Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1369s -
max time network
1433s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
29/10/2024, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
XBinderOutput(1).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XBinderOutput(1).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
XBinderOutput(1).exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
XBinderOutput(1).exe
Resource
win11-20241007-en
General
-
Target
XBinderOutput(1).exe
-
Size
607KB
-
MD5
19d31479381cfda2c9878b427f51a0c2
-
SHA1
5b8774c60b71dd32e7325d0fbceb3434975ca7cc
-
SHA256
e3b4620b85709a793de2b777da764d094f9a6dc19ead0a7fcad953c1fb3e8550
-
SHA512
14ce10c974af40f5ab3e93f3bb3ff5ada22a8c2245bf45f40be0a59a75bcd9bfb2bf2288416744a2cebb93b3eb487ba070670d553ea87ca8c0e566c727bf28a2
-
SSDEEP
12288:DikJ/Wmo/J594F3o472LiJgSifSdq/UByol53uFb/V4YUWpcZm83:TJ/+z4F3osuiKoqsyol54bWYUK
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" fontdrvhost.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3884 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4604 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1348 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1860 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 272 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1052 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2308 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3716 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4892 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3620 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2948 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2740 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3608 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1360 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2100 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3428 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4120 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3708 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4800 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4436 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 992 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1016 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3900 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3852 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3976 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3712 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3188 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4608 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4576 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2916 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1464 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4712 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3468 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5052 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5112 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 1572 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 1572 schtasks.exe 89 -
resource yara_rule behavioral3/files/0x0029000000045074-7.dat dcrat behavioral3/files/0x002800000004507b-30.dat dcrat behavioral3/memory/3492-31-0x0000000000AD0000-0x0000000000BA6000-memory.dmp dcrat -
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\acpi.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\UMDF\HidTelephony.dll fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\refs.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\Dumpstorport.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\gmreadme.txt fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\scfilter.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\vms3cap.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\wanarp.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\smbdirect.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\wdf01000.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\ndiscap.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\werkernel.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\vmstorfl.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\volmgr.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\vdrvroot.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\IPMIDRV.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\battc.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\bridge.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\cimfs.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\IPMIDrv.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\ntfs.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\rasl2tp.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\WpdUpFltr.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\UMDF\en-US\wpdmtpdr.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\applockerfltr.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\BtaMPM.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\Dumpata.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\msrpc.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\dmvsc.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\fvevol.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\pcw.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\vhdmp.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\nwifi.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\bttflt.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\NdisVirtualBus.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\tdi.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\BthA2dp.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\umpass.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\WdfLdr.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\bthenum.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\storufs.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\AcpiDev.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\kbldfltr.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\usbhub.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\cnghwassist.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\EhStorClass.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\UcmTcpciCx.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\vmbkmcl.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\ntfs.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\dfsc.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\gpuenergydrv.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\mausbip.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\spacedump.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\mshwnclx.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\acpi.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\FWPKCLNT.SYS fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\null.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\pdc.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\en-US\volmgrx.sys.mui fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\bam.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\tcpipreg.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\udfs.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\usbohci.sys fontdrvhost.exe File opened for modification C:\Windows\System32\drivers\USBSTOR.SYS fontdrvhost.exe -
Manipulates Digital Signatures 4 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\pwrshsip.dll fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\wintrust.dll fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pwrshsip.dll fontdrvhost.exe File opened for modification C:\Windows\System32\wintrust.dll fontdrvhost.exe -
Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File opened for modification C:\Windows\System32\spool\prtprocs\x64\winprint.dll fontdrvhost.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000\Control Panel\International\Geo\Nation XBinderOutput(1).exe Key value queried \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000\Control Panel\International\Geo\Nation kendalcp.exe Key value queried \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000\Control Panel\International\Geo\Nation reviewDll.exe Key value queried \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000\Control Panel\International\Geo\Nation reviewDll.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Deletes itself 1 IoCs
pid Process 3572 fontdrvhost.exe -
Executes dropped EXE 17 IoCs
pid Process 4176 kendalcp.exe 3492 reviewDll.exe 1752 reviewDll.exe 3572 fontdrvhost.exe 772 spoolsv.exe 2996 unsecapp.exe 808 TextInputHost.exe 4272 fontdrvhost.exe 3608 RuntimeBroker.exe 3612 sihost.exe 1420 backgroundTaskHost.exe 464 SearchApp.exe 2124 dllhost.exe 2560 cmd.exe 1352 upfc.exe 4792 fontdrvhost.exe 3224 fontdrvhost.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 64 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Crypto-DPAPI%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-PowerShell%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Shell-Core%4AppDefaults.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-SmbClient%4Audit.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-SMBServer%4Audit.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-BackgroundTaskInfrastructure%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-DeviceSetupManager%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Kernel-WHEA%4Errors.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-PowerShell%4Admin.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-StateRepository%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Sysmon%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Winlogon%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Inventory.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-NetworkProfile%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-SMBServer%4Connectivity.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Compatibility-Troubleshooter.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-CloudStore%4Initialization.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-NCSI%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-ShellCommon-StartLayoutPopulation%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-User Profile Service%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Windows PowerShell.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-AppXDeploymentServer%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\HardwareEvents.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Telemetry.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-CloudStore%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Kernel-Boot%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-WinINet-Config%4ProxyConfigChanged.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Application.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-AppXDeploymentServer%4Restricted.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-SettingSync%4Debug.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-SMBServer%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Client-Licensing-Platform%4Admin.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Kernel-WHEA%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-LiveId%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-User Device Registration%4Admin.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Windows Firewall With Advanced Security%4FirewallDiagnostics.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Security.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Key Management Service.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Kernel-ShimEngine%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-SMBClient%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-StorageSpaces-Driver%4Diagnostic.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-AppXDeployment%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Crypto-DPAPI%4BackUpKeySvc.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-DeviceSetupManager%4Admin.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Ntfs%4WHC.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Shell-Core%4LogonTasksChannel.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-SmbClient%4Connectivity.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-VDRVROOT%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-AppModel-Runtime%4Admin.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Windows Firewall With Advanced Security%4Firewall.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Shell-Core%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Shell-Core%4ActionCenter.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Dhcp-Client%4Admin.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Store%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Storsvc%4Diagnostic.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-VolumeSnapshot-Driver%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Wcmsvc%4Operational.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\OAlerts.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Internet Explorer.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-Kernel-PnP%4Driver Watchdog.evtx fontdrvhost.exe File opened for modification C:\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-LocalSessionManager%4Admin.evtx fontdrvhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 33 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondocuments_31bf3856ad364e35_10.0.19041.1_none_04c252e5678f305a\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..i-accessibilityuser_31bf3856ad364e35_10.0.19041.1_none_19358785a81a86d6\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ini-accessoriesuser_31bf3856ad364e35_10.0.19041.1_none_d9f53b39b3834744\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ktopini-accessories_31bf3856ad364e35_10.0.19041.1_none_a208296858c76413\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..l32-kf-userprofiles_31bf3856ad364e35_10.0.19041.1_none_39d6d106c6f70bec\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell-sounds_31bf3856ad364e35_10.0.19041.1_none_cd0389b654e71da2\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-fontext_31bf3856ad364e35_10.0.19041.423_none_7c917c97525f1487\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..2-kf-commonprograms_31bf3856ad364e35_10.0.19041.1_none_047fa97bc9873117\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-publiclibraries_31bf3856ad364e35_10.0.19041.1_none_cbd9ad4986c925d5\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commonstartmenu_31bf3856ad364e35_10.0.19041.1_none_f6eee8789c1c6fdd\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..l32-kf-programfiles_31bf3856ad364e35_10.0.19041.1_none_cb8c8caad1a2ad44\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-ie-offlinefavorites_31bf3856ad364e35_11.0.19041.4355_none_199e16b530685f15\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-ie-objectcontrolviewer_31bf3856ad364e35_11.0.19041.1_none_2108f0881e5a7a03\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..kf-commonadmintools_31bf3856ad364e35_10.0.19041.1_none_0b090bb5ae01dd1a\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ktopini-maintenance_31bf3856ad364e35_10.0.19041.1_none_148b41803c849a3c\