Analysis
-
max time kernel
280s -
max time network
281s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-08-2024 04:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo.git
Resource
win11-20240802-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo.git
Malware Config
Signatures
-
Chimera 64 IoCs
Ransomware which infects local and network files, often distributed via Dropbox links.
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-cn\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sk-sk\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files\Java\jre-1.8\lib\ext\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\eu-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-ma\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ar-ae\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nl-nl\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ru-ru\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\de-de\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\uk-ua\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\pt-br\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files\Microsoft Office\root\loc\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\de-de\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\pl-pl\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\root\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sl-sl\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-ma\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ro-ro\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hu-hu\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\da-dk\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\eu-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\tr-tr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pt-br\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-cn\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ca-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sk-sk\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\uk-ua\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hr-hr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\de-de\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-gb\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\pt-br\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe -
Chimera Ransomware Loader DLL 1 IoCs
Drops/unpacks executable file which resembles Chimera's Loader.dll.
resource yara_rule behavioral1/memory/2436-524-0x0000000010000000-0x0000000010010000-memory.dmp chimera_loader_dll -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WScript.exe -
Renames multiple (3253) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 2140 AgentTesla.exe 2436 HawkEye.exe 1576 Nadlote.exe 2424 smss.exe 2444 Mantas.exe 4616 SpySheriff.exe 5104 DesktopBoom.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000200000002b00a-8586.dat upx behavioral1/memory/2444-8631-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/2444-9740-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Adds Run key to start application 2 TTPs 44 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "smss\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Manager = "C:\\Windows\\system32\\winmants.exe" Mantas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe -
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Links\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Music\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Desktop\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Downloads\desktop.ini HawkEye.exe File opened for modification C:\Program Files\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Searches\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Pictures\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Documents\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Libraries\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Documents\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Videos\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini HawkEye.exe File opened for modification C:\Program Files (x86)\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Videos\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Music\desktop.ini HawkEye.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 raw.githubusercontent.com 22 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 bot.whatismyipaddress.com -
Drops autorun.inf file 1 TTPs 10 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AutoRun.inf WScript.exe File opened for modification F:\AutoRun.inf WScript.exe File opened for modification \??\d:\autorun.INF smss.exe File opened for modification \??\e:\autorun.INF smss.exe File opened for modification \??\c:\autorun.INF smss.exe File opened for modification \??\f:\autorun.INF smss.exe File opened for modification \??\c:\RECYCLER:\autorun.INF smss.exe File created C:\AutoRun.inf WScript.exe File created F:\AutoRun.inf WScript.exe File opened for modification \??\c:\RECYCLER\autorun.INF smss.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\prncnfg.vbs WScript.exe File created C:\Windows\System32\oobe\en-US\oobe_learn_more_activity_history.htm WScript.exe File created C:\Windows\System32\Printing_Admin_Scripts\en-US\prnjobs.vbs WScript.exe File created C:\Windows\System32\Printing_Admin_Scripts\en-US\prnqctl.vbs WScript.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created C:\Windows\SysWOW64\winmants.exe:Zone.Identifier:$DATA Mantas.exe File created C:\Windows\System32\gatherNetworkInfo.vbs WScript.exe File created C:\Windows\System32\SyncAppvPublishingServer.vbs WScript.exe File created C:\Windows\System32\oobe\FirstLogonAnim.html WScript.exe File created C:\Windows\System32\slmgr.vbs WScript.exe File created C:\Windows\System32\Printing_Admin_Scripts\en-US\prnmngr.vbs WScript.exe File created C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs WScript.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\prnqctl.vbs WScript.exe File opened for modification C:\Windows\System32\Administrator.ini WScript.exe File created C:\Windows\System32\oobe\en-US\OOBE_HELP_Opt_in_Details.htm WScript.exe File created C:\Windows\SysWOW64\slmgr.vbs WScript.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\prndrvr.vbs WScript.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\prnport.vbs WScript.exe File created C:\Windows\System32\Administrator.ini WScript.exe File created C:\Windows\SysWOW64\winmants.exe Mantas.exe File created C:\Windows\System32\Printing_Admin_Scripts\en-US\prncnfg.vbs WScript.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\prnjobs.vbs WScript.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\prnmngr.vbs WScript.exe File created C:\Windows\System32\winrm.vbs WScript.exe File created C:\Windows\System32\Administrator.vbs WScript.exe File opened for modification C:\Windows\SysWOW64\winmants.exe Mantas.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\pubprn.vbs WScript.exe File opened for modification C:\Windows\System32\Administrator.vbs WScript.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created C:\Windows\System32\Printing_Admin_Scripts\en-US\prndrvr.vbs WScript.exe File created C:\Windows\System32\Printing_Admin_Scripts\en-US\prnport.vbs WScript.exe File created C:\Windows\SysWOW64\winrm.vbs WScript.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_100_eeeeee_1x100.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppPackageWideTile.scale-100.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-30_contrast-black.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_1.0.22.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsLargeTile.scale-200_contrast-white.png HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-ae\ui-strings.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\GenericMailBadge.scale-100.