Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 07:43
Static task
static1
Behavioral task
behavioral1
Sample
АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe
Resource
win10v2004-20240802-en
General
-
Target
АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe
-
Size
745KB
-
MD5
5e82f4a00b31da2ecd210a7c7575e29d
-
SHA1
518e5f78b256ee794ebbc8f96275993a9252be23
-
SHA256
80446e16d616fee4a8ffeef94f2dc1f5737435d07a111de9622f13a98a5f196e
-
SHA512
5f794743493acff89407966cdc2b3df386389d90f2468ec5a32c4df2a2ba6dfddea60886ab14a6e9a1b4ddc173989278e2c7397d430aea8c01297b40d782a900
-
SSDEEP
12288:sBpoIY///1UFxJF80IsoBVnsNxd2LFErkUzw2jtQsnmeTRf7qrc5PPjr21tM/7nf:ZIY/4FcHG/MnUzVhmMRfG4lLr2M/T
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
thomas-drops.gl.at.ply.gg:45773
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" audiodg.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2896 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 588 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1308 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 596 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1564 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 996 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 716 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 328 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2500 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1540 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1408 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2092 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2488 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1892 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 548 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 772 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 496 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2380 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1588 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 1864 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 1864 schtasks.exe 36 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reviewdriver.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reviewdriver.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reviewdriver.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe -
resource yara_rule behavioral1/files/0x0005000000011c2f-6.dat dcrat behavioral1/files/0x000700000001871a-25.dat dcrat behavioral1/memory/2032-29-0x00000000001E0000-0x00000000002D4000-memory.dmp dcrat behavioral1/memory/2604-73-0x00000000001C0000-0x00000000002B4000-memory.dmp dcrat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe Server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe Server.exe -
Executes dropped EXE 4 IoCs
pid Process 2704 gggg.exe 2824 Server.exe 2032 reviewdriver.exe 2604 audiodg.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 cmd.exe 2236 cmd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA reviewdriver.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reviewdriver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe reviewdriver.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\42af1c969fbb7b reviewdriver.exe File created C:\Program Files (x86)\Google\CrashReports\101b941d020240 reviewdriver.exe File created C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe reviewdriver.exe File created C:\Program Files (x86)\Common Files\DESIGNER\6ccacd8608530f reviewdriver.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\audiodg.exe reviewdriver.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\csrss.exe reviewdriver.