Analysis
-
max time kernel
1199s -
max time network
840s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 19:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://fgfdgfd
Resource
win7-20240903-en
General
-
Target
http://fgfdgfd
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Explorer.EXE -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 21 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED}\Locale = "EN" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}\Locale = "*" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\Version = "12,0,7601,17514" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\Locale = "EN" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}\Username = "a" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{89B4C1CD-B018-4511-B0A1-5476DBF70820} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Version = "43,0,0,0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Version = "11,0,9600,0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Locale = "*" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED}\Version = "1,1,1,9" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4340} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4340}\Version = "6,1,7601,17514" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}\Version = "6,1,7601,17514" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4340}\Locale = "en" Explorer.EXE -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini regsvr32.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini regsvr32.exe -
System Binary Proxy Execution: Rundll32 1 TTPs 1 IoCs
Abuse Rundll32 to proxy execution of malicious code.
pid Process 2844 rundll32.exe -
Drops desktop.ini file(s) 52 IoCs
description ioc Process File opened for modification C:\Users\Public\Documents\desktop.ini regsvr32.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini regsvr32.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Favorites\Links\desktop.ini ie4uinit.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Searches\desktop.ini regsvr32.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Documents\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Videos\desktop.ini regsvr32.exe File created C:\Users\a\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini WinMail.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Desktop\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Saved Games\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Contacts\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Documents\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Music\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Links\desktop.ini regsvr32.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Explorer.EXE File opened for modification C:\Users\a\Documents\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Music\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Searches\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Contacts\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Videos\desktop.ini regsvr32.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Pictures\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Saved Games\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Favorites\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Favorites\desktop.ini regsvr32.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Desktop\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Music\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Pictures\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Favorites\Links for United States\desktop.ini mctadmin.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Music\desktop.ini regsvr32.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini ie4uinit.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini ie4uinit.exe File opened for modification C:\Users\a\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Explorer.EXE File opened for modification C:\Users\a\Videos\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Pictures\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Links\desktop.ini regsvr32.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-312935884-697965778-3955649944-1001\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Pictures\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\desktop.ini regsvr32.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Videos\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Contacts\desktop.ini WinMail.exe File opened for modification C:\Users\a\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini regsvr32.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-312935884-697965778-3955649944-1001\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Downloads\desktop.ini regsvr32.exe File opened for modification C:\Users\a\Downloads\desktop.ini regsvr32.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\3kmwe8.exe taskmgr.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Control Panel\Desktop\Wallpaper = "C:\\Users\\a\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Control Panel\Desktop\Wallpaper = "C:\\Users\\a\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\Signup\TMP4352$.TMP ie4uinit.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe Explorer.EXE File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe explorer.exe File opened for modification C:\Windows\INF\setupapi.app.log ie4uinit.exe File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe File opened for modification C:\Windows\INF\setupapi.app.log chrmstp.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe Explorer.EXE -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinMail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runonce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Explorer.EXE Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Explorer.EXE -