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsNotepad_10.2102.13.0_x64__8wekyb3d8bbwe\Assets\NotepadSmallTile.scale-150.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib\components\DocumentCard\DocumentCardStatus.base.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.2103.1172.0_x64__8wekyb3d8bbwe\Assets\contrast-black\FeedbackHubAppList.targetsize-64_altform-lightunplated.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-80_altform-unplated_contrast-black.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2020.503.58.0_x64__8wekyb3d8bbwe\Assets\CameraAppList.targetsize-40_altform-unplated.png HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\az_get.svg HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_4.0.2.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\Icons\StickyNotesMedTile.scale-125_contrast-white.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubSmallTile.scale-200.png HawkEye.exe File created C:\Program Files\edonkey2000\incoming\DVD2AVI.exe Mantas.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-dark-disabled_32.svg HawkEye.exe File created C:\Program Files\edonkey2000\incoming\Goodtool.exe Mantas.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_1.0.22.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-24_contrast-white.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_2.2106.2807.0_x64__8wekyb3d8bbwe\Assets\Store\StoreLogo.scale-100.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1909.12456.0_x64__8wekyb3d8bbwe\Assets\PeopleAppList.targetsize-64_altform-lightunplated.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.21012.10511.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-96.png HawkEye.exe File created C:\Program Files\grokster\my grokster\Msn Hack.exe Mantas.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_4.0.2.0_x64__8wekyb3d8bbwe\Assets\Icons\StickyNotesAppList.targetsize-48_altform-unplated.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SnipSketchAppList.targetsize-24_altform-unplated.png HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\reduced_mode.png HawkEye.exe File created C:\Program Files\KazaaLite\My shared folders\Warcraft III NoCD Crack.exe Mantas.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols.xml HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1909.12456.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.targetsize-24_altform-unplated.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_21.21030.25003.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\PhotosMedTile.scale-100.png HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\rhp_world_icon_hover_2x.png HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hu-hu\ui-strings.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.40831.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-32_altform-unplated_contrast-black.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeLargeTile.scale-150.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\FloatingPicker.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Getstarted_10.2.41172.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\TipsSmallTile.scale-125.png HawkEye.exe File created C:\Program Files\grokster\my grokster\command.com Mantas.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\Checkbox.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingNews_1.0.6.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\NewsAppList.targetsize-24_altform-unplated_contrast-white.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_x64__8wekyb3d8bbwe\Assets\SnipSketchAppList.targetsize-36_altform-lightunplated.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.40831.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-48_altform-unplated_contrast-white.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-black\OutlookMailLargeTile.scale-100.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-72_altform-lightunplated.png HawkEye.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-black_scale-80.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.2103.1172.0_x64__8wekyb3d8bbwe\Assets\contrast-black\FeedbackHubAppList.scale-200.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\Assets\FileIcons\FileLogoExtensions.targetsize-24.png HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-il\ui-strings.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_10.2.41172.0_x64__8wekyb3d8bbwe\Assets\TipsAppList.targetsize-36_altform-unplated.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_x64__8wekyb3d8bbwe\Assets\SnipSketchAppList.targetsize-48.png HawkEye.exe File created C:\Program Files\gnucleus\downloads\Alcohol120-Install.exe Mantas.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_listview-hover.svg HawkEye.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\components\DocumentCard\DocumentCardImage.js HawkEye.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-140.png HawkEye.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\TableTextServiceArray.txt HawkEye.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\theme\node_modules\@uifabric\utilities\lib-commonjs\dom\getVirtualParent.js HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.32731.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-40_contrast-white.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsNotepad_10.2102.13.0_x64__8wekyb3d8bbwe\Assets\contrast-black\NotepadStoreLogo.scale-400.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-commonjs\Label.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_neutral_split.scale-100_8wekyb3d8bbwe\Images\Square71x71Logo.scale-100.png HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sv-se\ui-strings.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorStoreLogo.scale-125.png HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\example_icons.png HawkEye.exe File created C:\Program Files\KazaaLite\My shared folder\help.exe Mantas.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-o..documents.resources_31bf3856ad364e35_10.0.22000.184_ja-jp_3c6ad63d6db51185\f\oobe_learn_more_activity_history.htm WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_10.0.22000.1_en-us_b2cc512e9301c3c9\404-2.htm WScript.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\network\network.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveSspr\view\ssprerror-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.176_none_fded9bd0d2f09976\f\oobehello-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.469_none_fdfb724cd2e5c0ff\common-footer-template.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nettrace-netsh-helper_31bf3856ad364e35_10.0.22000.1_none_f170fdfd751ceeae\gatherNetworkInfo.vbs WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\hololensDiagnostics\views\hololensDiagnostics.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\autopilotwhiteglovelanding-main.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\oobelocalaccount-main.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\oobeoemregistration-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.469_none_fdfb724cd2e5c0ff\oobe-header-template.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.22000.493_none_81cdab704eaad423\webapps\templates\view\common-header-template.html WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-o..documents.resources_31bf3856ad364e35_10.0.22000.184_da-dk_677e22d1bfbab1c6\f\oobe_learn_more_activity_history.htm WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-o..documents.resources_31bf3856ad364e35_10.0.22000.184_ja-jp_3c6ad63d6db51185\f\OOBE_HELP_Opt_in_Details.htm WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.22000.493_none_81cdab704eaad423\f\webapps\scoobe\view\scoobeoutro-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.176_none_fded9bd0d2f09976\oobe-button-template.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.469_none_fdfb724cd2e5c0ff\oobe-frame-template.