wrote to memory of 2980 4296 taskmgr.exe explorer.exe PID 4296 wrote to memory of 2980 4296 taskmgr.exe explorer.exe PID 4296 wrote to memory of 4396 4296 taskmgr.exe explorer.exe PID 4296 wrote to memory of 4396 4296 taskmgr.exe explorer.exe PID 4784 wrote to memory of 3476 4784 explorer.exe explorer.exe PID 4784 wrote to memory of 3476 4784 explorer.exe explorer.exe PID 4296 wrote to memory of 3724 4296 taskmgr.exe explorer.exe PID 4296 wrote to memory of 3724 4296 taskmgr.exe explorer.exe PID 4296 wrote to memory of 3808 4296 taskmgr.exe taskmgr.exe PID 4296 wrote to memory of 3808 4296 taskmgr.exe taskmgr.exe PID 3808 wrote to memory of 628 3808 taskmgr.exe taskmgr.exe PID 3808 wrote to memory of 628 3808 taskmgr.exe taskmgr.exe PID 628 wrote to memory of 3644 628 taskmgr.exe explorer.exe PID 628 wrote to memory of 3644 628 taskmgr.exe explorer.exe PID 4784 wrote to memory of 3572 4784 explorer.exe notepad.exe PID 4784 wrote to memory of 3572 4784 explorer.exe notepad.exe PID 3644 wrote to memory of 3488 3644 explorer.exe cmd.exe PID 3644 wrote to memory of 3488 3644 explorer.exe cmd.exe PID 3488 wrote to memory of 1384 3488 cmd.exe Taskmgr.exe PID 3488 wrote to memory of 1384 3488 cmd.exe Taskmgr.exe PID 3644 wrote to memory of 3164 3644 explorer.exe notepad.exe PID 3644 wrote to memory of 3164 3644 explorer.exe notepad.exe PID 3644 wrote to memory of 3600 3644 explorer.exe cmd.exe PID 3644 wrote to memory of 3600 3644 explorer.exe cmd.exe PID 3600 wrote to memory of 68 3600 cmd.exe Taskmgr.exe PID 3600 wrote to memory of 68 3600 cmd.exe Taskmgr.exe PID 68 wrote to memory of 1408 68 Taskmgr.exe notepad.exe PID 68 wrote to memory of 1408 68 Taskmgr.exe notepad.exe PID 3644 wrote to memory of 4832 3644 explorer.exe cmd.exe PID 3644 wrote to memory of 4832 3644 explorer.exe cmd.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\target.vbs"1⤵
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"1⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /f1⤵
- Runs regedit.exe
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" /danger2⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" /danger2⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" /danger2⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /13⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\EXPLORERKILLER.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\Taskmgr.exetaskmgr6⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\EXPLORERKILLER.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\Taskmgr.exetaskmgr6⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\EXPLORERKILLER.bat" "5⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\Taskmgr.exetaskmgr6⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" /danger2⤵
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\1033\StructuredQuerySchema.binFilesize
403KB
MD5b4d3016a1cccde90a62b685149c832f9
SHA15d6c4ba3474e6544bd24343da564e90bba89f6f7
SHA256df6afa046a72bb55e8984cf9e2870dc62112e4b81d4fef5a94c98e1c4386e373
SHA512abf5e15b40fa03eb9390854199b9feaf0132aac756c5f07d45c81f58c8b4d909833a996a19ccfef7abb905ddb9206591b1eda49a4674bc75a7c5a9c6372590e7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
28KB
MD5e52d3bbe23e08bf8753ad2ace0643154
SHA1849737bb0537adf0ab9099f48b6daa39f4c99433
SHA25695345670a82e5776d0d4961b917f091105e2f625accdea79995e3598a1345cec