Enumerates system info in registry 2 TTPs 35 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Component Information csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Component Information csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Configuration Data csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Configuration Data csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Configuration Data csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Component Information csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Identifier csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Identifier csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Identifier csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\1\KeyboardController csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Configuration Data csrss.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" ie4uinit.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\5 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\SOFTWARE\Microsoft\Internet Explorer\Security ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\SOFTWARE\Microsoft\Internet Explorer\Settings ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\16\IEFixedFontName = "Vani" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\17 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" ie4uinit.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Document Windows\width = 00000080 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Desktop\General regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\IntelliForms ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\13 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Main\Use_DlgBox_Colors = "yes" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\37 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\TypedURLs\url1 = "http://go.microsoft.com/fwlink/p/?LinkId=255141" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Main\WindowsSearch mctadmin.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\SOFTWARE\Microsoft\Internet Explorer\New Windows ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\37\IEFixedFontName = "Khmer UI" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\24 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\36\IEPropFontName = "Myanmar Text" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Settings\Use Anchor Hover Color = "No" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\TypedURLs taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\BrowserEmulation ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Settings\Text Color = "0,0,0" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\IETld\LowMic ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\LowRegistry ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\24\IEPropFontName = "MS PGothic" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\12\IEPropFontName = "Raavi" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\14 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\33 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\17\IEPropFontName = "Tunga" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\26\IEFixedFontName = "NSimsun" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\32\IEPropFontName = "Segoe UI Symbol" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\14\IEFixedFontName = "Kalinga" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\27\IEPropFontName = "Nyala" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\10\IEFixedFontName = "Mangal" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\20 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\30\IEPropFontName = "Microsoft Yi Baiti" ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\15\IEFixedFontName = "Vijaya" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\22\IEFixedFontName = "Sylfaen" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\34\IEPropFontName = "Iskoola Pota" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\34\IEFixedFontName = "Iskoola Pota" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\37\IEPropFontName = "Khmer UI" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\SOFTWARE\Microsoft\Internet Explorer\Document Windows ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\31 ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\SQM\InstallDate = "1726688948" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Desktop\General\WallpaperSource = "C:\\Windows\\web\\wallpaper\\Windows\\img0.jpg" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\GPU ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\16 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\23\IEPropFontName = "Gulim" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\22\IEPropFontName = "Sylfaen" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\19\IEPropFontName = "Angsana New" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Main\Show_FullURL = "no" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Settings\Background Color = "192,192,192" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\28\IEPropFontName = "Euphemia" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\SQM ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Document Windows ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\SOFTWARE\Microsoft\Internet Explorer\Main ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\9 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\International\Scripts\10 ie4uinit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001\Software\Microsoft\Internet Explorer\Main\Start Page = "http://go.microsoft.com/fwlink/p/?LinkId=255141" ie4uinit.