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.469_none_fdfb724cd2e5c0ff\r\enterpriseNgcEnrollment.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-management-oobe_31bf3856ad364e35_10.0.22000.71_none_5465725c68e2919e\oobeautopilotactivation-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..inscripts.resources_31bf3856ad364e35_10.0.22000.1_en-us_64f0fd9c511965ec\pubprn.vbs WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.22000.493_none_81cdab704eaad423\f\webapps\inclusiveOobe\view\networkDropoffHandler-main.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\core\view\default-frame-template.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\core\view\oobe-light-contentview-template.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\oobesettings-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.469_none_fdfb724cd2e5c0ff\oobewelcome-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.469_none_fdfb724cd2e5c0ff\retailDemoShutdowns.html WScript.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-p..inscripts.resources_31bf3856ad364e35_10.0.22000.1_en-us_6f45a7ee857a27e7\prnjobs.vbs WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-o..documents.resources_31bf3856ad364e35_10.0.22000.184_pl-pl_0ce2d9e71e997be0\f\oobe_learn_more_activity_history.htm WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-management-oobe_31bf3856ad364e35_10.0.22000.71_none_5465725c68e2919e\f\autopilotwhitegloveresult-main.html WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-o..documents.resources_31bf3856ad364e35_10.0.22000.184_es-es_0d65eaeab09603ca\f\OOBE_HELP_Opt_in_Details.htm WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\cache\Local\Desktop\2.html WScript.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-p..inscripts.resources_31bf3856ad364e35_10.0.22000.1_en-us_6f45a7ee857a27e7\prncnfg.vbs WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.22000.120_none_bb415867ae85d51c\f\dom.html WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-o..documents.resources_31bf3856ad364e35_10.0.22000.184_ar-sa_78faea86eb6c8845\f\OOBE_HELP_Opt_in_Details.htm WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\oobeprovisioningprogress-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..st.appxmain.desktop_31bf3856ad364e35_10.0.22000.120_none_847a376149211bf5\r\oobeaadcageconfirmation-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..st.appxmain.desktop_31bf3856ad364e35_10.0.22000.120_none_847a376149211bf5\r\oobesettings-aadc-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.22000.318_none_82292a5c4e657627\webapps\templates\view\common-textinput-template.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.22000.493_none_81cdab704eaad423\webapps\scoobe\view\scoobeanimation.html WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.22000.120_none_bb415867ae85d51c\f\console.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\core\view\oobe-chrome-breadcrumb-template.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\RetailDemo\retailDemoSecurityInclusive.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.469_none_fdfb724cd2e5c0ff\f\localAccount.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_10.0.22000.1_en-us_b2cc512e9301c3c9\401-3.htm WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_10.0.22000.1_en-us_b2cc512e9301c3c9\404-15.htm WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\oobeprovisioningentry-main.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\oobesettings-multipage-main.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\unifiedEnrollment\views\unifiedEnrollmentDiscoveryError.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.176_none_fded9bd0d2f09976\errorHandler.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..inscripts.resources_31bf3856ad364e35_10.0.22000.1_en-us_64f0fd9c511965ec\prncnfg.vbs WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-o..documents.resources_31bf3856ad364e35_10.0.22000.184_nl-nl_c6a67f6539770e2c\f\OOBE_HELP_Opt_in_Details.htm WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-o..documents.resources_31bf3856ad364e35_10.0.22000.184_nl-nl_c6a67f6539770e2c\f\oobe_learn_more_activity_history.htm WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.176_none_fded9bd0d2f09976\oobeprovisioningentry-main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_10.0.22000.1_en-us_b2cc512e9301c3c9\404-7.htm WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..l.desktop.searchapp_31bf3856ad364e35_10.0.22000.1_none_d7fb8c7bd4b1b9b1\2.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.22000.493_none_81cdab704eaad423\webapps\templates\view\common-footer-template.html WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.22000.493_none_81cdab704eaad423\f\Cortana.UI\cache\SVLocal\Desktop\2.html WScript.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\unifiedEnrollment\views\unifiedEnrollmentProvisioningProgress.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.22000.176_none_fded9bd0d2f09976\main.html WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-legacyscripts_31bf3856ad364e35_10.0.22000.1_none_d48a0a8f7c00122d\adsutil.vbs WScript.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.22000.120_none_bb415867ae85d51c\inspect.html WScript.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-p..inscripts.resources_31bf3856ad364e35_10.0.22000.1_en-us_6f45a7ee857a27e7\pubprn.vbs WScript.exe File created C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-o..documents.resources_31bf3856ad364e35_10.0.22000.184_pt-pt_101893f71c927fa0\f\oobe_learn_more_activity_history.htm WScript.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 5 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\AgentTesla.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\HawkEye.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Nadlote.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\SpySheriff.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\DesktopBoom.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AgentTesla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nadlote.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 10 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1796 cmd.exe 3448 PING.EXE 4104 cmd.exe 3288 PING.EXE 4608 PING.EXE 1492 PING.EXE 4764 cmd.exe 432 PING.EXE 5092 cmd.exe 2348 cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4084 ipconfig.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\GPU\DeviceId = "140" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListDomainAttributeSet = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "1215129767" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "31126212" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\BrowserEmulation iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\GPU\VendorId = "4318" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\HomepagesUpgradeVersion = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\GPU\Revision = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\GPU\SubSysId = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPMigrationVer = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "13" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133686012430770549" chrome.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hlpfile\shell\open\command\ = "%SystemRoot%\\System32\\WScript.exe \"C:\\Windows\\Administrator.vbs\" %1 %* " WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\System32\\WScript.exe \"C:\\Windows\\Administrator.vbs\" %1 %* " WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "%SystemRoot%\\System32\\WScript.exe \"C:\\Windows\\Administrator.vbs\" %1 %* " WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file WScript.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open\command WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open WScript.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hlpfile\shell\open\command WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile WScript.exe -