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\886983d96e3d3e reviewdriver.exe File created C:\Program Files (x86)\Google\CrashReports\lsm.exe reviewdriver.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\RemotePackages\smss.exe reviewdriver.exe File created C:\Windows\RemotePackages\69ddcba757bf72 reviewdriver.exe File created C:\Windows\SoftwareDistribution\ScanFile\winlogon.exe reviewdriver.exe File created C:\Windows\SoftwareDistribution\ScanFile\cc11b995f2a76d reviewdriver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gggg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2888 schtasks.exe 2424 schtasks.exe 1892 schtasks.exe 2844 schtasks.exe 3016 schtasks.exe 2928 schtasks.exe 2532 schtasks.exe 1408 schtasks.exe 2148 schtasks.exe 548 schtasks.exe 2380 schtasks.exe 872 schtasks.exe 996 schtasks.exe 1636 schtasks.exe 2092 schtasks.exe 2896 schtasks.exe 596 schtasks.exe 1564 schtasks.exe 624 schtasks.exe 1612 schtasks.exe 2500 schtasks.exe 1148 schtasks.exe 1020 schtasks.exe 1540 schtasks.exe 2348 schtasks.exe 2488 schtasks.exe 1696 schtasks.exe 328 schtasks.exe 1216 schtasks.exe 2096 schtasks.exe 588 schtasks.exe 2432 schtasks.exe 1308 schtasks.exe 2028 schtasks.exe 1972 schtasks.exe 716 schtasks.exe 1496 schtasks.exe 772 schtasks.exe 3020 schtasks.exe 2440 schtasks.exe 2336 schtasks.exe 3000 schtasks.exe 2452 schtasks.exe 1872 schtasks.exe 496 schtasks.exe 1588 schtasks.exe 2760 schtasks.exe 2960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2032 reviewdriver.exe 2032 reviewdriver.exe 2032 reviewdriver.exe 2604 audiodg.exe 2604 audiodg.exe 2604 audiodg.exe 2604 audiodg.exe 2604 audiodg.exe 2604 audiodg.exe 2604 audiodg.exe 2604 audiodg.exe 2604 audiodg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 Server.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2032 reviewdriver.exe Token: SeDebugPrivilege 2604 audiodg.exe Token: SeDebugPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe Token: 33 2824 Server.exe Token: SeIncBasePriorityPrivilege 2824 Server.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2704 1628 АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe 30 PID 1628 wrote to memory of 2704 1628 АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe 30 PID 1628 wrote to memory of 2704 1628 АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe 30 PID 1628 wrote to memory of 2704 1628 АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe 30 PID 1628 wrote to memory of 2824 1628 АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe 31 PID 1628 wrote to memory of 2824 1628 АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe 31 PID 1628 wrote to memory of 2824 1628 АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe 31 PID 1628 wrote to memory of 2824 1628 АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe 31 PID 2704 wrote to memory of 2556 2704 gggg.exe 32 PID 2704 wrote to memory of 2556 2704 gggg.exe 32 PID 2704 wrote to memory of 2556 2704 gggg.exe 32 PID 2704 wrote to memory of 2556 2704 gggg.exe 32 PID 2556 wrote to memory of 2236 2556 WScript.exe 33 PID 2556 wrote to memory of 2236 2556 WScript.exe 33 PID 2556 wrote to memory of 2236 2556 WScript.exe 33 PID 2556 wrote to memory of 2236 2556 WScript.exe 33 PID 2236 wrote to memory of 2032 2236 cmd.exe 35 PID 2236 wrote to memory of 2032 2236 cmd.exe 35 PID 2236 wrote to memory of 2032 2236 cmd.exe 35 PID 2236 wrote to memory of 2032 2236 cmd.exe 35 PID 2032 wrote to memory of 2808 2032 reviewdriver.exe 85 PID 2032 wrote to memory of 2808 2032 reviewdriver.exe 85 PID 2032 wrote to memory of 2808 2032 reviewdriver.exe 85 PID 2808 wrote to memory of 2592 2808 cmd.exe 87 PID 2808 wrote to memory of 2592 2808 cmd.exe 87 PID 2808 wrote to memory of 2592 2808 cmd.exe 87 PID 2808 wrote to memory