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastUserLangID = "1033" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastLoadedDPI = "96" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\DllName = "%SystemRoot%\\resources\\themes\\Aero\\Aero.msstyles" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ColorName = "NormalColor" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\SizeName = "NormalSize" winlogon.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ThemeManager winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LoadedBefore = "1" winlogon.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\MuiCached\MachinePreferredUILanguages = 65006e002d00550053000000 winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ThemeActive = "1" winlogon.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/avi unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cda unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.3g2 unregmp2.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = 00000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/mpegurl unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.m4v unregmp2.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{DE4F0660-FA10-4B8F-A494-068B20B22307}\FFlags = "18874385" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wmd\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.WMS\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/mp4 unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.aiff unregmp2.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shellex unregmp2.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio unregmp2.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.asx unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.avi unregmp2.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/msvideo unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.aif unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.au unregmp2.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wpl\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Play\command unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.midi\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Play unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/x-mpeg2a unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MMS\shell\open unregmp2.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/3gpp2 unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/x-wav unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shellex\ContextMenuHandlers\PlayTo unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP.AudioCD\shell\Play unregmp2.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\CurrentVersion\SyncMgr\StartAtLogin = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{DE4F0660-FA10-4B8F-A494-068B20B22307}\Mode = "1" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\image\ShellEx\ContextMenuHandlers unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NetworkExplorerPlugins\urn:schemas-upnp-org:device:MediaRenderer:1\ShellEx unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP.DVD\Shell\Play\Command unregmp2.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{DE4F0660-FA10-4B8F-A494-068B20B22307}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 19002f433a5c000000000000000000000000000000000000000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NetworkExplorerPlugins\urn:schemas-upnp-org:device:MediaRenderer:1\ShellEx\ContextMenuHandlers\{17FC1A80-140E-4290-A64F-4A29A951A867} unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/x-aiff unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shellex\ContextMenuHandlers unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\wmplayer.exe\SupportedTypes unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wax unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.M2T\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/mid unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shell\Enqueue\command unregmp2.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Video\shell unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.DVR-MS\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rmi\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wav unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.WMD\OpenWithProgIds unregmp2.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "18874369" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1001_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-mplayer2 unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.3gpp\OpenWithProgIds unregmp2.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 1616 taskmgr.exe 1616 taskmgr.exe 1616 taskmgr.exe 1616 taskmgr.exe 1616 taskmgr.exe 1616 taskmgr.exe 1616 taskmgr.exe 1616 taskmgr.exe 1616 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe 284 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 2496 taskmgr.exe 2752 Explorer.EXE 284 taskmgr.exe 1924 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeDebugPrivilege 2496 taskmgr.exe Token: SeShutdownPrivilege 1700 LogonUI.exe Token: SeSecurityPrivilege 1036 winlogon.exe Token: SeBackupPrivilege 1036 winlogon.exe Token: SeSecurityPrivilege 1036 winlogon.exe Token: SeTcbPrivilege 1036 winlogon.exe Token: SeManageVolumePrivilege 1668 WinMail.exe Token: SeRestorePrivilege 2324 ie4uinit.exe Token: SeRestorePrivilege 2324 ie4uinit.exe Token: SeRestorePrivilege 2324 ie4uinit.exe Token: SeRestorePrivilege 2324 ie4uinit.exe Token: SeRestorePrivilege 2324 ie4uinit.exe Token: SeRestorePrivilege 2324 ie4uinit.exe Token: SeRestorePrivilege 2324 ie4uinit.exe Token: SeRestorePrivilege 2844 rundll32.exe Token: SeRestorePrivilege 2844 rundll32.exe Token: SeRestorePrivilege 2844 rundll32.exe Token: SeRestorePrivilege 2844 rundll32.exe Token: SeRestorePrivilege 2844 rundll32.exe Token: SeRestorePrivilege 2844 rundll32.exe Token: SeRestorePrivilege 2844 rundll32.exe Token: SeManageVolumePrivilege 2716 WinMail.exe Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeDebugPrivilege 1616 taskmgr.exe Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeDebugPrivilege 284 taskmgr.exe Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeSecurityPrivilege 284 taskmgr.exe Token: SeTakeOwnershipPrivilege 284 taskmgr.exe Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE Token: SeShutdownPrivilege 2752 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe 2496 taskmgr.