SHA512b35351b72bf9269be2fab367fdf99a4454209ae07ba951b4fe0a6b1fd4bc4bbc93cde33c66c16a21632f4465a7ba8467848c234e1935752c5efbac28f39a955f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\1601268389\715946058.priFilesize
171KB
MD530ec43ce86e297c1ee42df6209f5b18f
SHA1fe0a5ea6566502081cb23b2f0e91a3ab166aeed6
SHA2568ccddf0c77743a42067782bc7782321330406a752f58fb15fb1cd446e1ef0ee4
SHA51219e5a7197a92eeef0482142cfe0fb46f16ddfb5bf6d64e372e7258fa6d01cf9a1fac9f7258fd2fd73c0f8a064b8d79b51a1ec6d29bbb9b04cdbd926352388bae
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\4183903823\2290032291.priFilesize
2KB
MD5b8da5aac926bbaec818b15f56bb5d7f6
SHA12b5bf97cd59e82c7ea96c31cf9998fbbf4884dc5
SHA2565be5216ae1d0aed64986299528f4d4fe629067d5f4097b8e4b9d1c6bcf4f3086
SHA512c39a28d58fb03f4f491bf9122a86a5cbe7677ec2856cf588f6263fa1f84f9ffc1e21b9bcaa60d290356f9018fb84375db532c8b678cf95cc0a2cc6ed8da89436
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.cortana_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\MOQY2KJ2\microsoft.windows[1].xmlFilesize
719B
MD5eed9a3c00abaf6da37eeb7f59e7b0aa5
SHA164e50868965a862301170dd399eed2bb7e1738dd
SHA25618351d0dc33a95d54aab9d14bce1498043503b21d5e1fafe3ac8c644edca2625
SHA512c5f20e5dcdd27b6c762344a53550c0fff3714136f5f57d1b2b8e6155eafd5e483568a531cd696ce54a373ba679319f1e8e0775ab2cc9328fa12ac70abec44798
-
C:\Users\Admin\Desktop\ClearFormat.odsFilesize
313KB
MD5a010c0362dd5ccbcfa7940d892740ce7
SHA168d812c7ad140a09e8b4b375ae32debdcd9c4f17
SHA25605a027379092eb464a90f0851883bd3711f1d6e7bdbd493a9d23c5e77cdd6d77
SHA512b8b95c54aac8f98c65eaaca39240a925b530ec4704740175542b1d20f1e54cbc4dee2c4990a60470b90b1a0a05fb3a9627387ec98cdc96d13f92dafe98ff4769
-
C:\Users\Admin\Desktop\CompleteRead.wmvFilesize
452KB
MD55d5d3b068301e79e0e3193693bae264e
SHA142a4e930c865c75f48003bd10b5d2f0488952b0f
SHA256d49e8a64677054f6423a9bca344416bba7dcc3cfe6683520abb3bbac83dd7224
SHA5122572600a24963336c0f4f6bb46f4b655c3f6a23f516870fa214aa0f239d9cd35bd8734e0d69e79ed85653a421305380a2af0c67c4b9b7d0531cf17fff86508b3
-
C:\Users\Admin\Desktop\ConnectOpen.xltmFilesize
499KB
MD54e7e0eb64eb4ff647007fc091b3d8228
SHA17da1da12d8ea58f7de299a593dc5aa59885911d4
SHA256c043c9ef911dee15eb70f430912634c5c013974fc1cf63446aafa94d8a25936c
SHA512459a6aa4ffdf0086ad8f710b757e699e8777258abc1dfd6174e732018450823b4e3bdbf327787f7910257b6a616c0813ec535bc4c62fb35b6711669ad82eb752
-
C:\Users\Admin\Desktop\EXPLORERKILLER.batFilesize
55B
MD5eeff6d2fcc5bf3f0bdd8431e0a674ca3
SHA1bf069d43b07e285aee087027b4e47b2ec9dac640
SHA256208aadbb60b7883f3684a81f193e3ad2d2dbde06d512a35a31e36bf59b75d406
SHA512d720e21a84ee27ae9983505f45a24fa1c8d48cf0c95e4d82c2669fb395cc1ef13b221d21fb060d2aa5c4a54187c7682e7ab16a838a05f6ffacc0cc21631789cf
-
C:\Users\Admin\Desktop\EXPLORERKILLER.batFilesize
60B
MD56c23697e2d2339cd047d0beea66b0ef7
SHA1976ab4aa1e4d5ab35b36fbb509d7bbd6d0e40be0
SHA256ac181caa60888f29ebc102064cdead8ff9f1e537448e1ffd8997ee5d8f44d753
SHA512436c96800011ec1b39593b8fa42f7b001a02f609a6c52f7f5ce1db1dbea25480c496b9c354607f1a11497a5a34e88c004cdf4a5d10bcc461592090111ff635c4
-
C:\Users\Admin\Desktop\EXPLORERKILLER.batFilesize
60B
MD5d78fb3777c4c69adc3914f278edcaadc
SHA1831b5305403f7db812a627bf85e05656241c9f60
SHA256a5457ce1fcad1853fe3230cdd6d8e0f2e41a0aa8084271d3cc207f293d6fd601
SHA51207e768401a12282adcf4257764e2f0871414b90ca9d958dddc82e039cc98cc8dcaac70ee2dddc8eb8cbc8081c3b8cfceb1b727071fea3b2a49da5c11b571cd0a