of 2604 2808 cmd.exe 88 PID 2808 wrote to memory of 2604 2808 cmd.exe 88 PID 2808 wrote to memory of 2604 2808 cmd.exe 88 PID 2604 wrote to memory of 1456 2604 audiodg.exe 89 PID 2604 wrote to memory of 1456 2604 audiodg.exe 89 PID 2604 wrote to memory of 1456 2604 audiodg.exe 89 PID 2604 wrote to memory of 2052 2604 audiodg.exe 90 PID 2604 wrote to memory of 2052 2604 audiodg.exe 90 PID 2604 wrote to memory of 2052 2604 audiodg.exe 90 PID 2604 wrote to memory of 2812 2604 audiodg.exe 127 PID 2604 wrote to memory of 2812 2604 audiodg.exe 127 PID 2604 wrote to memory of 2812 2604 audiodg.exe 127 PID 2812 wrote to memory of 2056 2812 cmd.exe 129 PID 2812 wrote to memory of 2056 2812 cmd.exe 129 PID 2812 wrote to memory of 2056 2812 cmd.exe 129 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reviewdriver.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reviewdriver.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reviewdriver.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe"C:\Users\Admin\AppData\Local\Temp\АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\gggg.exe"C:\Users\Admin\AppData\Local\Temp\gggg.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ChainComponentBrowserwin\zJJP8u9NRTk6u.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ChainComponentBrowserwin\ZckenFSJPCIUJWjfI5CZYMEmaPZVg.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\ChainComponentBrowserwin\reviewdriver.exe"C:\ChainComponentBrowserwin\reviewdriver.exe"5⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2032 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lCNhli7JYn.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2592
-
-
C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\audiodg.exe"C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\audiodg.exe"7⤵
- Modifies WinLogon for persistence
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2604 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dbccd094-23e6-41a9-bb52-cf2441435fec.vbs"8⤵PID:1456
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ed8c3ac0-e6fa-4563-a4e6-a4c3996c718a.vbs"8⤵PID:2052
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8t4fMT0wY0.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2056
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\it-IT\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\it-IT\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Sidebar\it-IT\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Windows\RemotePackages\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\RemotePackages\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Windows\RemotePackages\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Windows\SoftwareDistribution\ScanFile\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\ScanFile\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Windows\SoftwareDistribution\ScanFile\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Pictures\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Pictures\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Cookies\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Admin\Cookies\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Cookies\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\ChainComponentBrowserwin\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\ChainComponentBrowserwin\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\ChainComponentBrowserwin\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Videos\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Admin\Videos\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Videos\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\CrashReports\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\CrashReports\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Recorded TV\Sample Media\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\Recorded TV\Sample Media\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Recorded TV\Sample Media\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "reviewdriver" /f1⤵