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..sktopini-sendtouser_31bf3856ad364e35_10.0.19041.1_none_be359f0533764571\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell32-kf-commonmusic_31bf3856ad364e35_10.0.19041.1_none_2f07a4cad3dec315\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..2-kf-commonpictures_31bf3856ad364e35_10.0.19041.1_none_36436b821c9e7209\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-ie-offlinefavorites_31bf3856ad364e35_11.0.19041.1_none_4b0e6b545bf0f4e7\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ini-maintenanceuser_31bf3856ad364e35_10.0.19041.1_none_bbf8ad8ff53c9b5b\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ktopini-systemtools_31bf3856ad364e35_10.0.19041.1_none_345e4e1d2701732b\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..opini-accessibility_31bf3856ad364e35_10.0.19041.1_none_905c6a851ca62951\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell-wallpaper-theme1_31bf3856ad364e35_10.0.19041.1_none_8ccb1090444b78d3\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell-wallpaper-theme2_31bf3856ad364e35_10.0.19041.1_none_8ccaf9c8444b9274\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-fontext_31bf3856ad364e35_10.0.19041.4355_none_133fb84ca8d781b5\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..32-kf-commondesktop_31bf3856ad364e35_10.0.19041.1_none_a81a33274fb1b624\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..32-kf-commonstartup_31bf3856ad364e35_10.0.19041.1_none_b2014b56ea660ec9\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ini-systemtoolsuser_31bf3856ad364e35_10.0.19041.1_none_d69cbb4282e4fe2c\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..l32-kf-commonvideos_31bf3856ad364e35_10.0.19041.1_none_923716ddadd939c8\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell32-kf-public_31bf3856ad364e35_10.0.19041.1_none_0cf1a65e91dfb2be\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell-sounds_31bf3856ad364e35_10.0.19041.4474_none_8bc3e36c6aca02bc\Desktop.ini fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-programfilesx86_31bf3856ad364e35_10.0.19041.1_none_3870d3554f39ac78\desktop.ini fontdrvhost.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf fontdrvhost.exe File opened for modification C:\Windows\WinSxS\x86_microsoft-windows-s..ccessagent-binaries_31bf3856ad364e35_10.0.19041.1_none_3802d0d85b60df4c\autorun.inf fontdrvhost.exe File opened for modification C:\Windows\WinSxS\x86_microsoft-windows-s..ccessagent-binaries_31bf3856ad364e35_10.0.19041.4355_none_f6cbe31e713d8f68\autorun.inf fontdrvhost.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\tr-TR\WWAHost.exe.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\ActivationClient.dll fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\UXInit.dll fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\it-IT\iertutil.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\KeyCredMgr.dll fontdrvhost.exe File opened for modification C:\Windows\System32\de-DE\wlidcli.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\en-US\mimefilt.dll.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\IME\IMEJP\APPLETS\IMJPKDIC.DLL fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\wbem\nlsvc.mof fontdrvhost.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\intelpep.inf_loc fontdrvhost.exe File opened for modification C:\Windows\System32\migwiz\replacementmanifests\kernel-pnp-repl.man fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\BrowserSettingSync.dll fontdrvhost.exe File opened for modification C:\Windows\System32\SCardBi.dll fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\nlmgp.dll fontdrvhost.exe File opened for modification C:\Windows\System32\ja-jp\qwave.dll.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\de-DE\onexui.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\fr-FR\scesrv.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\uk-UA\UserDataAccessRes.dll.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\wbem\whqlprov.mof fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\kanji_2.uce fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\Windows.StateRepositoryBroker.dll fontdrvhost.exe File opened for modification C:\Windows\System32\ApplicationControlCSP.dll fontdrvhost.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\virtdisk.inf_loc fontdrvhost.exe File opened for modification C:\Windows\System32\wbem\en-US\MsNetImPlatform.mfl fontdrvhost.exe File opened for modification C:\Windows\System32\es-ES\PCPKsp.dll.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\netutils.dll fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\fr-FR\AdmTmpl.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\de-DE\Startupscan.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\fr-FR\fhtask.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\ja-jp\wlanutil.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\Windows.ApplicationModel.Store.TestingFramework.dll fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\uk-UA\windows.ui.xaml.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\msvcp120_clr0400.dll fontdrvhost.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\netathr10x.inf_amd64_2691c4f95b80eb3b\eeprom_ar6320_3p0_NFA344A_power1213.bin fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\SimAuth.dll fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\uk-UA\winmsipc.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\csplte.dll fontdrvhost.exe File opened for modification C:\Windows\System32\de-DE\mtstocom.exe.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\ja-JP\msmpeg2enc.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\fr-FR\KernelBase.dll.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\de-DE\SimAuth.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\nci.dll fontdrvhost.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_EnvironmentResource\uk-UA\MSFT_EnvironmentResource.schema.mfl fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\uk-UA\mdminst.dll.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\uk-UA\srcore.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\usbvideo.inf_loc fontdrvhost.exe File opened for modification C:\Windows\System32\DriverStore\en-US\PnPXInternetGatewayDevices.inf_loc fontdrvhost.exe File opened for modification C:\Windows\System32\es-ES\CustomInstallExec.exe.mui fontdrvhost.exe File opened for modification C:\Windows\System32\en-US\adtschema.dll.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AssignedAccess\AssignedAccess.psm1 fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\KBDINBE2.DLL fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\es-ES\cmutil.dll.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\it-IT\miutils.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\fr-FR\lltdres.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\fr-FR\SRH.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\ja-jp\rtm.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\WindowsTrustedRTProxy.inf_loc fontdrvhost.exe File opened for modification C:\Windows\System32\es-ES\advapi32.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\fr-FR\cic.dll.mui fontdrvhost.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\fr-FR\pwrshmsg.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\es-ES\uDWM.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\ja-jp\DaOtpCredentialProvider.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\Speech\Engines\SR\it-IT\srloc.dll.mui fontdrvhost.exe File opened for modification C:\Windows\System32\it-IT\ngckeyenum.dll.mui fontdrvhost.exe -
Modifies termsrv.dll 1 TTPs 1 IoCs
Commonly used to allow simultaneous RDP sessions.