-
C:\Users\Admin\Desktop\EnableComplete.dotmFilesize
615KB
MD5cf8eaeed02f1775dbaf7ae39f1d8b6e2
SHA10693cb626f1850b250cd7984e75d006d9dda7c61
SHA2564dc516d4d2626f75a75e88310f5844118877cb74f659a4c844f41fc1b9aba97e
SHA512c89035d1ef5612ea05f9d9ae4a02436f9f361945ccb4c0988d5fb4c8702ff34a06616966640078dcee753625ed765b97ebc52f315fd1a37cbd6bd373d6211811
-
C:\Users\Admin\Desktop\GrantGet.tiffFilesize
661KB
MD5a690e018fa19fde6cf8dd3a899187e82
SHA1dd1e43ef0ca0c8e4ed6de65080b45a312a69e26d
SHA256fc415143e299c9054e6023fd72c7d0fea4ec592dece50086b5c42f121f34f1d5
SHA5123355c3d175162e79b372bd297acd59cc57e914aa570c8bd64b0efe8ed9754dfe379bf2cb580b54ae73867705084b4b700c871ee1e04ed3d2a818e26ea801ac4f
-
C:\Users\Admin\Desktop\GrantUndo.icoFilesize
592KB
MD59ce34be67b0ed2ac2624aab13e10935c
SHA15df93dfaa11d386c6161b207d282dd039f4c0a5f
SHA256699c41fbb748aaa0d9c756a0c3b584ba8a03cc5bb14b25005e2d28792bf85923
SHA5123b62186d9589554999d4b0d6fe7f0ef6a634132e1e4f03e93936df78271e4f5e1ce60f6c2b4ef4633601fbb2504ed5f028e510db6135fc9844429bbb5e48fa23
-
C:\Users\Admin\Desktop\InstallBlock.aspFilesize
243KB
MD51f04394922dacae1d6cac5e97de640c5
SHA1fb91c7b4fa30ff7d01c83a7d28b2e7b782c43c95
SHA2561bed7df4eff18fbc71e5da1009702c607aa71cad5098b05cadc8ea01d93172ad
SHA51276016e9b4b9e8feefa24eeeb528f48bdf8e183a9f04bd9969becd6ba0fc3c52a3a10989073006600ba5aaea5fe73e09c9359d7a45b9e512da8b2b9379c37ae00
-
C:\Users\Admin\Desktop\InstallCheckpoint.mpv2Filesize
267KB
MD58aae68246b694ccec32e861807231164
SHA1b5a5f084fd041b8e30a10f94273c7ef216367f00
SHA2562e6daa0462c63b43ed4544d7828e9c3731a7b0b7539cc24338ce842445f6cb2a
SHA512506bc6caab1f60303d6d2e5e3091e193fce394d977af64bfb8426d337e4eb4a077f7b0bd9ffb33aae2170c5f4f109dfc968b515a9fd28c537f872ca588239fec
-
C:\Users\Admin\Desktop\LimitUnpublish.binFilesize
522KB
MD566880efbe11ae8c7facdae655381ecd9
SHA16a71410b80cf450e1fa44a0068d8df12c7969c14
SHA2562e19b7610ccee05c0cc04ebb70a1901f6a8ebe790378ac1bb3cb2b48ab414339
SHA512c85709d796d9606555713251772e6a5edab601e38ce02bb2ee56efb337bb49aad094aada4a5b26029d9a6a7f9af1ca0b9913d510a9865bd25aa784601bdf5d17
-
C:\Users\Admin\Desktop\OpenConnect.ttcFilesize
568KB
MD55fc5e9085f0c2eb02bbebc67bcd22830
SHA133b6b3a1d04b8340e78cbd3c05730054143c732d
SHA2569b4865cf3c9db37a738ab5a07b424d3b9c3af09100958944a187fbc401178530
SHA5120e323b6209be19f4c117a31d4d00efdc87c9b89643224df4f386aaddb7c81ad67529fe111af1b600d0bd4133ff220df3c34a25628f1ab3314fff3fb5d82671c6
-
C:\Users\Admin\Desktop\ProtectFind.isoFilesize
638KB
MD5bf0a21f5297631fa956f634723b9d066
SHA15ac462e211bcd01b40d93fd421fe281044435106
SHA256a81294b3d182f0b241e88f8196199a15034a9ddbe13886f48d19e6767435e6a3
SHA5124c3c380dcb209aa1370291488c93fdbd752b2ba74b81524aa264d0ffc464d14556d551cd5ead706029d9cc4d8b4c694a715f623a892ed2f9890a2a22b0e531dd
-
C:\Users\Admin\Desktop\ResetUnlock.search-msFilesize
684KB
MD561ad26b9384ea604722f1c00a4a7c77f
SHA135a2564ad696917678f9633632be0c74700ab55e
SHA2569fd1afeff1cab226de1abd14f59768464505102a4556fbda78061b7541816d55
SHA5126267b0038f0778103dce753015b902d1a88fe1c28d0874c52f0b385c49c9f4ad1b997ecff0566acb86323bc3c0456df93bcc6f855599f3e1ad0e452a92441715
-
C:\Users\Admin\Desktop\SaveUse.iniFilesize
406KB
MD53c21ad0b859ffc8c9d1a3969e0e06540
SHA12e29089525a794e05378d00594e4164fce022b0a
SHA256eb747ce874b043e69b42bb8bd677573c1314f7c516c571dcf705699781338404