- Process spawned unexpected child process
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "reviewdriverr" /f1⤵
- Process spawned unexpected child process
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "Idle" /f1⤵
- Process spawned unexpected child process
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "IdleI" /f1⤵
- Process spawned unexpected child process
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "audiodg" /f1⤵
- Process spawned unexpected child process
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "audiodga" /f1⤵
- Process spawned unexpected child process
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "sppsvc" /f1⤵
- Process spawned unexpected child process
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "sppsvcs" /f1⤵
- Process spawned unexpected child process
PID:924
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "smss" /f1⤵
- Process spawned unexpected child process
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "smsss" /f1⤵
- Process spawned unexpected child process
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "audiodg" /f1⤵
- Process spawned unexpected child process
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "audiodga" /f1⤵
- Process spawned unexpected child process
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "winlogon" /f1⤵
- Process spawned unexpected child process
PID:2292
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "winlogonw" /f1⤵
- Process spawned unexpected child process
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "wininit" /f1⤵
- Process spawned unexpected child process
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "wininitw" /f1⤵
- Process spawned unexpected child process
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "sppsvc" /f1⤵PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "sppsvcs" /f1⤵PID:2200
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "csrss" /f1⤵PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "csrssc" /f1⤵PID:328
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "audiodg" /f1⤵PID:1808
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "audiodga" /f1⤵PID:1596
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "lsm" /f1⤵PID:2012
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "lsml" /f1⤵PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "sppsvc" /f1⤵PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "sppsvcs" /f1⤵PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "wininit" /f1⤵PID:1716
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "wininitw" /f1⤵PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "lsm" /f1⤵PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "lsml" /f1⤵PID:2096
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "csrss" /f1⤵PID:496
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "csrssc" /f1⤵PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "services" /f1⤵PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "servicess" /f1⤵PID:2420
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "audiodg" /f1⤵PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "audiodga" /f1⤵PID:2708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377B
MD5b239886e1b416c9aa6840551ea7734f3
SHA1d2b66ce0cd47dbbddd0ba736fc460884ac19fad5
SHA25614c5c2867d3e52ccdfc32fc648ef814d439f7dccb82c67bf597b7fb029079d9b