description ioc Process File opened for modification C:\Windows\System32\termsrv.dll fontdrvhost.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\System.IdentityModel.Selectors.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Windows Media Player\uk-UA\wmpnssui.dll.mui fontdrvhost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc fontdrvhost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\PresentationBuildTasks.resources.dll fontdrvhost.exe File opened for modification C:\Program Files\Windows Mail\wab.exe fontdrvhost.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\Match.Tests.ps1 fontdrvhost.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msdadc.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe fontdrvhost.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\en-US\TableTextService.dll.mui fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\UIAutomationClientsideProviders.resources.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\UIAutomationTypes.resources.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\sqmapi.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\nunit_schema_2.5.xsd fontdrvhost.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\WMPMediaSharing.dll.mui fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\UIAutomationProvider.resources.dll fontdrvhost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\vcruntime140.dll fontdrvhost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrespsh.dat fontdrvhost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\mshwLatin.dll.mui fontdrvhost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\System.Runtime.Serialization.dll fontdrvhost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\PresentationBuildTasks.resources.dll fontdrvhost.exe File opened for modification C:\Program Files\Windows Defender Advanced Threat Protection\Classification\Dprt\Microsoft.Ceres.DocParsing.External.ExternalClient.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Entity.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Describe.ps1 fontdrvhost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\WindowsFormsIntegration.resources.dll fontdrvhost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.DataSetExtensions.Resources.dll fontdrvhost.exe File opened for modification C:\Program Files\Windows Defender Advanced Threat Protection\Classification\Dprt\ThirdPartyNotice.txt fontdrvhost.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.jpg fontdrvhost.exe File opened for modification C:\Program Files\Windows NT\Accessories\wordpad.exe fontdrvhost.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psm1 fontdrvhost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\tipresx.dll.mui fontdrvhost.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado25.tlb fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\ReachFramework.resources.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Net.Resources.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\WindowsBase.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Web.Entity.Design.Resources.dll fontdrvhost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVManifest.dll fontdrvhost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.Entity.Design.Resources.dll fontdrvhost.exe File opened for modification C:\Program Files\Windows Defender\MsMpEng.exe fontdrvhost.exe File opened for modification C:\Program Files\Windows Defender Advanced Threat Protection\Classification\nl7lexicons001e.dll fontdrvhost.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\setup_wm.exe.mui fontdrvhost.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextService.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\WMPMediaSharing.dll.mui fontdrvhost.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\WMPMediaSharing.dll.mui fontdrvhost.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingEngine.dll fontdrvhost.exe File created C:\Program Files\Windows Portable Devices\eddb19405b7ce1 reviewDll.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsplk.xml fontdrvhost.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\mpvis.dll.mui fontdrvhost.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\penjpn.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\Microsoft.Build.Engine.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Data.DataSetExtensions.Resources.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\en-US\msdaprsr.dll.mui fontdrvhost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp120.dll fontdrvhost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabIpsps.dll fontdrvhost.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\ShouldThrow.snippets.ps1xml fontdrvhost.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\avtransport.xml fontdrvhost.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\chocolateyInstall.ps1 fontdrvhost.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\MatchExactly.ps1 fontdrvhost.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msdatl3.dll fontdrvhost.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Entity.dll fontdrvhost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdfmap.dll fontdrvhost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Xml.Linq.dll fontdrvhost.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll fontdrvhost.exe File opened for modification C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui fontdrvhost.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\BeGreaterThan.ps1 fontdrvhost.