Modifies registry key 1 TTPs 43 IoCs
pid Process 1648 reg.exe 544 reg.exe 2864 reg.exe 4840 reg.exe 3784 reg.exe 1028 reg.exe 1888 reg.exe 3004 reg.exe 3980 reg.exe 1348 reg.exe 2868 reg.exe 2304 reg.exe 880 reg.exe 1588 reg.exe 2816 reg.exe 1536 reg.exe 2272 reg.exe 2200 reg.exe 4636 reg.exe 1696 reg.exe 1548 reg.exe 4328 reg.exe 5008 reg.exe 4120 reg.exe 2960 reg.exe 4084 reg.exe 4584 reg.exe 4584 reg.exe 4848 reg.exe 2060 reg.exe 4376 reg.exe 2952 reg.exe 3704 reg.exe 3004 reg.exe 1244 reg.exe 3112 reg.exe 5048 reg.exe 2376 reg.exe 3584 reg.exe 3280 reg.exe 3476 reg.exe 1560 reg.exe 5088 reg.exe -
NTFS ADS 64 IoCs
description ioc Process File created C:\Users\Admin\Documents\GTA3 nocd crack.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\password dumper.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Winzip.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Morpheus .exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Spybot - Search & Destroy .exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\WS_FTP LE (32-bit) .exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\DVD Ripper.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\install.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\crack.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Christina Aguilera.scr\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\GCN Emulator.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\serial.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\gba-renamer.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\AOL Instant Messenger (AIM).exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\winxp serial.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\XBOX Emulator.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Mp3finder.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\FlashFXP Crack.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\1000 Games.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\StarCraft No CD Crack.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Nero Burning ROM.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\patch.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\No CD Crack.exe\:Zone.Identifier:$DATA Mantas.exe File opened for modification C:\Users\Admin\Downloads\HeadTail.vbs:Zone.Identifier chrome.exe File created C:\Users\Admin\Documents\Gamecube.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\ZoneAlarm Full Version.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Mcafee Serial.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Microsoft Patch.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Goodtool.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\lesbian.scr\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\password.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\nocd crack.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\iMesh .exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\WinMX .exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\keygen.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\maphack.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Xeon XBOX Emulator.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Pop-Up Stopper .exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Grokster.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\mantas.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\winamp.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\zsnes.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\DivX.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\ICQ Lite .exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\ICQ Pro 2003a beta .exe\:Zone.Identifier:$DATA Mantas.exe File opened for modification C:\Users\Admin\Downloads\Nadlote.exe:Zone.Identifier chrome.exe File created C:\Users\Admin\Documents\MSBlaster Patch.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Visual Studio Net Serial.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\diablo2.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\XBOX.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Gamecube Emulator.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Norton Antivirus Crack.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\SnagIt .exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Windows XP Service Pack Cracked.exe\:Zone.Identifier:$DATA Mantas.exe File opened for modification \??\c:\RECYCLER:\autorun.INF smss.exe File created C:\Users\Admin\Documents\winxp service pack.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\hotfix.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Legend of Zelda.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\DukeNukem-Install.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Emulator.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\setup.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Brittney Spears.scr\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Download Accelerator Plus.exe\:Zone.Identifier:$DATA Mantas.exe File created C:\Users\Admin\Documents\Kazaa 2.05 beta .exe\:Zone.Identifier:$DATA Mantas.exe -
Runs ping.exe 1 TTPs 5 IoCs
pid Process 3288 PING.EXE 4608 PING.EXE 1492 PING.EXE 432 PING.EXE 3448 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5104 DesktopBoom.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2140 AgentTesla.exe 1576 Nadlote.exe 2424 smss.exe 2444 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 4164 2324 chrome.exe 81 PID 2324 wrote to memory of 4164 2324 chrome.exe 81 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4788 2324 chrome.exe 82 PID 2324 wrote to memory of 4656 2324 chrome.exe 83 PID 2324 wrote to memory of 4656 2324 chrome.exe 83 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84 PID 2324 wrote to memory of 984 2324 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Da2dalus/The-MALWARE-Repo.git1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffccdebcc40,0x7ffccdebcc4c,0x7ffccdebcc582⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2036,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2092 /prefetch:32⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2356 /prefetch:82⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4548,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4388 /prefetch:82⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4840,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4580 /prefetch:82⤵
- NTFS ADS
PID:1848
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\HeadTail.vbs"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4768,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:1288
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\BonziBUDDY!!!!!!.txt2⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5344,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5472,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5632,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5836,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5964 /prefetch:82⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5952,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6096,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5912,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5948,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6060 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5588,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:5088
-
-
C:\Users\Admin\Downloads\AgentTesla.exe"C:\Users\Admin\Downloads\AgentTesla.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5980,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6208,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6196 /prefetch:82⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6160,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5800,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