SHA51233803d413f50695ff4db5b69451ea4e583b5aa2b942b6bcfc23355460c2eec508afca95c9a391b85ddf1ff4e9e7032470c0bcb18e436404a2386e13baa4ba195
-
C:\Users\Admin\Desktop\SearchUnregister.rawFilesize
429KB
MD5c0ee76000875eeb0632d45f229448280
SHA17259ee6f8b957562d883983a10217c3e35acad33
SHA25697934821f7b583d3bb192f3c24518cc97ec2adba3c1ae962d58cae051b8f0834
SHA512947401234e877813af632bf3af6ad4965e9d50dde189c74b012ea6e45e9d5d4e95e1507f6f6f23547ae2ac75f58520223a17d005ecb501a78b3be0ea8a133d41
-
C:\Users\Admin\Desktop\SetMove.wmfFilesize
383KB
MD568c409450ff2f4b13df9eaf8e2b53af5
SHA1d0a9939f7fa4eca76a7324a6e47ed698836a5c39
SHA2569b1ade062d09f427e2148b9b7b4ae74bcb7c857bd48be74df967744074043108
SHA512c0de12607e10289c3fd7b06282ed15df91996298da3282982ce63629f5f1375e033d22828e5f34ce6a30be903cbf4fba6e6b892f4069b259c4e908a176fb187b
-
C:\Users\Admin\Desktop\TraceConvert.dllFilesize
359KB
MD53bcb31539783ab4e22b93caf38fad9e8
SHA18205db58c89afd4018953c16cdb79d5e8f80fd9a
SHA256cc8f9e971622619826e9fd1de315f087bebdbda5dcaf924a6b22d5c6894b0f14
SHA512fd91b2e00ed181b0cd04d416d62622a4b548d1b91fd38414176fbbebeda7262f38653e40dbcbc8cb686eedb6db0facdf9d5c12dee789d16c17f2fd4b9e77ab23
-
C:\Users\Admin\Desktop\UnblockAdd.mpaFilesize
290KB
MD56b170abe27ccc3f377f3a796874a8946
SHA17226c28fcd2d5c8e5865eaa157dd11a2a74a908f
SHA2568c0a43ac17c4cb2faba4731be1c70a4db519a74d95f05c482d590101b5c5f7ee
SHA512d078c2f90e58a64f91d3cda8450cb7a59471cde8957fa7b2f9db23425537862d14c4e08a48f2bef62635026c8ac4a837b7b0a8e28aebd8277f963e0c23c151c0
-
C:\Users\Admin\Desktop\UnblockMerge.cr2Filesize
545KB
MD544b583962be98d490fc19996f6c95bbc
SHA161892e3258577740adfcb0fc0faa6b94794cdfd8
SHA256326d297f6719f1cc9cced3efb352df6f6035c585b2215da6675e720e4d9b42f0
SHA512db4590d50a745bd19182a4f65edce2cb78b8345db2fe38eeb83282f6e233fc93993efe851e4a91eb18ffe526f115031930276cb0fd4b6c2125200f41e28f5a6e
-
C:\Users\Admin\Desktop\WaitConnect.ps1Filesize
336KB
MD563e40e879999d1703c83dfbcd08a4fde
SHA1757b16a0328f47d704dccdc8f3fa0b67596b35a4
SHA256d493b02448eccba5a93750c9404f661e9777aefdf73b78c2a57ae4e7a17e0369
SHA512d763499745a6d6b9c6920b4eca6a53455688561ce79888ecd76be61cc1fb08dae388190c6e5bf020908670553b0ade0b7bc95c8975418c2cfd6e0ae33614cf74
-
C:\Users\Admin\Desktop\WriteLock.lnkFilesize
952KB
MD59d390dc1540c22d6dbad205368d470bb
SHA14bb9b1fb6058eaf03191f60c3b49030b10cf1cfe
SHA25680ae288e57ae8f842694982a506bc6e54e49dda47caf94eec49b1ca89952eb81
SHA5126b0af04b11d314955b9aca9cbaeb2e396b537d944f0d921e126f34f06308767b1efaa4c5dfa921eae640b114d07d6a8b92394c97605bd0ebc5e613043f6f7f48
-
C:\Users\Admin\Desktop\WriteTest.mp4vFilesize
476KB
MD593f50830262148fac7536ae6707804d2
SHA17bf9f8c73ac6e86b21f2ed088fac5b26c260bf15
SHA2567b81df12a4d53e36b8dfbc282b680ca1026e21a0973d54e8bb4bbdcfbdefab93
SHA51265bb5c6a1d3faba3dcb4f48a7e7d27d456da08fba018937667171a6b4f2301112d24c81410dc7c85fc26504ab38f991cf2aa592de282d43e04d0a7a8dae9365d
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/984-104-0x0000017DBA100000-0x0000017DBA200000-memory.dmpFilesize
1024KB
-
memory/984-105-0x0000017DBA100000-0x0000017DBA200000-memory.dmpFilesize
1024KB
-
memory/984-129-0x0000017DBA6E0000-0x0000017DBA700000-memory.dmpFilesize
128KB
-
memory/1256-28-0x0000000002F90000-0x0000000002F91000-memory.dmpFilesize
4KB
-