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_netrtwlans.inf.resources_31bf3856ad364e35_10.0.19041.1_it-it_77e8b89a38b0c859\netrtwlans.inf_loc fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-mediaplayer-logagent_31bf3856ad364e35_10.0.19041.3636_none_6a2ccd4dabbe0e50\logagent.exe fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-performancetoolsgui_31bf3856ad364e35_10.0.19041.746_none_8457b34a3423f6d0\pdhui.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-i..r-desktop.resources_31bf3856ad364e35_10.0.19041.1_es-es_742fd4136a40ad54\Windows.Internal.CapturePicker.Desktop.dll.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-printdialog.appxsetup_31bf3856ad364e35_10.0.19041.1023_none_a682193ea7614721\r\appxmanifest.xml fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-kernel-pnp_31bf3856ad364e35_10.0.19041.1_none_c4ca5e73638ce579.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-ipxlatcfg.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ab953318ec32cfd6\ipxlatcfg.dll.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell32.resources_31bf3856ad364e35_10.0.19041.4123_fr-fr_70f985d081012b69\r\shell32.dll.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-assignedaccess-runtime_31bf3856ad364e35_10.0.19041.4355_none_06fd3cd4b79b2dce.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-wmi-mof_31bf3856ad364e35_10.0.19041.1_none_5867d3184f8e8a0d\secrcw32.mof fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.csharp.resources_b03f5f7f11d50a3a_4.0.15805.0_fr-fr_bf97c9dc1ea92b68\Microsoft.CSharp.resources.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-p..ormid-wmi.resources_31bf3856ad364e35_10.0.19041.1_de-de_ccf7bb08e4c41803\platid.mfl fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shutdownext.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_839e9f88298fb3c7\shutdownext.dll.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_wpf-uiautomationclient_31bf3856ad364e35_10.0.19041.1_none_906a05b3e0a5f584\UIAutomationClient.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\FileMaps\$$_microsoft.net_assembly_gac_msil_system.runtime.interopservices.runtimeinformation_v4.0_4.0.0.0_b0_5c722dd52c1a1fac.cdf-ms fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-a..terface-ldapc-layer_31bf3856ad364e35_10.0.19041.3636_none_d3ca0afd1bd1cdb2.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-i..ntconsole.resources_31bf3856ad364e35_10.0.19041.1_es-es_452a1b2fc528b669.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.19041.3636_none_3473be4cdeacc98a\addWatch.png fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.19041.423_none_9de80b9d881a1ebd\i_f12_context_chartzoom_in.png fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft.powershell.odatautils_31bf3856ad364e35_10.0.19041.1_none_9b38ee5020576a2a\Microsoft.PowerShell.ODataAdapter.ps1 fontdrvhost.exe File opened for modification C:\Windows\WinSxS\msil_multipoint-wmsadminuilibrary_31bf3856ad364e35_10.0.19041.1_none_5c4b8890e8b84114\WmsAddins.config fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-m..do-backcompat-tlb25_31bf3856ad364e35_10.0.19041.1_none_ab26d42cc5fc9b29\msado25.tlb fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_dual_netl260a.inf_31bf3856ad364e35_10.0.19041.1_none_2df572ddb713e62b\netl260a.inf fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-bootux.deployment_31bf3856ad364e35_10.0.19041.746_none_1c0a97992f105d4b.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-parentalcontrols-ots_31bf3856ad364e35_10.0.19041.4355_none_071d7bb72d2f3011\r\WpcApi.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-m..t-console.resources_31bf3856ad364e35_10.0.19041.1_it-it_b233a97791bf91ec\mmcshext.dll.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\x86_netfx-mscordbi_dll_b03f5f7f11d50a3a_10.0.19041.1_none_310edeb7ed6dec57\mscordbi.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-i..-accountscontrolexp_31bf3856ad364e35_10.0.19041.4355_none_63f15941366bd33f\r\windows.internal.shellcommon.AccountsControlExperience.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..oolsclient.appxmain_31bf3856ad364e35_10.0.19041.423_none_9de80b9d881a1ebd\headermaximize.png fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-c..ngshellapp.appxmain_31bf3856ad364e35_10.0.19041.746_none_0b4ed891dd9ccbc8\Square44x44Logo.targetsize-96.png fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..utilities.resources_31bf3856ad364e35_10.0.19041.1_es-es_3b3cc1da9328ea28\subst.exe.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\wow64_microsoft-windows-xwizards-win32plugin_31bf3856ad364e35_10.0.19041.3636_none_b8a806510bec99d4.manifest fontdrvhost.exe File opened for modification C:\Windows\servicing\InboxFodMetadataCache\metadata\Language.Basic~haw-us~1.0.mum fontdrvhost.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~ja-JP~10.0.19041.1.cat fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-d..opactivitybrokerapi_31bf3856ad364e35_10.0.19041.1202_none_fc9cc421373d9596\dabapi.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-uxtheme_31bf3856ad364e35_10.0.19041.4529_none_24da6919f03de605\uxtheme.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-fci-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_697934ed263c3037.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-hvsi-manager_31bf3856ad364e35_10.0.19041.4355_none_7cd4c5c527944f59.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-mydocs_31bf3856ad364e35_10.0.19041.746_none_1df0afc39d31a240\mydocs.dll.mun fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..sh-helper-extension_31bf3856ad364e35_10.0.19041.3636_none_2dfed49cb73edb18\NetTrace.PLA.Diagnostics.xml fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-csrsrv.