SHA5120412d404f259b07d82d3009cbf1845cc8b5caf26deca636375d365f2fa9a65e55985dfc3d9516a6e2437105148df3578b65166a9d167b858f4e6c1d815fc0996
-
Filesize
46B
MD53e83fda43f1932bb71d930d2f89e68b2
SHA11fa2f89990c21a7f0eebfbf06f7064c19e46b081
SHA256ecb36758516d13f656baac1a37f3af9dd3e683e8aab3847d65bb82c9eb05cb51
SHA512d6efea92b244d10f5a0e2b228782cc7e1b45fcf262dcc7ea709a9ab8fa458b2e8d3e3bfa4cdf4a4852812d01bb9ff1c7bba65abbe62527e5a84e5b3b15f8ea9b
-
Filesize
230B
MD5b9b72befe720ec640eb23938f752a453
SHA1c621298c3cfac9aa9c5cdfebd5efa0a1b01c7b34
SHA256bddc35ffa29cfc10fc39778a551335781091aec61771943662e66cdf4c4a07ad
SHA5124d119e2aba40fe14d624690103d08620369eeeb0a922a3091027a7cf90597db7d491653ed356eb85a45104bdcbd3eb5876e5c4c508ed85d0e235d71a65578f26
-
Filesize
857B
MD54a16ba75fbbfdbcd655b4e4c7b48b782
SHA10647bc8ba1fbb040c98dac0c98ab843275e85e49
SHA256f5297ad4dafce36fd875f2ce0835e6b84f54ea85bc4234b25eae687264c9bc43
SHA512a3e4f1275b3fe27f1a10f88af433ea63e758827d0f8c60a0f7d93fbc6a4070909c9cb9bd136ae78c69bda9208e4754722f1b7a6a433e87268db2f2a3a43b4a2a
-
Filesize
56B
MD5234ea173d52157a4118dab2bb7d07140
SHA1a1e48dd3ed8c19e69d2a215304465166b709be62
SHA256b61e098b09a27349a63c55db3545932057448936fc22c0d707c5790051fec810
SHA512b94d511cd2c12c0799e174cf7ec822d12b19781176d499bdec98de66096d72e81f11609e74eb25e65c66cdadc7e53ff0bb60616392d96c4deae0e73da4b8e3e8
-
Filesize
514B
MD50567c739fac8c293c6d1aacef66b3970
SHA1c10631eb348fa8048e31a67e0df44149496fcfa0
SHA256b5b01ee1ad51ccb2a0c2abdc395fa5905b6ebfa4e9a91ebcfe849b7d39c6a293
SHA512de6940633b322ed1e8488a983a06372d9fb220b5cd862903f31b96b0206d24a9cc7ac5bb1383109395c1d9740bb65e1f7ea63e284d3f6cbe19787257c5799e68
-
Filesize
271B
MD5682e13cc1a902c7a95280e65beaad898
SHA155a191f43b39ce22b559eae92e2c4c6f961ab0f5
SHA256bf39fe6973c3e88cc6916fa0fd5d9555d24e42d7cc7d8841d2db63bd994af3f8
SHA512b2f4920812705bca19c530fea679980af31305538125fcd9de6f02e4e18a718bfd398a65e3b7a86b3c73dbf85f29eae01619f4d4313bea9e70f6cf0969d298b5
-
Filesize
278B
MD5f5bb83a73ef655cd1bd03648204d5b14
SHA19aa42ac1884bdf23626fbb9fd0ff6e6e6d2afe7b
SHA2562a769c8c26a8d3acaa49560f59234738a7e606e6ce52f84f44d7c1059e260a42
SHA5125d1771cfe5fca2493a12f3093a27595dac6e747d6957517c3b508348993628b13aedc44461075bb7f14ae6e4d7bef0f56611591eedf5adcf494bbce9b990a2fa
-
Filesize
81B
MD53dba00fdf586f91bd9cf339fbc2398f6
SHA19c073c60f3761e4841161c7b7b7ed7ebdea69a87
SHA256395e8e233465f0cc7fd96632a051554f2c2cdba23daf0b4b9af3fc1349ad5a27
SHA512b37164a7a1b58a847ac3fce9af25389e75711753236db8387bf3d7b4648b7669315287c5c3ec4ef95abe19a257c1fa5c098ead6438b315a0136b88b1d19374c6
-
Filesize
419B
MD5ee05d6f6113adedc262796bab5e131f2
SHA1c1e42d0a62f7bd7f9a1ff9ae4d7ae97f0badd490
SHA256857e3f7866687d91cad5b8afaaa8ef3c8dc9a7c6b7e31609e37890ca20a92e4c
SHA5121d3051eb195794ef0ddb4c7f50a9218967c21c456771343e245f17fd0eb23d83c221d044c5d6895b1225a86d29766f216b983375032d90d28ef248332065b0b2
-
Filesize
327B
MD5bb98237163c59269dd72b32a7c800a36
SHA16f7ee649c34c9aedaf64b21e5bce5a00b916b201
SHA25695c8a3c8292486b3f050d80cfda28982bb839a16583b4ba84a97386730ff4414
SHA512d8f27d9e8cf3bc1df5b86e62894838ad222821df0dfc3c7556dcf63977806665030edfdeed5a0aff76e59254ba1e7ceb5b086b9d2a2e1d5f80e45b30a4ce6e09
-
Filesize
309B
MD56f0a60929e4e683bbeea8a06263c66ea
SHA1a1bfdd95c1d7eb3a0fde59d0963a11c164d26e73
SHA256bd2f2f6150a0bd5664c3d69cb0bfec1598427e3fe15feb462c3fa3e1428292be
SHA512f7b715e4ea9ec27021e48eb734d69468f13de6e9d07d4174185fc694724cae68253d5b5ecf707dc129cd47c9d0ea60ccc272bff1451d4c973b100a22a024763a
-
Filesize
43KB
MD5eab8788760465b2b46598ff289b4b8c4
SHA18c7b27c7ec66ea41f7e20afaf1394fb71b7c4a35
SHA2567ba3084c6d0fcc0e6e1fedfdd04d24768b819aaf309b933d0f4243c37297821f