PID:4104
-
-
C:\Users\Admin\Downloads\HawkEye.exe"C:\Users\Admin\Downloads\HawkEye.exe"2⤵
- Chimera
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:2436 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"3⤵
- Modifies Internet Explorer settings
PID:672
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3100,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6460 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5984,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3148 /prefetch:82⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5808,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6216 /prefetch:82⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4720,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6064 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:2944
-
-
C:\Users\Admin\Downloads\Nadlote.exe"C:\Users\Admin\Downloads\Nadlote.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵PID:1072
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:544
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C "c:\RECYCLER\smss.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2084 -
\??\c:\RECYCLER\smss.exec:\RECYCLER\smss.exe4⤵
- Executes dropped EXE
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:4952
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:2948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4104
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig > c:\RECYCLER\IP.dlx5⤵
- System Location Discovery: System Language Discovery
PID:3364 -
C:\Windows\SysWOW64\ipconfig.exeipconfig6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net share Love2="c:\Documents and Settings" /unlimited | net share Love1=C:\Windows /unlimited | net share Love3=d:\ /unlimited5⤵
- System Location Discovery: System Language Discovery
PID:4324 -
C:\Windows\SysWOW64\net.exenet share Love2="c:\Documents and Settings" /unlimited6⤵
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share Love2="c:\Documents and Settings" /unlimited7⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Windows\SysWOW64\net.exenet share Love1=C:\Windows /unlimited6⤵PID:2744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share Love1=C:\Windows /unlimited7⤵PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet share Love3=d:\ /unlimited6⤵
- System Location Discovery: System Language Discovery
PID:4576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share Love3=d:\ /unlimited7⤵PID:4632
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "smss\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "smss\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:3980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:4120
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping ernet adapter E0 -n 2 -w 3 > "c:\RECYCLER\check_4_online.dlx"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5092 -
C:\Windows\SysWOW64\PING.EXEping ernet adapter E0 -n 2 -w 36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:572
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:1584
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4376
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:1152
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:3112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:996
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3280
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping ernet adapter E1 -n 2 -w 3 > "c:\RECYCLER\check_4_online.dlx"5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4764 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4084
-
-
C:\Windows\SysWOW64\PING.EXEping ernet adapter E1 -n 2 -w 36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:432
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3476
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:4500
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:1028
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:1132
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1560
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5048
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:3752
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:1544
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping ernet adapter E2 -n 2 -w 3 > "c:\RECYCLER\check_4_online.dlx"5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1796 -
C:\Windows\SysWOW64\PING.EXEping ernet adapter E2 -n 2 -w 36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3448
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:880
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:2672
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:4680
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:2376
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:1208
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:4636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping ernet adapter E3 -n 2 -w 3 > "c:\RECYCLER\check_4_online.dlx"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4104 -
C:\Windows\SysWOW64\PING.EXEping ernet adapter E3 -n 2 -w 36⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:1124
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:704 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:3584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping ernet adapter E4 -n 2 -w 3 > "c:\RECYCLER\check_4_online.dlx"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2348 -
C:\Windows\SysWOW64\PING.EXEping ernet adapter E4 -n 2 -w 36⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- System Location Discovery: System Language Discovery
PID:3368 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:276
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:4328
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵PID:1236
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4584
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2216
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2580
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:1348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵PID:996
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- System Location Discovery: System Language Discovery
PID:340 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:1244
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6064,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6460,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6648,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6636,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:328
-
-
C:\Users\Admin\Downloads\Mantas.exe"C:\Users\Admin\Downloads\Mantas.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- NTFS ADS
PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6196,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6448,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6072,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4796 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
PID:1628
-
-
C:\Users\Admin\Downloads\SpySheriff.exe"C:\Users\Admin\Downloads\SpySheriff.exe"2⤵
- Executes dropped EXE
PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6500,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6488 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6696,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=988 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6708,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6608 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6848,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6568,i,17089275201396675018,2278758406848523027,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
PID:276
-
-
C:\Users\Admin\Downloads\DesktopBoom.exe"C:\Users\Admin\Downloads\DesktopBoom.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:5104