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1668 WinMail.exe 2716 WinMail.exe 2752 Explorer.EXE 2752 Explorer.EXE 1924 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2080 1852 chrome.exe 31 PID 1852 wrote to memory of 2080 1852 chrome.exe 31 PID 1852 wrote to memory of 2080 1852 chrome.exe 31 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2852 1852 chrome.exe 33 PID 1852 wrote to memory of 2868 1852 chrome.exe 34 PID 1852 wrote to memory of 2868 1852 chrome.exe 34 PID 1852 wrote to memory of 2868 1852 chrome.exe 34 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 PID 1852 wrote to memory of 2568 1852 chrome.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://fgfdgfd1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7069758,0x7fef7069768,0x7fef70697782⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 --field-trial-handle=1284,i,13169729180383721065,9040562782080402905,131072 /prefetch:22⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1484 --field-trial-handle=1284,i,13169729180383721065,9040562782080402905,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1284,i,13169729180383721065,9040562782080402905,131072 /prefetch:82⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1284,i,13169729180383721065,9040562782080402905,131072 /prefetch:12⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1284,i,13169729180383721065,9040562782080402905,131072 /prefetch:12⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1532 --field-trial-handle=1284,i,13169729180383721065,9040562782080402905,131072 /prefetch:22⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2248 --field-trial-handle=1284,i,13169729180383721065,9040562782080402905,131072 /prefetch:12⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2416 --field-trial-handle=1284,i,13169729180383721065,9040562782080402905,131072 /prefetch:12⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1644
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2496
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:1556
-
C:\Windows\system32\sethc.exesethc.exe 2111⤵PID:1504
-
C:\Windows\system32\net.exenet user a /add2⤵PID:1536
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user a /add3⤵PID:2776
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2800
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2696 -
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-385976997545739520-2142275929-280182598-171644224810765424811711611128173173523"2⤵PID:820
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1036 -
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\system32\userinit.exeC:\Windows\system32\userinit.exe2⤵PID:688
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE3⤵
- Modifies visibility of file extensions in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:/UserInstall C:\Windows\system32\themeui.dll4⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies Internet Explorer settings
PID:2988
-
-
C:\Program Files (x86)\Windows Mail\WinMail.exe"C:\Program Files (x86)\Windows Mail\WinMail.exe" OCInstallUserConfigOE4⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE5⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
-
C:\Windows\System32\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /FirstLogon /Shortcuts /RegBrowsers /ResetMUI4⤵
- Enumerates connected drives
- Modifies registry class
PID:2880
-
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:U shell32.dll4⤵
- Drops startup file
- Drops desktop.ini file(s)
PID:820
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" C:\Windows\SysWOW64\mscories.dll,Install4⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\System32\ie4uinit.exe"C:\Windows\System32\ie4uinit.exe" -UserConfig4⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of AdjustPrivilegeToken
PID:2324 -
C:\Windows\System32\ie4uinit.exeC:\Windows\System32\ie4uinit.exe -ClearIconCache5⤵PID:1116
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32 advpack.dll,LaunchINFSectionEx C:\Windows\system32\ieuinit.inf,Install,,365⤵
- System Binary Proxy Execution: Rundll32
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32 C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m5⤵PID:2608
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /06⤵PID:1776
-
-
-
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:/UserInstall C:\Windows\system32\themeui.dll4⤵
- Sets desktop wallpaper using registry
- Modifies Internet Explorer settings
PID:1452
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" OCInstallUserConfigOE4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
C:\Windows\System32\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /FirstLogon /Shortcuts /RegBrowsers /ResetMUI4⤵
- Enumerates connected drives
- Modifies registry class
PID:2204
-
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:U shell32.dll4⤵
- Drops startup file
- Drops desktop.ini file(s)
PID:2388
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\mscories.dll,Install4⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level4⤵PID:1888
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\a\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x15c,0x160,0x164,0x130,0x168,0x13f5e7688,0x13f5e7698,0x13f5e76a85⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=05⤵
- Drops file in Windows directory
PID:2792 -