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_62b98c8af185e371.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-e..e-library.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_f263f8e8e10842bb.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-wwan-lpasvc_31bf3856ad364e35_10.0.19041.746_none_4551da2a8f819978.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\wow64_microsoft-windows-bth-user_31bf3856ad364e35_10.0.19041.4355_none_e4280a07bec90c0c.manifest fontdrvhost.exe File opened for modification C:\Windows\servicing\InboxFodMetadataCache\metadata\Rsat.DHCP.Tools~~1.0.mum fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-cdosys.resources_31bf3856ad364e35_10.0.19041.1_cs-cz_d2e58d137a533321\cdosys.dll.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-fontview_31bf3856ad364e35_10.0.19041.1_none_04a9c5158a354e7a\fontview.exe fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-a..structure.resources_31bf3856ad364e35_10.0.19041.1_es-es_b8395d606a860c87\apphelp.dll.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-onecore-a..ecore-onecore-other_31bf3856ad364e35_10.0.19041.3636_none_249d07567cd18274\r\msacm32.drv fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-ecapp.appxmain_31bf3856ad364e35_10.0.19041.746_none_db09942beaf4fdfa\IndirectMask.png fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-n..-security.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_b0fe549a0b4ad7c9\wfplwfs.sys.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-d..licymanagerprecheck_31bf3856ad364e35_10.0.19041.1202_none_d34986b9547820a4\f\policymanagerprecheck.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-w..-provider.resources_31bf3856ad364e35_10.0.19041.1_de-de_776293b78d37daf1\msi.mfl fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_43bc59294854e061\UserDeviceRegistration.Ngc.dll.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-f..e-microsoftjhenghei_31bf3856ad364e35_10.0.19041.1_none_1b31c6067f7278ae_msjh.ttc_ea675e59 fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-win32kbase.resources_31bf3856ad364e35_10.0.19041.1_es-es_d67b0596196ad316.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\FileMaps\$$_syswow64_mui_040c_29ea5b12e6ab1a70.cdf-ms fontdrvhost.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft.packagemanagement.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_8da1d4e04bff6164.manifest fontdrvhost.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-m..-internal.resources_31bf3856ad364e35_10.0.19041.1_en-us_bcde7c89e74e4e37\MbaeApi.dll.mui fontdrvhost.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-DesktopFileExplorer-Package~31bf3856ad364e35~amd64~de-DE~10.0.19041.1.cat fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-font-fms.resources_31bf3856ad364e35_10.0.19041.1_bg-bg_ca15e9a7d186a457\fms.dll.mui fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-analog-voice-adapters_31bf3856ad364e35_10.0.19041.4355_none_18fd55961fc9c20f\f\KeywordDetectorMsftSidAdapter.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-devices-wifidirect_31bf3856ad364e35_10.0.19041.746_none_751f9c0a1fa33e33\f\Windows.Devices.WiFiDirect.dll fontdrvhost.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..ng-messagingservice_31bf3856ad364e35_10.0.19041.4355_none_5b8d8a408fd255ed\r\MessagingService.dll fontdrvhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kendalcp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000_Classes\Local Settings kendalcp.exe Key created \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000_Classes\Local Settings reviewDll.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4900 schtasks.exe 2596 schtasks.exe 1664 schtasks.exe 2736 schtasks.exe 232 schtasks.exe 3692 schtasks.exe 2716 schtasks.exe 2684 schtasks.exe 5028 schtasks.exe 3188 schtasks.exe 2816 schtasks.exe 5052 schtasks.exe 2660 schtasks.exe 976 schtasks.exe 3900 schtasks.exe 3848 schtasks.exe 116 schtasks.exe 3712 schtasks.exe 2376 schtasks.exe 4604 schtasks.exe 1064 schtasks.exe 2740 schtasks.exe 4436 schtasks.exe 3716 schtasks.exe 2332 schtasks.exe 3468 schtasks.exe 5116 schtasks.exe 1288 schtasks.exe 2068 schtasks.exe 3620 schtasks.exe 3708 schtasks.exe 1324 schtasks.exe 1104 schtasks.exe 1084 schtasks.exe 4656 schtasks.exe 1348 schtasks.exe 4892 schtasks.exe 4800 schtasks.exe 2916 schtasks.exe 4712 schtasks.exe 3368 schtasks.exe 1016 schtasks.exe 4608 schtasks.exe 5108 schtasks.exe 3564 schtasks.exe 1152 schtasks.exe 100 schtasks.exe 272 schtasks.exe 2836 schtasks.exe 2100 schtasks.exe 4120 schtasks.exe 1360 schtasks.exe 4576 schtasks.exe 5112 schtasks.exe 2372 schtasks.exe 3016 schtasks.exe 1052 schtasks.exe 3428 schtasks.exe 4976 schtasks.exe 1316 schtasks.exe 2872 schtasks.exe 112 schtasks.exe 1860 schtasks.exe 2228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3492 reviewDll.exe 3492 reviewDll.exe 3492 reviewDll.exe 3492 reviewDll.exe 3492 reviewDll.exe 1752 reviewDll.exe 1752 reviewDll.exe 1752 reviewDll.exe 1752 reviewDll.exe 1752 reviewDll.exe 1752 reviewDll.exe 1752 reviewDll.exe 1752 reviewDll.exe 1752 reviewDll.exe 3572 fontdrvhost.exe 3572 fontdrvhost.exe 3572 fontdrvhost.exe 3572 fontdrvhost.exe 3572 fontdrvhost.exe 3572 fontdrvhost.exe 3572 fontdrvhost.exe 3572 fontdrvhost.exe 3572 fontdrvhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3572 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 3492 reviewDll.exe Token: SeDebugPrivilege 1752 reviewDll.exe Token: SeDebugPrivilege 3572 fontdrvhost.exe Token: SeDebugPrivilege 772 spoolsv.exe Token: SeDebugPrivilege 2996 unsecapp.exe Token: SeDebugPrivilege 808 TextInputHost.exe