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:800
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2084
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2444
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Discovery
Browser Information Discovery
1Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245B
MD5da164ce32696cb199887f9e75167f3e2
SHA180302ff3b2285cdcc44694060b64d31210f97a2f
SHA2566dc8358831ae0f7b41f0827bd6ca524baa75daf82a931a2c29391a7873858718
SHA512d5517655e45f598efe8e4a55790ef6b06d8f13248e9d28c3890bd8900411a3c763ca7417c6936f4fca1c6cd542b298ffae72a2130ea328cc709fbbcc70807ce6
-
Filesize
34KB
MD5b657543a2c60b3db7b3cf583ab0e297e
SHA1d63ccf5a5d67c124a63dd3979606ae502e22feb4
SHA25674f294b456e05523b71953ee9cd2ab95f4616d2ad48875529d920baff58e60b5
SHA512ffe047c6680f36b392a0970b38a3ba734f3985263c1a208a87638580b1f6165b309c165052ae87aa0b1b7aaff394e0634c866a7038d889aa36887ec6e5b2c00b
-
Filesize
35KB
MD581d20f276ad1f69bf28dcb870bc0297f
SHA17e07f9611837bb0c8b4cab946189ab807193a906
SHA256e2a09a31108a47b4611126cf53f846716a94f6c51daae2da580218e4b0a6366f
SHA51271747e429d1b697ed2ee56290b6da125938d8d421e9bc194b1bf5ac6c976f56e32f319bab1073bf3a452586b613793750e88046e77297d922b3dc72ef3a0e66d
-
Filesize
4KB
MD558c536b70c65afa631b14baaf1b0917f
SHA1c822779c331211e286afb0e9f4f6b2fd136ea72c
SHA256853a3434861e501d5fc7917dbb5cad4d092752c4a89ec661550cb34fdad6907c
SHA512a48f9a9e69a337e6522b409a503e7323d0b44b4803b5e8b51292b2947959d9b77a42095239b29058cd518170dfae89aaf327a216770a61b08e64d6b70c2649cc
-
Filesize
35KB
MD5aa7c740f1127090de77166831366cb1e
SHA19b41de103f16a78e79050d86562015538e666b4b
SHA256e1d08851d8efea65198cb934bcd39aad5fd3bcbb7dc9f248e92f44b7ece94675
SHA512fc4e9600cb569dc7b898511531f4d434aa1424676b6c7f2119e86cb18d0b656754940044ebab33b0df85a99cf5f7b77c84481100c6d741c0749d41832c8a3d19
-
Filesize
35KB
MD5c4f38b82ecbcf81f67053fae573ee89c
SHA13b915a4db6f9ca7af2e5f1285ef25bbd17c52c1c
SHA2565a0e613f57cda4cbb8e4029ddfd509ae6651e30fe1d9c40847ba34f491224bfc
SHA5126551511fc2a46ddc8137def2b9621b28b977b9e74e2a511a988d822c8c570e32cfff4d7bdf29b896bd233f3ec9c2837eec59684ec91ccb09129caadcf8c7d91b
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\README.HTM
Filesize33KB
MD5e6d249bf423b568b2e0172853129cb26
SHA1b6270d6c6a45e6035c208ec09168d9cc6d2d15e4
SHA256897065e90ab5686a6cad47c0bb0dadeae4483760db3ee3151cefcc329b6604ba
SHA512f27cb6738c0bc7a717a9876a0f51ddf4484717666aeab51d6257064e344420a4db7d68edde3196f8734f4c141a7b95977dce0c84902f1809a649416e34080838
-
Filesize
34KB
MD5a1b6f6d5586f4f8943d9c001dd118335
SHA1b48643e5837976429c689db844b9ab0f01def3f1
SHA2561c2ec0244b229fe381c9ddc0a7a7c18dd8b0ab8ac6fa65a787e371b914dc75a6
SHA51265c5f0f3776f89fb149b68c88a1b218ddbe056134360e9c9ab42b5fedc01a2b51f1007073f94b7b6812e65a41feee4fc8a147fefbe25cf9666ea39fed2d9d32f
-
Filesize
35KB
MD56f58f23519bbbf8325f59db5efd032a6
SHA10f90b3a314239d7969e1fd6822e3d54fcb55f833
SHA25666dfd0876456a415d0ed088d4d0f550802d3ad9a81d6c35299c530252c98c4c8
SHA512eb89ec2a560902da58246c9c3b0129ff304f0bacdb53f67dc4b77c9f124672d110f990f3c7db9e6aed87097965cbf84539e39168993ee4d1b8291cccd5a60587
-
Filesize
48KB
MD59d2e6baeaea1c65df7b32cc181d09779
SHA1938a7618f743b1f9cf637d929023ad9851855f4a
SHA256799da79d3c1a6c1750501721b4521a23168075689c7cc5401f2537579a9f72b6
SHA5120d781c77465382e112c75c11beb10c0861af6c58200e9907eb3b9658df8837bf67ec90291d68ace1efe0bb94d4ba0ac2c901cf17b7d13fa1b9fc67592ad58003
-
Filesize
35KB
MD57594732657772f081b1c8f9aedb92552
SHA13260893836f9d2e96efa86e2ccc482624a123c6e
SHA256e8ae4e6556ff613fd4e4265b9736489c2cadfe0222644fbaa7f818a257a57395
SHA51275be0b35e75a787a75607b620e9068b0d2af3f5e8aed1f5839551bdf2fb5bb262cf4c3e1d2f1e0476696592c0fd6d5d86f863cdb6de6ff50bc68bdd4dd7778fb
-
Filesize
34KB
MD50d2944aa60e8b97dd29f0100f63c9829
SHA1f8a261c7b003336c0e006ac9fc9f81dac6633840
SHA256bf3972de87e609cca161981578b80667d17e61c54b9dbf21ecad6077100a42a8
SHA5125a2dac0835fd4339c430fc78f4ce0c285f5eb57e01be6cdea454915dfb1892119aa3566045b6b699e9169a531260097b4ee07872adfde52858577810d7f68701
-
Filesize
39KB
MD59f34c429682b2b0be77c9853f24fb220
SHA1196a45659c836a86867493d6101582742e1af432
SHA256294a35660d5c7f2931ff1e2d96ac5fb37849aedf3a854bfe2fc1dc65a92a5b10
SHA5121421cbf366471d393c4a1e21360563fc0322e1d5c0819774144ac6b2bbed8db534069e355470752d258f1739f79f7c3b9dcef9af81f467f7a620b070a900404c
-
Filesize
35KB
MD5b8be595ae7eeddbe008fb7d1323d7b22
SHA1d71193aefbf949aee29fcf01075fec49df0a1192
SHA2563fb54bb4c133fef0c158a98f26fc17ee38a837a6b068404e6c0b245136329bac
SHA5127eb1b6d0976e9f31210ea8ef4a854621026f7bdd7a86c1e57cc14951feb49eeb7e51b474f09d3d4e80f31443349397807df14ff155c8f427fe177b46d12ea342
-
Filesize
35KB
MD59a634b2ad7eeec33976aa89df0eb982e
SHA135c1d9bf7ec14c18a36c044bc1e121f8e98669a7
SHA256c5da83c9bd3beecde7fb2162c60b94285d52f3d1ca09e470ec9ff73531c1a1ac
SHA51247709ccb298ffd3179e9c7c1b773adf78d1076af6535247d6a9956be9f906ff94b785af0eb43ae9d555937e47f187d38369a9fba27c71443a3625867b64a3f61
-
Filesize
38KB
MD55c0abc27f89ffffbd08962d4612fbed3
SHA16732c236dc11be07cff3c8723ac2726ee7358ee2
SHA256b0adc4eb38127f84fec4510155b418819d32e6a170b4e6c12f6eff21bf8ad51b
SHA512ecb40a689adf6e5a93b5047844a5f978b642ad073035574035e2b3bf7369d5f924a6ed01a0fd128815c1637c856289865be3c85dd37856784e4542b84ed88553
-
Filesize
49KB
MD51c047124d93a9e6ab865e54be71c3d9f
SHA18e3028c66f2a019e87ea2601927ad6871703fa14
SHA2562b271f907e5779cb846c810d137c4be834c77e5691a0d7d7806d69dec6d5c950
SHA512adc322b31c7baca8678602713f517fb09151203df2767973f83f23163c4d76c27a003c91930f54503545b126e665fb7a4fd6a72059513521a603e3ed6317159c
-
Filesize
39KB
MD5500ed26c2800d362a5376c2f3d61a69f
SHA1b7c7b72e89e2757bfad1a1e87dc4b19ce4d06cf6
SHA2566b0f127255961c6d2ab3d3460b971ca6e72eb099dad0af35d5c31340b8bb29bd
SHA5121f5cae5853ea838078181270ce1aa36bc664bb15bef1fad4bc98124e07d7a41b7e014dc86c3d47dae1f67219e8620381ec3d4b127cb9cc163f084798e7e45c00
-
Filesize
36KB
MD55463d7b67835ee8a27b71a99c6723740
SHA1cd1f6c533c0fa7778a8e301b248f0e5c851e3023
SHA25631ea620ad6211bde759a17fa03165ad93f1a0d757fa25b27e20cc3bd833f9e98
SHA5126a0e3ce18ef0eed33f98895a84460cb58fb53dca494e2673325da71fe5b46d4376aa7b42bd4c4acbebb7b977c50d40295bfdf1da8167287248df601c4f617b82
-
Filesize
36KB
MD58ec871594d2242d8af83ed2cd3437828
SHA15c48ccdbbc93bf861bfbbec270293282459a9b48
SHA25662a10ad07d6ffbb67c4617691823df5b77f3100106e189e29d08a97578c10e5e
SHA512597e3e9a226c48911f2ffccf2fb146de938957bb48898712c130b0d1395c7d0a882850c9a3e2233160795cf5076054c8e9d30a379ecddc1b75be910ba518862e
-
Filesize
36KB
MD58ca0365db144465b448612ca81dc8924
SHA18d3af71041f3919e947d6f794fdc12ab81c98302
SHA25655515f229b5a59da3c256bb49d03fa1932baa3ec4fb5267639e3bda440b68d48
SHA512049d493e1d9c44337038d03e4591b82e34d2bd766274e617e255420a68b69e8c0e15f3bf1b247fc12e7481dbcfd7547045da5c66a76dca9d927aa3d9e824b02b
-
Filesize
37KB
MD50523ef1a76a792ad6f92ddb257e8029a
SHA1b15a6b6efbdeef77352ce04cf10de76b7fa32ba5
SHA2563729cc1f7d69463d6a1684c18aee7fb7a86c702032deb4abe9017d87d1167a91
SHA51271207c2bb3a630688e04d4bc7c1261884a4930d0a93eb258bbbf2ebbceabc3f756717cfe07905c868f577950e6ab273f79c526f682b9e5626629c6630c67b439
-
Filesize
35KB
MD5e7e9b1e2f18ced7993de6236f5bf4662
SHA1bc379f67541ddd8dfcce3343cf66c0545979ef97
SHA256a9249126ae5dc0babb8af46ad56d3ae638ab7b46c7af1d51707c2c779d1fb6a5
SHA512f9a3303d442c85df1b4f0ef944ecacaf988de96f7a78242c80658de3b2ab73464ab7cab4d7912a87d668c679df6ce12019a0224fe6653a0e62a9e0c0b80d4b60
-
Filesize
34KB
MD5c90148cb834b3f8c58e398b82deae687
SHA17dcca102885ecbf76bfb9e231a2a4c96eef6e89f
SHA25623a45ac0626057c6fe3a34226cf7b3432fb66afe7cca1cbb18298876d2fc65d3
SHA512828f2161062e3a4dcd66739b270e0293f2084b184d3f9b380476076e9dbc8254758692d88af9bca9626e6254e6af6fa4ad43ba020d25117c92266ff6ed1c9f74
-
Filesize
379B
MD5cba289891ec7b2f21bda3435f229537b
SHA1791eb6ade5b072480020f649151d3309d7ef8714
SHA25634e37c589c9cdfea750288f65d019afee10644722cc520f1e95febc5758fd4f0