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\a\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x15c,0x160,0x164,0x130,0x168,0x13f5e7688,0x13f5e7698,0x13f5e76a86⤵PID:2824
-
-
-
-
C:\Windows\System32\3kmwe8.exe"C:\Windows\System32\3kmwe8.exe"4⤵PID:1752
-
-
C:\Program Files\Windows Sidebar\sidebar.exe"C:\Program Files\Windows Sidebar\sidebar.exe" /autoRun4⤵PID:2836
-
-
C:\Windows\SysWOW64\runonce.exeC:\Windows\SysWOW64\runonce.exe /Run64324⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2172 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" /DelayServices5⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
C:\Windows\System32\mctadmin.exe"C:\Windows\System32\mctadmin.exe"4⤵
- Drops desktop.ini file(s)
- Modifies Internet Explorer settings
PID:1428
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /44⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /15⤵
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:284 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"6⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Windows\system32\UserAccountControlSettings.exe"C:\Windows\system32\UserAccountControlSettings.exe"7⤵PID:2204
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"7⤵PID:1108
-
-
-
-
-
-
-
C:\Windows\system32\sethc.exesethc.exe 2112⤵PID:756
-
C:\Windows\system32\net.exenet user Guest /add3⤵PID:448
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Guest /add4⤵PID:2948
-
-
-
C:\Windows\system32\net.exenet user Administrator /add3⤵PID:2144
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Administrator /add4⤵PID:1256
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1640
-
C:\Windows\system32\rundll32.exerundll32.exe uxtheme.dll,#64 C:\Windows\resources\Themes\Aero\Aero.msstyles?NormalColor?NormalSize1⤵PID:1568
-
C:\Windows\system32\rundll32.exerundll32.exe uxtheme.dll,#64 C:\Windows\resources\Themes\Aero\Aero.msstyles?NormalColor?NormalSize1⤵PID:1560
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:2292
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:2928
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{86D5EB8A-859F-4C7B-A76B-2BD819B7A850}1⤵PID:2352
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:1568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{86D5EB8A-859F-4C7B-A76B-2BD819B7A850}1⤵PID:2472
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{EA2C6B24-C590-457B-BAC8-4A0F9B13B5B8}1⤵PID:2604
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{86D5EB8A-859F-4C7B-A76B-2BD819B7A850}1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Accessibility Features
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Accessibility Features
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
6System Binary Proxy Execution
1Rundll32
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
168KB
MD5db7270b21585b5271b89b161625000e9
SHA1aad16bb92c5cc9a2304b8def8ed1e8d212a1658b
SHA256e694af1ecaa8c63cf2a83b3beacb0537dbe9ba9ba75c92f60f48ab6d7beb7a9b
SHA5128152da679176038bf7401a8ff88d7c65e016e642e9bb2140d218fa7af4202ba1f4a7101312438c621ac21435f9328e23d33bcab2f9e1fc67adaeb6a33d07a116
-
Filesize
40B
MD520b4e4f238153fed7c68cfdea7adc9cd
SHA1a99e091ecaf82c225322fea414517e68225be82b
SHA25655f6df836b807179500401f364b1eb0c9dd9b4290732b4067c9c7f5cc4cd9c40
SHA5123f48cb84731c0cc5a0c7ac757282bd5200efd18c4f288d85a8a5623a1c08495403abb32e7e8435fb045c33a7e73c92bfcbf936201b815eeb9f1561cc2fee42d4
-
C:\Users\a\AppData\Local\Microsoft\Feeds\Feeds for United States~\USA~dgov Updates~c News and Features~.feed-ms
Filesize28KB
MD524d61789e6343cb908532870ec6c68a6
SHA17bb401009c94fc9b63639043f54a0ba7d2bc6b1f
SHA256825f1527b296804dc4ff2c058edf238d4c7e33fa86ecb9c25f2f64ec1671ef77
SHA512d85e336ab6230c7edeb5431ec122ce15af4fb4d49db3408d8061665a1dd6735b98bee5c4f5f617753b7aa02e6656211f05b6a66300812a1223e54b859a0ee765
-
Filesize
1.0MB
MD5a7d2e5b39993eadec5e5eba322cd86ac
SHA1d8430368b3d58c307c611a9ffa87712e6d88f7a2
SHA25631ca7da8b7df889c413a2614232b9f2359f3bd98d4aee176640898bcd2415573
SHA512d3c22bb07a6aa36ef3abd6e2f3359299ceff648314627265f444deff3381e92bf9657bcc61be20a50d1e3355460227b2e7281a210f034870a3afc6dc7481dc48
-
Filesize
68KB
MD5985c5020ebde9a23df5345a56a0a7ebf
SHA13a447ae6cbb2972fee842f086ef608585b250d04
SHA256c96966c4f69cd0d1042f76ebe7d40ecf0010a8e1e81f74997fa0c060c44b7a9c
SHA51208718d1b7c3b01e5f2ea60dc867d6501a658c653c80400f2b798111a23150b992b27869407b800625f6d25540bb908ee8bfe79b2b92a94e44d41e51ca5e36236
-
Filesize
2.0MB
MD589e1e187d8e151933c9a0ae9ba82b78b
SHA1bc52b254a156c1d9b783b533d8e5aed315421582
SHA256ba3774870a738a1cc5904b1130093297a812f490f97a4e45c2f850b0a857324b
SHA5122ce3b6611f7e32e9b2737b068bb6779ee670303d217eb05b09efd048014f3cfb99de0258d4b30fe539d521064b38b780d2312159857f1a48211bd55f157ef554
-
Filesize
8KB
MD59f9cb33d8c07590ace598f6ad8bd11d3
SHA1c3add1209780b48b7d49f929225212368448bbc5
SHA256664cdf6f0d50a5b7a9615146819d95e7d8b1573f40fb70155ecd968d8b57ae75
SHA512ab1175bdea27a3a7f86bd6fcb623ce0a5e1e4acad4a2bc9fb6837c5d6efe994fbb0f5ebe778017e2c063b041da58b72c08d5ca4eeace704cb75d959209637960
-
Filesize
2.0MB
MD5415ceba892e393ee83d4ae5716a30d9b
SHA1631544d4b4db9c8b215b6492d016f46da76975b4
SHA2565d8f6ce2f444fced5ffd82e5df5fa2af72d60d2c04dd11d90d4acf72725f40a3
SHA51256ed598601b7e42750acd7506e8eaa36560281f2080cda232364f2a98e625ab82cb8260d8fe18a5a0718736a6665841b340ab6a00a54986f2c012c5b86fed115
-
Filesize
2.0MB
MD522cb8e0d386ea16382b046994d4f9657
SHA1d522fa1b060461ec945ef00104ebd12d3eacad7d
SHA2568287ef20e9b982ebb8efbd3d1629dd6fa25bcfb19cd13825b2073b11ef106238
SHA512590a9a2d5bf27e7a0a5a3e187936a07a5a3a9ee947511ef8965fe7e4f9b17851a6e7b291e74895f2696f408da6027a161bbdeec87c65f806af2c66770764addb
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
174B
MD5e0fd7e6b4853592ac9ac73df9d83783f
SHA12834e77dfa1269ddad948b87d88887e84179594a
SHA256feea416e5e5c8aa81416b81fb25132d1c18b010b02663a253338dbdfb066e122
SHA512289de77ffbe328388ad080129b7460712985d42076e78a3a545124881c30f564c5ef8fb4024d98903d88a6a187c60431a600f6ecbbe2888ee69e40a67ce77b55