memory/3644-224-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-211-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-171-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-174-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-179-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-178-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-177-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-176-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-182-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-189-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-188-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-187-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-191-0x0000000005F50000-0x0000000005F60000-memory.dmpFilesize
64KB
-
memory/3644-186-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-185-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-201-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-203-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-202-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-204-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-205-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-206-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-207-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-208-0x0000000005F50000-0x0000000005F60000-memory.dmpFilesize
64KB
-
memory/3644-209-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-214-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-213-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-212-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-169-0x0000000005F50000-0x0000000005F60000-memory.dmpFilesize
64KB
-
memory/3644-210-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-217-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-223-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-222-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-102-0x0000000002670000-0x0000000002671000-memory.dmpFilesize
4KB
-
memory/3644-221-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-220-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-227-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-228-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-229-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-230-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-232-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-231-0x0000000005F50000-0x0000000005F60000-memory.dmpFilesize
64KB
-
memory/3644-235-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-239-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-238-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-237-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-236-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-242-0x0000000005F50000-0x0000000005F60000-memory.dmpFilesize
64KB
-
memory/3644-243-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-251-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-254-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-253-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-250-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/3644-252-0x0000000005FC0000-0x0000000005FD0000-memory.dmpFilesize
64KB
-
memory/4132-55-0x000001A422A40000-0x000001A422A60000-memory.dmpFilesize
128KB
-
memory/4132-35-0x000001A422720000-0x000001A422740000-memory.dmpFilesize
128KB
-
memory/4132-30-0x000001A422200000-0x000001A422300000-memory.dmpFilesize
1024KB