Token: SeDebugPrivilege 4272 fontdrvhost.exe Token: SeDebugPrivilege 3608 RuntimeBroker.exe Token: SeDebugPrivilege 3612 sihost.exe Token: SeDebugPrivilege 1420 backgroundTaskHost.exe Token: SeDebugPrivilege 464 SearchApp.exe Token: SeDebugPrivilege 2124 dllhost.exe Token: SeDebugPrivilege 2560 cmd.exe Token: SeDebugPrivilege 1352 upfc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4176 4668 XBinderOutput(1).exe 84 PID 4668 wrote to memory of 4176 4668 XBinderOutput(1).exe 84 PID 4668 wrote to memory of 4176 4668 XBinderOutput(1).exe 84 PID 4176 wrote to memory of 4544 4176 kendalcp.exe 85 PID 4176 wrote to memory of 4544 4176 kendalcp.exe 85 PID 4176 wrote to memory of 4544 4176 kendalcp.exe 85 PID 4544 wrote to memory of 2580 4544 WScript.exe 86 PID 4544 wrote to memory of 2580 4544 WScript.exe 86 PID 4544 wrote to memory of 2580 4544 WScript.exe 86 PID 2580 wrote to memory of 3492 2580 cmd.exe 88 PID 2580 wrote to memory of 3492 2580 cmd.exe 88 PID 3492 wrote to memory of 3764 3492 reviewDll.exe 129 PID 3492 wrote to memory of 3764 3492 reviewDll.exe 129 PID 3764 wrote to memory of 4780 3764 cmd.exe 131 PID 3764 wrote to memory of 4780 3764 cmd.exe 131 PID 3764 wrote to memory of 1752 3764 cmd.exe 132 PID 3764 wrote to memory of 1752 3764 cmd.exe 132 PID 1752 wrote to memory of 3572 1752 reviewDll.exe 175 PID 1752 wrote to memory of 3572 1752 reviewDll.exe 175 PID 3572 wrote to memory of 4492 3572 fontdrvhost.exe 203 PID 3572 wrote to memory of 4492 3572 fontdrvhost.exe 203 PID 4492 wrote to memory of 4568 4492 cmd.exe 205 PID 4492 wrote to memory of 4568 4492 cmd.exe 205 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XBinderOutput(1).exe"C:\Users\Admin\AppData\Local\Temp\XBinderOutput(1).exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\kendalcp.exe"C:\Users\Admin\AppData\Local\Temp\kendalcp.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\blocksavesperfMonitorDll\R7uOS4kiQeNNM8oo5bGADNHtfWe.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\blocksavesperfMonitorDll\SAymW4LctOmWulF1E6221.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\blocksavesperfMonitorDll\reviewDll.exe"C:\blocksavesperfMonitorDll\reviewDll.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cDr8AOJqph.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:4780
-
-
C:\blocksavesperfMonitorDll\reviewDll.exe"C:\blocksavesperfMonitorDll\reviewDll.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\blocksavesperfMonitorDll\fontdrvhost.exe"C:\blocksavesperfMonitorDll\fontdrvhost.exe"8⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Boot or Logon Autostart Execution: Print Processors
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Indicator Removal: Clear Windows Event Logs
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies termsrv.dll
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VCTPXfsZqS.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:4568
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
PID:3884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Default User\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:2520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Program Files\Common Files\System\it-IT\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\it-IT\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Program Files\Common Files\System\it-IT\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 5 /tr "'C:\blocksavesperfMonitorDll\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
PID:2308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\blocksavesperfMonitorDll\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\blocksavesperfMonitorDll\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\blocksavesperfMonitorDll\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\blocksavesperfMonitorDll\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\blocksavesperfMonitorDll\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\NetHood\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Users\Admin\NetHood\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\NetHood\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Windows\IdentityCRL\production\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\production\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Windows\IdentityCRL\production\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:2948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:3608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Windows\ShellExperiences\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 9 /tr "'C:\Windows\ShellExperiences\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Multimedia Platform\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
PID:992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files\Common Files\DESIGNER\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Common Files\DESIGNER\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\DESIGNER\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:3852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:3976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Photo Viewer\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Photo Viewer\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\blocksavesperfMonitorDll\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