-
Filesize
24KB
MD53006752a2bcfeda0f75d551ea656b2ef
SHA1b7198fc772be6d6261ed4e76aca3998e8f7a7bdb
SHA256dfd64231860c732dced3dc78627a7844a08d5d3e4cd253fd81186bae33cc368a
SHA5123fcfa7c8f46220852dc7efef5b29caba86825d0461a35559f26dbb2540c487b92059713f42fe1082a00a711d83216db012835673e1c54120ffa079e154950854
-
Filesize
48KB
MD5343fa15c150a516b20cc9f787cfd530e
SHA1369e8ac39d762e531d961c58b8c5dc84d19ba989
SHA256d632e9dbacdcd8f6b86ba011ed6b23f961d104869654caa764216ea57a916524
SHA5127726bd196cfee176f3d2002e30d353f991ffeafda90bac23d0b44c84c104aa263b0c78f390dd85833635667a3ca3863d2e8cd806dad5751f7984b2d34cafdc57
-
Filesize
1KB
MD5cc8f99a6eb90d0b6b964f32021942e45
SHA10b459dbc442fb7c3c991831f7d340a0a82f73faa
SHA25665fadc268ceb22a4351d13fe6cd42a86ea327df9ba046d1ed6f846ea26fd8d4d
SHA5123d0d276b9d2408ec6eeb0f15e67bfd540936df1203fa4ed41d29a53b272051e8856c6f911f4af25895cae47bcc022c56e880dda268b5ee34305724bf5441df42
-
Filesize
796B
MD57173b9fd1787fb6bd27f3afb67b9eb92
SHA1ab9175fba143ebab8754ce84cff62255ae567f75
SHA2564d64834bd07f9f6fe671e5ccbe27fd06c8de6aee48c9a3f9eefb56b5a7205323
SHA51257fa7e204e46ccc15e0227ef69c3258fc0b749eb0cdd70d10a4108a0e19d36e805042b20ca3114f8ec4ddde004466cc8616e043135b6739fb1f1c41cdb5f9ec2
-
Filesize
206B
MD5c2858b664c882dcce6042c40041f6108
SHA152eeaa0c7b9d17a8f56217f2ac912ba8fdc5041a
SHA256b4a6fb97b5e3f87bcd9fae49a9174e3f5b230a37767d7a70bf33d151702eff91
SHA51251522e67f426ba96495be5e7f8346e6bb32233a59810df2a3712ecd754a2b5d54d0049c8ea374bd4d20629500c3f68f40e4845f6bb236d6cca7d00da589b2260
-
C:\Users\a\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk
Filesize2KB
MD5091b22cc9ffec3ab85dbc7bc3515f546
SHA16f288ed255108a926e2f0f862dba66df4d3d84ea
SHA25609a658a797953edc1c1fc9d5a38978ba3c6ff5039efa37fbe5f5c915fbafbf3a
SHA51236c849e625e8d642dcd1e20587ed1640078de50e3a6b8ef3eac1827ba13467a8ff619ddc882c9425da89a8807abc60ed3c1419d649fb5ec3acb328b025c3a815
-
C:\Users\a\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Explorer.lnk
Filesize1KB
MD547b2e1c4ddd5fa161f4e7314222d7a29
SHA1f8e0a57ad324aa0ce6eafcbee54361cfc3fac7a4
SHA25620b9ba1869ed5d109962522c7c9a09e2675c457edd780f3723d33f9b40475772
SHA51207c8e9fcc6441c45540ced17802aea9fc84197733cc13af77516813c3beb346ae2748445ae99318309cbdc2da8e69e622dd91e658b7e9ba27d424eae6f5acf1b
-
C:\Users\a\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Media Player.lnk
Filesize1KB
MD5ff1dad0a492f83a43202470899c76c14
SHA107d7c58f39a8b699107b6f8a4be60adb0ec780ea
SHA2563fe88e282e0b5399e982aadfd747b53f1354413cab9f6c9b284ecb874bcbe25f
SHA51244ae99a0b175be94040b903b252fcbb921828f11c833179081db9f2cb7002b77ae64d664898800f379d10a595270542690afec7bf8c34a16ac2eb31d725fcdd9
-
Filesize
82B
MD51c61dc21f9b83172d65be1e94b79026f
SHA17324473ddda64b87c299bf6e3b9e9aff53f7fd74
SHA2568e920d7893b682a049f6a5097f880d915dc2d7bf8bc87ae558cd7f14466d5d1b
SHA5129660cde4d7606826c2fb6623460a2a286339970256e677c8abf8189fd1d58e0284c024bbf5c0bf539189dafa3e8d5269c1e0f7e3717891f2ae4771634731bbd8
-
Filesize
146B
MD59a1b13fd914dd7054b83bc1760c99ab8
SHA1340c37602b11cd3cb9ae681d09bfc4c81f733742
SHA2567f0a9cc0be951d60d6c8e60d1a612bfa65fa390020d7c0c80f212ba2a47a4aa3
SHA51250d48a348c71fb9e89ab01e59fe599b692a1701f19d2c9de6ae09678e0a44ba95020b1989f9c776edcacacc5f2b2b348b0f31aa28c04850e69e47cda6dcaf88e
-
Filesize
211B
MD5e5a8eb64419f6d85a1b7aed2152616c2
SHA1f5d94f8953bb235e35fccec0ea4f14ba69443081
SHA2565266b08d0c1bf229ec5eafdb6dae2a4849b6b394694d34033453cf8a379725a7
SHA5127c304bc842c81d3b5cff745d34b038a2a867063c65e502f4155439ba0642e8b0643f9b7254f74e85d5b150c134836b9e398a0dcb192550d97dfd431c3d93f1f6
-
Filesize
3KB
MD55260e93da8ebf89da82685d1c7b7ba80
SHA147ae1a99169bb3f7233e9486a00de16051146fc0
SHA256287d83bf3c2c54282736eab39f28e5a8716af0922776a6841f6d8ca1b704d2e8
SHA512ad4df6f2da4c493bd2b807de954bf933e6fc36638c88978544ffec3ab0eaf19138895a5828809189b44a7d9e295f53a5665d208430b328e0ad5034d08d6a2f51
-
Filesize
3KB
MD53237825ef17896ae316b7c90612f8c8a
SHA1dfd57e57289ed943904440ad97b1fc8404591955
SHA25632a02b9256fe5e17669fb3f09df81df0933c31239552428ef73b646441f07336
SHA5128667d24e51b4ad0060a8d8ac207f26be4c3ab2ef1a0fd8e978f544f49dbd2eac069de0ea8b1d928dabc8dc84fc70b9675708f6e7cbdb7456134e4170822a15fe
-
Filesize
3KB
MD5712f9d849f2cc261fab17adaee4a110f
SHA1915c0e9a07ad56d786331807306c39a22a82395e
SHA2561e98dfd1a487439aff3a27d9fd3a887c082d546bde4e29f45fed5e765fff84c9
SHA5128881e1ff1c6166cf28ddcf9cec111a37cfce85b740a355ed6a71252e40fd5009373bb49755898b2fe2b5bd34c3b47f6ffa2e272c41758485380dc77241aa87d4
-
Filesize
3KB
MD560d06e4dee5f148350c2b396776a2895
SHA19bab54b821d3b9d7cbe3d7f0fbc5de7903dae508
SHA256c411913e70d9b860d12d4a9aa5a79a406a7788012540c99d8893f644b761f34b
SHA51212c22beb5887b1b8f3c65ab80692f90b70a279e608a239a8293df916b1cab86859c24708d2e8241880374f572229a473dcfa79a5ed863966ca497a53fbf29ea5
-
Filesize
3KB
MD5ac1547e31db29ff8e104c9d0419a9016
SHA1374ced5935b0446ef63532e92c20eab09a37b849
SHA256527091a1b726a0bb61c822be0d4170a74cdebe8ea01fe4c0a7ff1bce80cffb94
SHA51217c3bb5461b7fbbf9a0e5b63cb7488263cc4477faa6b18ea23a67a6747dc652eebe621cd487bb7c6cea62fcb1f9ff6748cbbd260b4332268dcdfc83a418bd7d4
-
Filesize
3KB
MD5cc8bf0b8112d8e3808d773ed06535baa
SHA1eef8ff38045c325cef334d7b35afa06aa4716038
SHA2568d804c403682da6c378bee9a70a14f413265716fe29ee309a01dcb2c3beffb69
SHA51288cf73870d0d2c843cfa787948edef6532a30fc0cf2a0a14bff64aaa04529f7bc36feea9d0f51ba682add19d7bfdaf04a0069fb6c306ac4832908e691626cca1
-
Filesize
3KB
MD594d4b3a066b9f1a77160bce687761187
SHA1abca137f406812b1f120d272c9a9ef3cfcfa37aa
SHA2569c526c86f7e342e4ca00e8a56ea87cf976d071ce2ffc9bbc5ef15b3a0c9b30e9
SHA5125ee770e965fc21baf1d017fc7b37470b7d41e3dc90f81bb35586cb45f2efae5d8ee2ba49394a9363529d2ff13e3220ecb83f370c9fefb6292ff3bb4931ca36b2
-
Filesize
3KB
MD52e74ba4dcedfee09f118c375669cb502
SHA16f2ed90d05c09d99fba94c4eeb1da56825d901ba
SHA256f6e21ba4f9c54472cda1411a0e08d808633dbe4d9c22442fb28c2ce5b05550be