SHA512626b0ccb36d6dbe9c0fd18b3c7a3f0636fc840a7f02b81c7c1883a638044202d979d330efefbe8d891d7ec043c64ddd536beb25994dfbdc66244822a6cc6736f
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD57a08b48be28129f1c92f56b1a32aeb08
SHA12b33e68fc0a439a83a082724044d691cc4471262
SHA256e98975c71620c02bc967ffe3ee0d5e3f13803ec66e610c23277a53c21c77e7f3
SHA51239d66dec1f0bc0c0100499655cd47d1933cad99af3cada5525bbd1b992b3520423424fe95dc744e53727404301fce636b7b7d495e03b9ad9e0d58a235237cf4a
-
Filesize
2KB
MD5b9859398467d9968823cab73894fbc37
SHA180c16b55b4604b269dbafe53c50160d0fa2a3d88
SHA25634821abf45c02fa27bc338dda31bc4a9921ada0c0bd7cfa3f77b52ef986bc5f4
SHA512713623db5e7f61c69c50814b456d07cb5a7bac828a027f8b0e2050a15f32b561d0c2af8c9010e8113f3150ee3fce15e91f63575c0f1fe9d9110a2072bdf26ed6
-
Filesize
2KB
MD5a41fb75c8c2ab5eabfbe6556abd89afc
SHA155b8d143811c1acd40d4e3f572898669b78d5c71
SHA256429ff4675fabc9ea0b08516131b6cb188fefc1cc1c41010f3a19cc92b53f102a
SHA512ec2014bcd0dcfcb5f576346db6e6179a12deec8bfae343cac5830fce92b9d6902d9db200dad27e11e54fab5338434871392934aaf98cfae740b7e1d7aeca40ea
-
Filesize
2KB
MD50caed8b86865952179a82ab8cc6e1d64
SHA1bcb76781e64f550d5feef88702895bd16b6e1419
SHA2560f198c1864dcfe30cd3118054def69a6d3f8ca4df18c7e5904b023178327d063
SHA5129e93508bbc4acd16047032e7e4d503e0dfa0a98404273ddc8545bbba8c589478ee627099e1f22e88e50a467f5d79cbd917c76285adafc16bb86f2a599afc388d
-
Filesize
1KB
MD5c920c33b6051507876b93a1e2e00969b
SHA1c4102fbcdd0037f462833aa381c4ec011a7efb1b
SHA256cf297484ef95ac1bd3e23e27c4b2162b8d5cfd14ab37b12c43984020c9680805
SHA5127a8492419d95d890ef5e39580d60eaa14ea39725b4c0230e087cea30cdd86c23d154d77d10ba0159e48d455761bda92a439009b05ded38d4462c7ba694c2a13f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD58f1e38e2945cfc91cbd70b965fafad56
SHA14291013ce767fee9737adf57235b0beb4ea240cc
SHA2568cbc14d7af0eb39acae1827906761828d5b66d09dcad5ba503688e61ae3bc592
SHA512d599f4412a7e770ffedffa4c9c747e8e7faa803a08e2822e69dc4f0f711da67aca16ecaeeb956ba26be892d3fd28085a0db44742e13f72377e33dd8df69049a8
-
Filesize
1KB
MD527b40b27eb8157e00f6a055078342d1a
SHA14f68d0c7afdf0250b2ceabeb28e134a050a171ba
SHA256958926aed0536affbcfbfe95d0ec64aad410bdafb275ffcbdcfd435fadd7e5a8
SHA5126a8159c1a5ba67adcdfd35af67155d900840e6bfa07f7912171098c1b94703f6c11c910bc8dbd3513351b5089f9f7644f634a6572e5e105aa36c4175e7c6ab81
-
Filesize
1KB
MD518e8d1badef0cd25b39d2001f0f61778
SHA1cb054eea3a7e5e259dfd1e59cbae67b68125f654
SHA2561c64ab725ce92b6b1ed17b1b2f329c3cf97f92d317a4d6613530a450a806803e
SHA512a74659f98b51b6d97f6a276233ba1ca99e56331d9cd33092176436c1a667740d94eb2693495966c65b4b1a56b7f9a3034df579457dacaaa001ee96b1be604cb3
-
Filesize
1KB
MD578fb08fc30adedd9676ad302abdbe1f2
SHA1020751ad97ec5ad667d60981c668548e1bb48919
SHA256a226ac443d9e019f48469b90e0219f56dc78014ae43084506009a39537357b85
SHA512feed945cddc4e85ad8c841240ef14e0ecde50c0f4da0b605fd4dd9cb218ecce3d3845d6f9248930230ffe93d2b4a8ddedf6d67933a0a7e76527a0c5571edeab4
-
Filesize
1KB
MD50dbea71d6587ae880646bb2ea0712734
SHA16507d5eb196c9af3c51ce8cd745157611081af9f
SHA256796a96189976f4fc45849c53118a3ad4f42160ccf0b01e5eaaff9135fd2db3f6
SHA512ddc0931b3bc865250a4dfd7599f1c7ea4bb401c38a96972ffdcaf528dd323cd51bc406c19cda48227b465c8e13974c95e0a16273696f9ac634d181990ce0672f
-
Filesize
1KB
MD59abbc11abd24ad8a723c5ff8ebe07433
SHA131c5934daabdef6027ebff5587604947a149ab67
SHA256646ffd5ae8329ed2d251b6ced84cfa1b5d194f749b2c6ffd8f49a7d255c36948
SHA512da10d551a21b7f164941e4aeb608f14c687c9255d67d6c26ad68d311e7c25b8b96428f213c65046ba412a24597bf1b8e302f041a68b8c634f54cef6c633e6ad2
-
Filesize
1KB
MD5c84a1241b0548920caaf334412e6feec
SHA1b6c0864b0779a93ab69808ddd3b34ae836b5de38
SHA256b395750778a2749162e1751e6b31fea8a8b17eaddf7853f91165c08001487987
SHA5121e6d91883748ac5ba6d1494433447149757abc94f27808b09e83f88b249daab2efd25dd33c3a8f6a76843a6612c35cf9c45322e54de2b06bf9ca1a4d57b57b0a
-
Filesize
1KB
MD51e549ec6d0e8a8b76f7b46123d726669
SHA1fdb68f791654a6a4edf716dfb2b320318974a4e2
SHA256d15a07bbce5806f7bc942928eb99d1681d504a69c9aa32b9e46b9565da3fac90
SHA5125d1446d8b688d7410dfd880947cd61fa841d0274b63892d4c436c9bd7324c63cbd79b4497fb41241b15c5efcd92d7c0267ec5e9b2f28fb9bc2594abc453c66fd
-
Filesize
1KB
MD596e81896527b7887ef1405c8cdc60e3b
SHA159a4d2f4342f26fdae1df45d622456d67fdb8b21
SHA2564649d77ab70b40d21e1207767d62708128ce207a35593d8c057d7006df628c47
SHA51218318b41caeb0c999c1fd3c7eb0467141f36e9dd8b16f289e4513a67e808001196717f6f8897d182e17a8aad211baa2aa0b64c561cea617c809f5ed0a7903f47
-
Filesize
1KB
MD5ac06a2a84f897410995958f37237e0ff
SHA11f533cd558e34621a8d6ca9ec0e2cc397dbf0bb1
SHA2566ff2174e8fe3494c7465051d18a7f2cc600d34a72126acaf62f86d98f01420fd
SHA5129bc32a75d820929f685ec17f14a14f090df9237f3dd7d3bbd53024bdd150604dc02df9a1a71c408145f8bb96c5457deaa3db0f1261b5251ceb5c82b2e7aa14e7
-
Filesize
1KB
MD56a3e1f50adb37b39cacf679e26385d68
SHA142c8655a51a752a7e17ca1ff889ed5247ce5ff90
SHA256dc44e085631921ed174e07fe60bc8c12a48a7586a5cfc573c42e81a9d90bc6e5
SHA51251e0f7c6ba008d0ebea699db70e9e7d614fa80b2715eb5b27f608f117eb8d285dd81113042ae7b8d73b8a10b57789913276ab051c01b4ee8970099c4a3bad380
-
Filesize
1KB
MD5e8ff3e84e2b5a229b5ec66b8cb48eeef
SHA1b1cc2bda5b55fccbd257b3b824eb346d96d9db38
SHA2564bc05c6b800bafc42930bc90449a5c7680e372ef201ba5db2ccf6a0a94b91557
SHA5121ec6ddc7f131e40b919efef451c6822b53460b8eb07ed801e437e8119d9a8c87ff3a9952959821844012ef62f8d23b7c6ee45f722dbcd0e0a9449ff473331b9c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\cd86d436-4dc0-4497-9bf4-98228e6b7265.tmp
Filesize2KB
MD5945f5e0fa291e8ac5aec504b2de34f98
SHA1055499173b16d9382586220c7cb3efe4ccb8995a
SHA256c24a55fa4113ca9c41a29eeaad538611af35809e7f51f78cf93d7e32f24e4836
SHA512988139915a40c78ed3b16a556ba0da9672907a7887a078807109d1dd5e3fb52138322232457c54b38f4a173828fddb85ec55ffe81dd9706b59f72e46c55d3f5a
-
Filesize
9KB
MD55d98b78fb352b4c947f8d493dd9298f4
SHA1bcb8d78f9f260df7a7b9c9b3a707efb872fe887c
SHA25645e67e88a46d81139afd09c2eb594c738a755d42dba4888c2533938933b14a30
SHA512de65e5ffde885e300b8a5611e8cc5bf45eb93963d28449c5d33c41efe8006e8024733c83d25e5a8afb3dda522f25d711d1033aab73b9d5d9f754ff20ac003e3a
-
Filesize
10KB
MD5ea849b227b44edfdd1ed7094b6bafcdd
SHA1cd9e875de4ff70f268e7d9ae1feeec286934ff23
SHA256cdd3a3979a791b608d285247cdf5fe76793f0f504a47e693edd43ad8b4367287
SHA512dbda3046e40a410eb210b27428603d4719680fcc8d18a002095d24d4c9843886c3ddc78bae3d6068b178b625b440b7f89ae713a76523ded0c2194ffb44b4dd80
-
Filesize
10KB
MD5cfb5763a515f6e35032f2e19e9264b20
SHA13b5466e5982a8788750b11c882b203fde8ecc46d
SHA256a43938c1adf8190158dfd7bb4ac20b766400e9367e2d2eca5083ac6f7058b2d5
SHA5125dd34e56d8c50234659a2773bf29f783d2c4fae1b160e8d60b871f05d3dcc50a7aa9e6eff78f5cfb4fb3107e64daa9469fe3b0d66e1d3c4c928711de3604953c
-
Filesize
10KB
MD5f0c06589c286e13eac125df649490671
SHA127b0936d6d759a71293766cd14bb3ac4458f1233
SHA25675d54409c0f4e80a12798bf0d9af2ce8fcdcc6318274e930fbdf6c400a82db1e
SHA5124b0ca929ab5ca0bd607cd1cb2a35362f0680ed6237d9ec59110462631b5368db0323fdda63d987492636fd1e69760d4027397e4890c2fcf6f5bd05f44e54b33c
-
Filesize
10KB
MD56854776dcae67308b44b322014b14611
SHA13186c3e0b6657db64bb9c1ca4708a8c1822a897a
SHA2568cd8a533dd31bcbf22d047eabbb33cd41c751805c97356ae5aea4859548d1ed8
SHA512867539ab589d4f4fee70d6e154e7d507a1a1061c5b6ab307733c8e63cd56214c64ca30b9962a6c6bf642cb6f45b1b912cdf42de5e5f4a8840343d7da8fec05d0
-
Filesize
10KB
MD53c1c26e68f9f12f5534312803442b9b3
SHA1ca727bd656ef2bb9301444ddb0a03c0bbc198f0c
SHA256ffb321c0bf371efda616e5a06fabf29251c28e2105617fef2df7054fd8127ee5
SHA5127bef0ad88afec1482a00ddc3c388760a0be48fe9e9790b7aed7c46ea20a0c8f17d8fb04603c913451b3b1421d8f1ec97e61ff3a0eab0bc188aa91424744042ec
-
Filesize
9KB
MD514e567406e4fcbda9182fd7505457113
SHA14282c90ba661746198a5a0c8f1c737c093d6b723
SHA256aefc0956a4441cc2a98236e0e5887f86cc31c4b20ae6ddb8d16aa9d4b6de5b0b
SHA512368b8e1bb87a09d3baeafc20089b3929c068d0ab9b969dbf46b405eb32304ba771caa0523276899ae6221cf336d948529b4469a216b84ef4f55aec1e2eea0c69
-
Filesize
9KB
MD57038f68c04803754cffef66bca3a28c7