SHA512996471d395c297950a4df7140cf0dda388f87ad8a26fb99feb35fa265873b77a7e100520df69770fbe1554ad4bf7f877f9214a61b44326353935dfe7def12ed0
-
Filesize
736B
MD576c2d217f27bef1fcf904bbad3129aba
SHA1b8bc92fd68c7b7e2bb6a7fada857122256d9b3a3
SHA256eaae4a7c10900dae2ea885d8d3828d0f071ffdd3538c641dd57fd5c6d6f602a5
SHA5122b0682dc6afbb975e6917b1ef4ebdcdc288a94dcc22e07a65e10cb787468a6ccbc2dfe42dfccd02378cd4c812e9758b2fcd9f6a85719c3f224fbcf14955cb792
-
Filesize
512B
MD57f2f72768ab1d61206d6df9f9d7b9233
SHA1a38478cbaaff12c4f5fde94e56bad090cb46c19a
SHA256eabf717a94977aa7774bb93f7907672463acd67ce7a2aacf2735899b46d8f7e5
SHA512502f81f7ee86b25a81463506b91d8d5ea87ed2979d9c5f0c07f2dbaf2c1ed9eaa9ad95da8617a5e616c8e518b2e5f4d7476579660c4f81e9b29ece9c0153bdc2
-
Filesize
1.2MB
MD5c5607848210b7d664771584276d7d7ae
SHA19a395fbac63306fa240e51646cad80a803064352
SHA25616de1516d3fc00a0873b270ffa44f20c13524827a88798e2743afe0bb06b9815
SHA512ef9c622ee75161fc038456a2a7e7b9e881f66852dd06331fa2fecac13ce4d585b332672d51a6c8ab3dfd5a99de22b863dd52b53750669d0175aea45ed08a6e8b
-
Filesize
225B
MD55bd4bca68c095ecf32b78573f0b36a82
SHA16a0dfe12317b2d3f675b5017ec10e7a27aaa60fb
SHA256e8a867aa02a78537df7640e440ea4806583d2054ca08e8a7068be678487ddf30
SHA5127f02149323e2c46f7f38e65483192651a10bac2606e9d2fa8028bb9a135c1b110069098e81f2d1bf205dbb798ec8739af6ac08b482aa697df2871ec480412a54
-
Filesize
828B
MD5551686e4b601f77d0e8c5730946e187e
SHA1616118ea7ac3f7b580ec54d84a8261cf41cb5650
SHA256b417e27c4b5d96ba072b2b47d3e7c874e156cbeb95f8e1dc99c8d2674e716848
SHA5129efe35ab472c9f1af0e726dc0d3bd97c90de1e36638691f95620c20ca482be0dc67db3a551b3c13d992c3fd0a05e42e4a2a7ad1df8ab0bb2a3a435d7a4d8e5f0
-
Filesize
734B
MD5a7528e3c7727e423d9795e3f4db840ac
SHA1e86723a305dde5f7da664de4daaa7aee66e3d9be
SHA256438f6f1758259bfe4cdd6b98e46b3d952fd581262f18cbccc3da615b26220958
SHA51208c20c917cba0ea93de8512f2fb9e401a61a63cdafbd84489444af4265e93f44c631c9de79e36976769a05b04c00c32a58c619b3af04f5ff4eb15a35d5810a9b
-
Filesize
441B
MD5461df6ca81ce36f1c6ef0bad1cd220f5
SHA168e2b6af133bf6161217244d389c18a4976880c5
SHA2563b7275f71c6f4171cbaf7ed054b6edb81364b7e8e2618af26b29af065969f0a2
SHA512960f03b97d7dcbef9fed005848d6b31e7aca887543093b19fbd216acd20349f0f70303e6b20444fd9f2bdbaca33fe680f1b7cd78b009f9efc38b63032ede10d8
-
Filesize
575B
MD599b15f5d1fcae4e9699021aafe7094b6
SHA1490279e9a00b18ff60566c46071008c3ff1d3cfd
SHA256083bdaa1463be117fec527b5184f6fe0749d9de5bb98e86755b239f443184101
SHA512edd71ea4b39016160e079981d3407fac2a695ebbe1b53a103a96f9f8065a789e311c968423128525ff8fb39e04c3464e3719d8f5a1bd71a15872cbd8a31bb09e
-
Filesize
912B
MD5b03e6f16581245409fd8dc67a5eb2279
SHA19ec99992cbc5b12ed4daf9c6bc8db7ac30b105e2
SHA256c28caf06f01a57ddda1c660a09dd817edb9a887dee7bb5aabbb2a2e808209232
SHA512895f16c6e9c25f9ea92f6c9889efcf24c6981a29511fd45e27184f341685268deba90e598547b9460d43c5b4f5ff225096d8b147ce60656fde069b99ff13bdec
-
Filesize
850B
MD51847f6c6889a08ddf044a9d67d3229a6
SHA16884565afe7834b338b8f2be334c5ce0c0128c06
SHA2565457e1b193b098cc036c97da05452a106e4c137c218c6a0541b1fd4b9e7f6c0b
SHA512e73f8d75a324e1f5eea1e0359f833b67e9c4b80830bf30c26bae58fed35fca4e51f0883bf561cc5254f564bc63a6df67afb83b08bc59b0f2c1108cb196f2b7c6
-
Filesize
549B
MD506b769798f967a3bb4b02d6fa2052c23
SHA1c0b8e6b303842a614f3ad71fd40e92290113c8e3
SHA2565dc542cc4a000af6adffa2f84c591394ac6be7a91695db1271cacdf809ed2cba
SHA512ada3d2863f567a91506a6c725cfc29586cb46fbaa0c2ebc6821dc266036b4924c7ab4bae879b2605f0681aa2efda0f72c8fa962dec84ff9f9dcd449c9cd938b4
-
Filesize
948KB
MD52e2c059f61338c40914c10d40502e57e
SHA1e6cb5a1ffdf369b3135c72ab12d71cc3d5f2b053
SHA2568e4df816223a625bf911553d5f80219f81fc44f07ba98c95f379fd12169c2918
SHA5121b1f2dae55f50874532b37ad4ab74a54452f65d7499004b37b0afc3dc2c1d16d66a0e41c1733ac1f4cff9993325d32ea714b441c06ba4eba350136835c746d3e