SHA512bfbdae70f0fd65091a24093128589cd46de2a461469c639d9628f9492d28d7d46f6b21f644e0035ae905233a55c206a20dc4fa86b0b2675e4216bb3adace3e28
-
Filesize
151B
MD50ff56a4620c3221ff64ec61a3a0d3033
SHA13a45320be12b585dcdc5ab2af5ea1455b2c919a1
SHA2560b0a65accca705494739d03b6c2ea769c78cd0eee996bc95b0c6ebc0941f4b1a
SHA512962a340efeb6d18c85e5872997eebb83374e114be088689690ba438f0db8e2e4df6c24713a35cfaec518f58d5322cf9617638ea55ff279a9d161c4fdf9af74f6
-
Filesize
274B
MD5453249f95d75eb5e450eb91fa755e1c8
SHA13e200e187e8cd21d3d1976ea0f7356626254de18
SHA25601bef150c18e377a57843965d55f18f0b5cb3fa867c5ab30f1e67eacd6ece48a
SHA5126125ffc1ab457bc1ba957c78c2a89ca54060c1969c4a981acf71025a1d79760159816d5fc36e351429de3bb5820e755b9bc22386f3d6892bfdf3da67d86f157c
-
C:\Users\a\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5afe4de1b92fc382.customDestinations-ms
Filesize15KB
MD523cd3d9f9dae18a5fe4f2f2b57517b71
SHA1e2f72cf71ee6c30031bf6df2389449431bf9807d
SHA2563959fa0a898fe1d6b5be57acb59bfb73a35a92efc452e75ea71d3df3332ae2cd
SHA512426cb719150035ac674bee5db279d1d96bc3e8703d2b64d0c00111362e8961058564abf6717b4bdf74d62eb2945cb78794b9b5f56214056365086e73bb88445f
-
Filesize
432B
MD5f107d0270e21a2fe91099fdc15918d44
SHA1dabc2f24f4a4e90053743166e5c4175dcf2b2d2d
SHA256eb315c9d165b4916e3b00e4d148b53a6c03a2f0694a6a8821d98e76f935ca6a8
SHA512b5d51c0d6abe99121d4f4f1d236def4260b7d5c26c501d7735eba4f58e2597db0e89b2b1df16545e49fc39649806e5305efb912328541bdd31c01ff3d2bda49c
-
C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Internet Explorer (No Add-ons).lnk
Filesize1KB
MD5c30bf74a2d0b586897440033eeb75617
SHA176fa1f9291c310d4b1aba4e17cac89ad7b0a25a8
SHA25645b06dd4531618f76705ece526db2c2966e954d6401e94a4ceab35624dbeb42b
SHA5122461ed9f99b1d3e793dd3fc63c0abcd47b309c9e2b9b5ed068b4154990a6f9f696f269815be31c33f9b53585a748c8ed1c89841e798e51569ade221d182e23b5
-
C:\Users\a\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini
Filesize738B
MD53a33faac6513738fd86f43dff8989882
SHA1afd4390e6b63c40e55ca08d27661a23d657b01a2
SHA25621a4315cbae2b0e8db633e86c344171da86f115bcbbb745680ff6f577668c910
SHA5128d7a47cba6b4d0da36151221c373625b67e44354b7cde41b5c3657e73a843b22a0a5b0bf92a4cbc32eac70b8292d674821085acf92bb58b94ea4542458c94b57
-
Filesize
174B
MD5548b310fbc7a26d0b9da3a9f2d604a0c
SHA11e20c38b721dff06faa8aa69a69e616c228736c1
SHA256be49aff1e82fddfc2ab9dfffcb7e7be100800e3653fd1d12b6f8fa6a0957fcac
SHA512fa5bb7ba547a370160828fe720e6021e7e3a6f3a0ce783d81071292739cef6cac418c4bc57b377b987e69d5f633c2bd97a71b7957338472c67756a02434d89f1
-
Filesize
1KB
MD52ddd1f9bfe1d903965484d9e32fbd5ba
SHA1752ca86857eab8a75cf4e280e85fd851ac82dacc
SHA256a81f86f81df9ca1e04fd3460838ba194fe007c2bd52c9e2bc6c08d99a7b593c3
SHA5129ae1c6b7a73e56710ba8d33e70011a679e35a3b7369295448b8e11f8e5214e1143efd0ded98f59716c71e125f2d6a399d348a176c3ffa207cef27d03aa559989
-
Filesize
174B
MD57f1698bab066b764a314a589d338daae
SHA1524abe4db03afef220a2cc96bf0428fd1b704342
SHA256cdb11958506a5ba5478e22ed472fa3ae422fe9916d674f290207e1fc29ae5a76
SHA5124f94ad0fe3df00838b288a0ef4c12d37e175c37cbf306bdb1336ff44d0e4d126cd545c636642c0e88d8c6b8258dc138a495f4d025b662f40a9977d409d6b5719
-
Filesize
174B
MD517d5d0735deaa1fb4b41a7c406763c0a
SHA1584e4be752bb0f1f01e1088000fdb80f88c6cae0
SHA256768b6fde6149d9ebbed1e339a72e8cc8c535e5c61d7c82752f7dff50923b7aed
SHA512a521e578903f33f9f4c3ebb51b6baa52c69435cb1f9cb2ce9db315a23d53345de4a75668096b14af83a867abc79e0afa1b12f719294ebba94da6ad1effc8b0a3
-
Filesize
338B
MD5e4e50dfa455b2cbe356dffdf7aa1fcaf
SHA1c58be9d954b5e2dd0e5efa23a0a3d95ab8119205
SHA2569284bd835c20f5da3f76bc1d8c591f970a74e62a7925422858e5b9fbec08b927
SHA512bef1fad5d4b97a65fec8c350fe663a443bc3f7406c12184c79068f9a635f13f9127f89c893e7a807f1258b45c84c1a4fc98f6bd6902f7b72b02b6ffbc7e37169
-
Filesize
174B
MD5a2d31a04bc38eeac22fca3e30508ba47
SHA19b7c7a42c831fcd77e77ade6d3d6f033f76893d2
SHA2568e00a24ae458effe00a55344f7f34189b4594613284745ff7d406856a196c531
SHA512ed8233d515d44f79431bb61a4df7d09f44d33ac09279d4a0028d11319d1f82fc923ebbc6c2d76ca6f48c0a90b6080aa2ea91ff043690cc1e3a15576cf62a39a6
-
Filesize
627KB
MD5da288dceaafd7c97f1b09c594eac7868
SHA1b433a6157cc21fc3258495928cd0ef4b487f99d3
SHA2566ea9f8468c76aa511a5b3cfc36fb212b86e7abd377f147042d2f25572bf206a2
SHA5129af8cb65ed6a46d4b3d673cea40809719772a7aaf4a165598dc850cd65afb6b156af1948aab80487404bb502a34bc2cce15c502c6526df2427756e2338626062
-
Filesize
66KB
MD540c926b45b2479b6a2f348f7a65e6c79
SHA149f398378062a27f14525cf3afc2ca5ff8282b93
SHA25653c849aed4ff854cf424ea14be202afbe3caf6d5825c5d47d1bb566c0e87173a
SHA512eca6d115c5a0ad2f4bf402aab50c016acf37258bceca6f1f2fe2f803bdee1d63c5765f7817152c921932620c7812e24d1e040e953ed3729c2815e6f15403d08b
-
Filesize
432B
MD5eefa7f76ff11a5ec21bb777b798ac46c
SHA12e7a65ea8427d13a92ea159a5b8859ff99d2a836
SHA256840b46ed74821b5b61ca9ddc51a91cfe9151d11a494c89f183fadc02a78ac8ae
SHA512111301e33c0b33c154ffff274db5eb167de0ddb4e769cab9a2d9fcd2882e6192053149abbcb00d17ae5f7661bafecc1111aff2025c89d07b247633bbccb0e3ef
-
Filesize
412B
MD5449f2e76e519890a212814d96ce67d64
SHA1a316a38e1a8325bef6f68f18bc967b9aaa8b6ebd
SHA25648a6703a09f1197ee85208d5821032b77d20b3368c6b4de890c44fb482149cf7
SHA512c66521ed261dcbcc9062a81d4f19070216c6335d365bac96b64d3f6be73cd44cbfbd6f3441be606616d13017a8ab3c0e7a25d0caa211596e97a9f7f16681b738
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
174B
MD50112dae9f329260a14182be719d234a1
SHA1aef97a50459a015876666a1a91f59ea39a10c9c2
SHA2563fe672d8ff2f97f593389145a5177f964f1eeb64e56796a12b9b19d7a2dd73cd
SHA5122597170a3af7a802bb88c975380145a700945769267dd82c1e96b9b2f49bcb31c3913f64f2eabe7a62982be58817f7ba10d35621be1c4148eebbdaf457f1a684
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790
-
Filesize
282B
MD5ef9c9cec179c9e1039f89301070d3f3c
SHA1624cc8181829818e5cc082d2eb2dfcb7cee8015f
SHA2567544c1413f719a07463c1932f56055eb1600dab95ff79fbccddb56ca7af3aa0a