SHA104521b0918eb8cdd1925600b4f1e040e71da674a
SHA256c1ea7f9b7a76146c64a207c03a4ed4901c42b0215bb5753436d2bef217f64a52
SHA512061069f8285eab73c8eb43fdb63af408746a836bae1ce8109c352c099fa1f15f426585efb031e008a05439843ef37a14d03e71bdec74524ff5f53d5ec0a4cd07
-
Filesize
10KB
MD5d14ee095688e907f3b618e54ce6a8cb0
SHA13ef2372859582566508984316a9ef2f8a75f2ef6
SHA256d82a9993df44111c523c53f4bde6470d468c215cb4a541a549e71fb87fc0d214
SHA51278802f31e8e8f6c3692c27ee5381c9dc29e982dbfdd999604a2f8b93eb92450a4319e48e583a5689ced95216504428168a4860fc20f11e9059e5d3e5699019cd
-
Filesize
10KB
MD5baa7f93aebbfcc034fefb218cf2ff183
SHA1e93df6b5c36f4686791b6a0efa1f88816de81b72
SHA256e9e773ba338536ace9e1a7b85a20d7e1674379a7333fc5664cc792e6716cf204
SHA5128c721b8b1aeba7c60f47d813ba19f38a34fcbec98833d2aa794b4116bf2e865cdb977fe218920fb96e3eabf9894bfe00a402e63b6518339418ad82320b537225
-
Filesize
10KB
MD591a077612460cfb0287b745e112843e8
SHA125ab4053e17faa6f870fc4659c151491f7f91d77
SHA256f399bb311137adff9e150b4df3988fb0fb0c28f5104e2748a45a7e12e324dd19
SHA512b64d3f58515a12a24328d3cc32a84bf29542ac27a98504bb72f72a4a78bf09ad0b71ace1992c9aae4ab9a9f7e186c6d6a353b0c033dc2b201b9f4433c92dc8c6
-
Filesize
10KB
MD51ffd17ee3ab8c692db6cd0e26a1791f4
SHA17cd6255d1ff3d8784f25c4546514c42afa6b5ff4
SHA25645f4b450a40bf1ad1dfb2d18efb2a0b3ce6b0c771209e72bc7435253542c11ab
SHA512782a5e52f29ff463507bb20a0015df845e57484455a00c76f53f9a0ea8684e33d7cfaec8766ce8ed904643a4913203de5235466684ee45a8b314ec48806f625b
-
Filesize
10KB
MD553200884a4019c4fa3e444b5c46927ad
SHA196fac0c5f3ada99395334e1d69387b4ad4dde78b
SHA256cf60545bfd870c469e5f30e390e4961b72c87894d6df39789af49297045a419d
SHA512b078f9fcec3e1f931f76359b14a83b007eec2db9108882429077b4cb8a83f901e4364c1d560ca42ffbcf58143ffa887c5346e9498f7a76f34c27b9ab6af5749e
-
Filesize
10KB
MD5ef100b2341e95a37d0a1e10e8c22c8d1
SHA1496bac7da00d14f1e05618ece18569decfb2ef74
SHA256a7ca0b6fe940f7ac63dcc6f85a145976714fb3603a496980c277755a0dbf5a8e
SHA5129fd184d4c5e5f9caf81c1484ce5e6f6e50c705a14ca1daafb9d9cb88af13834e33febac447b4e5ec42b720bfde87e3f0dcead265928cd12a1cd5d7058675e5f5
-
Filesize
9KB
MD5e8accdcb2fae82133222903b06ae4214
SHA1de083240d71b5e99518903e7084afa5637c89607
SHA2561df63479f0f4dbbcf86d067a3a946fa582662058bdca5c77b7fb05940fed077a
SHA5125f6cfa29e0168d16d244937804ec279eca8a0f60537b29dd9d9f3fc8b3933fe72255107bd62fed5512a2ad10ea07113e13c19a6ce5793944e765f96587e3f41b
-
Filesize
10KB
MD5c0ed75abab6c72d0249d306556d74025
SHA1db8397e1f36db8cf31113f3f772a60bdd0e683c9
SHA256f9d642c288f9aabc8db8c89201652cace285fe94ae43d72961f25fafc584a96e
SHA512a2ff681775469822f3aec49cd59d3a6df5c2c7c45ba1b15db6e3086c0e75e460362ee234fc2d3e1688495c45edd7aa1dc788ff72dc75572baec8a5a9330782d8
-
Filesize
10KB
MD54d53a65d1cd5f55931511f500f25f5f0
SHA1feda96f4bd3df896eef5841072771f6d9b3814b6
SHA2561c9ef80b68bcac275f38641ce739ae00c92fbe247eb794f81a57a01a7f585de9
SHA512d705ce5c7ea4d749a9972263f40282cb78a491b1823fdcd63d598cb1bdc8151d36fbfb79704fd0eb64699c28448ccc00a5cd4267d3d5c1ee5101f5797254d716
-
Filesize
10KB
MD5cbebd0417a400b1e9fb4a9cd533945de
SHA17e470abac9581f03cb8b606c5c3152242aada7c7
SHA256580ba39269d3e5c6f17ca2d2e96047936f2c3d24df64354916e129d8458c3ba8
SHA5128c67834d131b74ba15ffb628667859ec4b012b50c54d7c53d35887d38cd28de7919994df203aedf41042bf6336d5bd335ef41eef30d7db8ce8da411efd888d35
-
Filesize
10KB
MD520d506375aa7e621c746c319f052bb98
SHA19a44d3785b0e22a63986c0d36b4d6e0bc0b8a986
SHA256c1c3d250ce814bcc9cd4428cc41338a0b0c9291b8d0e31a466dbbe4b84d37d76
SHA512e19ec38045b2e983b9aa46ddffb2d4e151c763d44fae5c2f0a1d8ffc02cb9824931e09288d65fce765f85c5a4b2d49ed2a79a392662f9a8e0bfec6340299afeb
-
Filesize
99KB
MD5099c9181e55327d253924446b204f48e
SHA1646424f35b636158a65bc763084ebfdab969d542
SHA2560cf384abb59afe3bae4a607dd6d23288db484e5a6302d3cac0013d0c10db33ba
SHA512201f23165866aea518f985c5a79948f59ace0579bb98444d1f0317bf4fd83e807b902ec9989ee56994338d3f43f03598d5de448a348bc5db57c98eaa8c42a9e1
-
Filesize
99KB
MD538493caed4bca36423614870cf50135c
SHA139378dbd15c5047d5e27a3d3f8ba71353e9804b0
SHA25653badc191259d60f4d5477832e0aa53139949b6e3ffb5719c6003972ef5743c6
SHA512336d82ac0378761d2af661616069d38d290fe06e3caefbfa2f8b08e0ffddb6baa9e5e11704a77a14ddda73295ea8ceb3d4304097eb5c59578e8dec93bf558d3b
-
Filesize
99KB
MD53f70185d162354b4ce70da5e47e6b3aa
SHA137aefef30fdd91c93655027987107e40644bb4fc
SHA2569bdd89e00867ed6e18dda66e52e9a9c443a6f0efec5a6dd7f06b4db8a36fe7fd
SHA51210e1341b84ba7a22aacbc6b0173cb7fe34505c90cb7e10c15db908587ccb74c40d7274c240e918d2480f11bd7d0e4a23b01e3b58e7c1cd559b6ef86f9ee9d78a
-
Filesize
99KB
MD5ae987ebc8ab6a013bcae37a8952b1a4b
SHA1bb88bf12fdd9f2eacd45d04179bb82e919dc388d
SHA2561153b393cc53ba7a5d12de7d27b3ae5c8644691783b23e966374dfb5d23361f7
SHA51233e7a0dc42be38435bab82cb5b527498de8acf40079e2d645a126740cded4831b6e25a5f687547194bcf4cea337bed93a967489f9c406213bf9af83f4805f096
-
Filesize
23KB
MD558b1840b979ae31f23aa8eb3594d5c17
SHA16b28b8e047cee70c7fa42715c552ea13a5671bbb
SHA256b2bb460aa299c6064e7fc947bff314e0f915c6ee6f8f700007129e3b6a314f47
SHA51213548e5900bddc6797d573fcca24cec1f1eefa0662e9d07c4055a3899460f4e135e1c76197b57a49b452e61e201cb86d1960f3e8b00828a2d0031dc9aa78666a
-
Filesize
2.8MB
MD5cce284cab135d9c0a2a64a7caec09107
SHA1e4b8f4b6cab18b9748f83e9fffd275ef5276199e
SHA25618aab0e981eee9e4ef8e15d4b003b14b3a1b0bfb7233fade8ee4b6a22a5abbb9
SHA512c45d021295871447ce60250ff9cbeba2b2a16a23371530da077d6235cfe5005f10fa228071542df3621462d913ad2f58236dc0c0cb390779eef86a10bba8429f
-
Filesize
58B
MD5804161c9689a11073cb06c6efb14df48
SHA1116c59bb54d5a46ec5b01d1d46864e4e73436c37
SHA25675af24573f8e21f6f34e6ad1b6e25ae91dd6cc2ba97ad10e119354adccff1e59
SHA5122aae2ee83aa598adbac09c5b02fb13c41d4191b71395b93a29aa05b88e2f92a5e02b63aef130a0c6cecf82559d155339cd7612c73624aa12486c666d7320617b
-
Filesize
1.1MB
MD5f0a661d33aac3a3ce0c38c89bec52f89
SHA1709d6465793675208f22f779f9e070ed31d81e61
SHA256c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a
SHA51257cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443
-
Filesize
232KB
MD560fabd1a2509b59831876d5e2aa71a6b
SHA18b91f3c4f721cb04cc4974fc91056f397ae78faa
SHA2561dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838
SHA5123e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
33KB
MD5e0a3ab130609c80b452ee423d3a55355
SHA1f5408df5f8d2765738db8f5080bb88cab105c038
SHA256af1de4b7c65071f490cfd1425c45c9538fd7888cb7dc509304d8ec11cb046649
SHA5129326653d66a9866d517cdcdeb1abdf3fb8fdb2a8bc8c2324c916c10aabc7d5ca417c54c7409f0df6454041ad4c446b06b56510e7cc1eaa2b3cf54ec47cb79ae4
-
Filesize
55B
MD50f98a5550abe0fb880568b1480c96a1c
SHA1d2ce9f7057b201d31f79f3aee2225d89f36be07d
SHA2562dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1
SHA512dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6
-
Filesize
40KB
MD553f25f98742c5114eec23c6487af624c
SHA1671af46401450d6ed9c0904402391640a1bddcc2
SHA2567b5dec6a48ee2114c3056f4ccb6935f3e7418ef0b0bc4a58931f2c80fc94d705
SHA512f460775308b34552c930c3f256cef1069b28421673d71e3fa2712b0467485861a98285925ae49f1adea1faf59265b964c873c12a3bb5de216122ac20084e1048
-
Filesize
240KB
MD557aecbcdcb3a5ad31ac07c5a62b56085
SHA1a443c574f039828d237030bc18895027ca780337
SHA256ab020413dce53c9d57cf22d75eaf1339d72252d5316617a935149e02fee42fd3
SHA5127921f184411f898a78c7094176fa47368b1c6ba7d6a3f58df4332e6865325287f25622f1d13765fd08d499d34974461b2ee81319adc24ce3901cc72d132b3027
-
Filesize
48KB
MD5ab3e43a60f47a98962d50f2da0507df7
SHA14177228a54c15ac42855e87854d4cd9a1722fe39
SHA2564f5f0d9a2b6ef077402a17136ff066dda4c8175ceb6086877aaa3570cabb638f
SHA5129e3365c7860c4766091183d633462f1cc8c30d28871ae2cd8a9a086ce61c0bccf457f919db6826b708f0cf4f88e90f71185420edc4756b7d70137e2096f8797f
-
Filesize
33KB
MD535ed5930115d7981f37da0aa9bb53f0b
SHA1b428ee4503b027ae0e539599982047b06dc9c8f3
SHA256a48eb345600cc1cafdb6870f712099cc14cb2467fec5087d8ca57dfbe0cd8057
SHA512992fbb5b63bc2db059d6c9d4d6b73229b61fb05e4c1a7580c1524ae52cbd7125211c3ca4dcfa25a1f8985c7ae89cb5bfbd532b75822f391245095cdf47fed459