SHA512a4cc85c3ac7c484b0c6b5f43254e33423d598a3dbfd93747fdac43555ee2c6c0c82929bfa939f7e94e6ab370bcfd24449ed0fac53f04a872cdee2cd6a73f1078
-
Filesize
402B
MD5ecf88f261853fe08d58e2e903220da14
SHA1f72807a9e081906654ae196605e681d5938a2e6c
SHA256cafec240d998e4b6e92ad1329cd417e8e9cbd73157488889fd93a542de4a4844
SHA51282c1c3dd163fbf7111c7ef5043b009dafc320c0c5e088dec16c835352c5ffb7d03c5829f65a9ff1dc357bae97e8d2f9c3fc1e531fe193e84811fb8c62888a36b
-
Filesize
282B
MD53a37312509712d4e12d27240137ff377
SHA130ced927e23b584725cf16351394175a6d2a9577
SHA256b029393ea7b7cf644fb1c9f984f57c1980077562ee2e15d0ffd049c4c48098d3
SHA512dbb9abe70f8a781d141a71651a62a3a743c71a75a8305e9d23af92f7307fb639dc4a85499115885e2a781b040cbb7613f582544c2d6de521e588531e9c294b05
-
Filesize
134B
MD5873c8643cbbfb8ff63731bc25ac9b18c
SHA1043cbc1b31b9988d8041c3d01f71ce3393911f69
SHA256c4ad21379c11da7943c605eadb22f6fc6f54b49783466f8c1f3ad371eb167466
SHA512356b13b22b7b1717ded0ae1272b07f1839184e839132f3ab891b5d84421e375d4fc45158c291b46a933254f463c52d92574ce6b15c1402dfb00ee5d0a74c9943
-
Filesize
226B
MD5ad93eaac4ac4a095f8828f14790c1f8c
SHA1f84f24c4ca9d04485a0005770e3ef1ca30eede55
SHA256729111c923821a7ad0bb23d1a1dea03edbf503cd8b732e2d7eb36cf88eaa0cac
SHA512f561b98836233849c016227a3366fcf8449db662f21aecd4bd45eb988f6316212685ce7ce6e0461fb2604f664ed03a7847a237800d3cdca8ba23a41a49f68769
-
Filesize
282B
MD5dd74e2fe22d5594e137db16b476dba8a
SHA1ea87306a8488f58b874ed91af4367a613b996da1
SHA25614ce9784828edd441bdad1eb1933bc9140e134aa08cc25af0983008ed273b3c7
SHA51222ddb320e5218f831a0056443c530cb14ae9838dbaf19f5a96067ccab63fb2cc8b6ce5b1e5197759721bd6bee2d2f9067236d44e377c14859da756f013139089
-
Filesize
402B
MD5881dfac93652edb0a8228029ba92d0f5
SHA15b317253a63fecb167bf07befa05c5ed09c4ccea
SHA256a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464
SHA512592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810
-
Filesize
432B
MD54afb618610707de886009a962eb0361a
SHA1ed54e50dc45148899135d751a9d321c987bebc60
SHA256723031dd43bc01c8d62203ddf144f473e86f2729f55cd4fb0f83d313f0bf0039
SHA512ba687911e7d5a5c36b92e8a283f7de4a900a7b99d874df8cb837ce5cf84145269b6c6f6e24b2c238fe5cc118cb49107126fb777d904e0c7aa52144ca040d829f
-
Filesize
363B
MD50025c3a7d7c4e90e58332958b00d83c4
SHA101dd4fdb260f66923004acb5a874111a9d14da38
SHA25636db348143da1b5c16b9074940e85761950ee30b533b7ca75924f2f4ef6b253b
SHA512b5631c94bad794541d16f2fa3a02018f4b34b680b63a9f3b6a3da4329216567a7ba9ceb8d4bd18165b0e55142f42e039f160ec675c0946237c276de1a6e642c4
-
Filesize
282B
MD598470d9bd7fba55a0c303065f9c4f9be
SHA15303b190e29ba48332f7c90a832ef08af5a1953d
SHA2563830022d5d7ef2ae2ca0a2b6ad73f0d4716b49bf7eeeaa87b618988d531b7c72
SHA512134e072c3600bbb3c724c2700da399a14ba5b907153969362b3dbff32c480d39e7f5ecceebc9122a5a27265410557a16eb6bf82c9b635b90ef1fa0ae9efb849c
-
Filesize
468B
MD592adc8410cd8cb1d0481e2adbb62c7dd
SHA1bac1444ebe0bac748966f3bee84ee11e151a4810
SHA2564a3d7ccddac5c1b437fb687e90589015b9b9ae7708ea35eed9917d1190f65694
SHA512d7c3a5df50b28e336ff24f828cdf225554d199d3c2a857e2a7baa1f2bc1fee21944733edee52bd665ebaee999f5668d03497e9bfe88d58d380b74e6046ec5d62
-
Filesize
580B
MD5de8858093993987d123060097a2bad66
SHA10a89e87ba46538cb73aff1a47e4dc0bcfb4760d5
SHA2564c0d757717dec80eca8c6cbbfdda4706eb38fbbb7624933d5429dafc7bb9f0ec
SHA512fa348ac4025b599f460cb831338ce010dde8fba87587a6d078d6d594a30fee87ed112e412078c10604553f326cc7bd7627ae93b0e3d8a60cfeda0720cad29f4c
-
Filesize
504B
MD506e8f7e6ddd666dbd323f7d9210f91ae
SHA1883ae527ee83ed9346cd82c33dfc0eb97298dc14
SHA2568301e344371b0753d547b429c5fe513908b1c9813144f08549563ac7f4d7da68
SHA512f7646f8dcd37019623d5540ad8e41cb285bcc04666391258dbf4c42873c4de46977a4939b091404d8d86f367cc31e36338757a776a632c7b5bf1c6f28e59ad98
-
Filesize
504B
MD529eae335b77f438e05594d86a6ca22ff
SHA1d62ccc830c249de6b6532381b4c16a5f17f95d89
SHA25688856962cef670c087eda4e07d8f78465beeabb6143b96bd90f884a80af925b4
SHA5125d2d05403b39675b9a751c8eed4f86be58cb12431afec56946581cb116b9ae1014ab9334082740be5b4de4a25e190fe76de071ef1b9074186781477919eb3c17
-
Filesize
174B
MD5dfb9f6037a6bc86b5aa6f224854a0cd2
SHA1499f866cccbb413ffd5b18f380d00c0529797f22
SHA25658047327df3fbbec7e816bd18057b9d0317f682c384eabb7e9a9d3e634502260
SHA512ea0dd50925937d1aecaa0a43b7d9d508e3bf1bba1fc4cc8645e3244aedae77fa50499655e6dfd72cad5d2c14d1fee47c35ccbf2df19c11a7466664989cbafa6d
-
Filesize
282B
MD5b441cf59b5a64f74ac3bed45be9fadfc
SHA13da72a52e451a26ca9a35611fa8716044a7c0bbc
SHA256e6fdf8ed07b19b2a3b8eff05de7bc71152c85b377b9226f126dc54b58b930311
SHA512fdc26609a674d36f5307fa3f1c212da1f87a5c4cd463d861ce1bd2e614533f07d943510abed0c2edeb07a55f1dccff37db7e1f5456705372d5da8e12d83f0bb3
-
Filesize
248B
MD50fa26b6c98419b5e7c00efffb5835612
SHA1d904d6683a548b03950d94da33cdfccbb55a9bc7
SHA2564094d158e3b0581ba433a46d0dce62f99d8c0fd1b50bb4d0517ddc0a4a1fde24
SHA512b80a6f2382f99ca75f3545375e30353ed4ccd93f1185f6a15dbe03d47056dad3feea652e09440774872f5cba5ef0db9c023c45e44a839827a4b40e60df9fd042
-
Filesize
248B
MD5b6acbeb59959aa5412a7565423ea7bab
SHA14905f02dbef69c830b807a32e9a4b6206bd01dc6
SHA25699653a38c445ae1d4c373ee672339fd47fd098e0d0ada5f0be70e3b2bf711d38
SHA5120058aa67ae9060cb708e34cb2e12cea851505694e328fd0aa6deba99f205afaffdf86af8119c65ada5a3c9b1f8b94923baa6454c2d5ab46a21257d145f9a8162
-
Filesize
524B
MD5089d48a11bff0df720f1079f5dc58a83
SHA188f1c647378b5b22ebadb465dc80fcfd9e7b97c9
SHA256a9e8ad0792b546a4a8ce49eda82b327ad9581141312efec3ac6f2d3ad5a05f17
SHA512f0284a3cc46e9c23af22fec44ac7bbde0b72f5338260c402564242c3dd244f8f8ca71dd6ceabf6a2b539cacc85a204d9495f43c74f6876317ee8e808d4a60ed8
-
Filesize
504B
MD550a956778107a4272aae83c86ece77cb
SHA110bce7ea45077c0baab055e0602eef787dba735e
SHA256b287b639f6edd612f414caf000c12ba0555adb3a2643230cbdd5af4053284978
SHA512d1df6bdc871cacbc776ac8152a76e331d2f1d905a50d9d358c7bf9ed7c5cbb510c9d52d6958b071e5bcba7c5117fc8f9729fe51724e82cc45f6b7b5afe5ed51a
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88