PID:1464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\blocksavesperfMonitorDll\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\blocksavesperfMonitorDll\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Users\Public\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Public\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Users\Public\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\spoolsv.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\spoolsv.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\spoolsv.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Windows\schemas\CodeIntegrity\ExamplePolicies\winlogon.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:4656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\schemas\CodeIntegrity\ExamplePolicies\winlogon.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Windows\schemas\CodeIntegrity\ExamplePolicies\winlogon.exe'" /rl HIGHEST /f1⤵PID:744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵PID:4596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Internet Explorer\images\services.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:1152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\images\services.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Internet Explorer\images\services.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Windows\Provisioning\Packages\SearchApp.exe'" /f1⤵PID:1472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\Provisioning\Packages\SearchApp.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Windows\Provisioning\Packages\SearchApp.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:112
-
C:\Program Files (x86)\Reference Assemblies\Microsoft\spoolsv.exe"C:\Program Files (x86)\Reference Assemblies\Microsoft\spoolsv.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772
-
C:\Recovery\WindowsRE\unsecapp.exe"C:\Recovery\WindowsRE\unsecapp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
C:\Program Files\MSBuild\Microsoft\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\TextInputHost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:808
-
C:\blocksavesperfMonitorDll\fontdrvhost.exe"C:\blocksavesperfMonitorDll\fontdrvhost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
C:\Recovery\WindowsRE\RuntimeBroker.exe"C:\Recovery\WindowsRE\RuntimeBroker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
C:\Program Files\Common Files\System\it-IT\sihost.exe"C:\Program Files\Common Files\System\it-IT\sihost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe"C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
C:\Windows\Provisioning\Packages\SearchApp.exe"C:\Windows\Provisioning\Packages\SearchApp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:464
-
C:\Users\Public\dllhost.exe"C:\Users\Public\dllhost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
C:\Recovery\WindowsRE\cmd.exe"C:\Recovery\WindowsRE\cmd.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
C:\Program Files\Windows Photo Viewer\upfc.exe"C:\Program Files\Windows Photo Viewer\upfc.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
C:\blocksavesperfMonitorDll\fontdrvhost.exe"C:\blocksavesperfMonitorDll\fontdrvhost.exe"1⤵
- Executes dropped EXE
PID:4792
-
C:\blocksavesperfMonitorDll\fontdrvhost.exe"C:\blocksavesperfMonitorDll\fontdrvhost.exe"1⤵
- Executes dropped EXE
PID:3224
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "fontdrvhost" /f1⤵PID:4520
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "fontdrvhostf" /f1⤵PID:3620
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "fontdrvhost" /f1⤵PID:3156
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "fontdrvhostf" /f1⤵PID:3764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Print Processors
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Print Processors
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
2System Information Discovery
2System Location Discovery
1System Language Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702B
MD571802d0332197f1e455b1e1df6383c41
SHA183c2ddacc12ab6cf1d10f83f8b73e957050c8ac6
SHA25694466d60c7706a8735b5350a5bba8c9b395b2dd5f3a3e8922a0e8814aafb1154
SHA5126f3a279992cfad69c50c402fe6c6f7508d6d2c5f6be5ad4abdfc89a6d1837f120f1434d8ad8d4a657937a3fdb21828ae8105347b4eea28648af21ed99587f5d3
-
Filesize
374B
MD5233181f59c77a3473d967b9023c04d39
SHA17e8663dc8c2a0babb7cab6878aecc2c58bce0e88
SHA256837020c4a93596467d5ea979512d48822cf9a7857e9e0e4b5dac2f7f59656981
SHA5128d186e9d82ff03a0e60ebd9776e9024bb4b4720bc2a8b400662769292ab4fef1a3316ff79347acaf59a3eef609a186f07e227c0255b527893369d8152422a744
-
Filesize
857B
MD5b80da80aa5695e06d2a6049fe4ff89ab
SHA174f2c03a0503eb4278ccf3381b2fcecb5ee0e19c
SHA256c10446d5c7b6ee91f93decf20441af6c18b32230096cb3ddde4a29277acd41d6
SHA512dce4a2e34b1bb89dbea11a0f6cc703fef14174766c81fbd27e373ff11ba03ebbf9dd68b6f93c13f84fcd0c34d58d4ecd0c54af23de0c593a8973a1fd9da5ce81
-
Filesize
26B
MD53d5b3700647665cf0b7ade236c7ec703
SHA1a14dbed1d4cf9b05e7672990dda56b3512d2915e
SHA25626ad58cec083751b7310e9442569b02530d3db63f20427205701144b68d756fc
SHA512e516b7797a1205a8556ae99ebbfeda775ea3bdbeee7c905c74f61acedd42d374eb091726bc97fe44d76fff8aded49cf541bf711f8d68e630e13c4997165e7665
-
Filesize
708B
MD595fed55f88e3366a08af635bca1d734f
SHA1c888a3913f9db3eb94464f8559c356fd57fd2e6c
SHA256dd0390b41b0b6503ead177ffaa0e98fa6de402bdd240372b59e8208a6291e08c
SHA512b8065146aa0af30d7c1c84a83ae7f06c4e25a84829d2c63502473508ffa41d0dbdc7abd457808ed6c49a3b36464bd27bd65a5b212054cc437d5261675ead9771
-
Filesize
632B
MD532da6b84ebf2e1b29e0b4794cb8f7630
SHA17b14d2c2525f2e5333bb0a960c56a7b2be434840
SHA256dfa1e787ca39266aa46dc282d3a492622bb6426173a5aa3d14be77d161a957d0
SHA5121a48218ffdf1d3ad4983d06c50751195c1f2dc0dd174227acb6d5ffb2d0d30abf0c31ac4999caecf14c14983144e2e609b54c53a4911b3c447d5461008a21c05
-
Filesize
186B
MD545017b06caad822704ac9cc80183142f
SHA165d6f0328a4695dd23208ef7654d4f7652a18c0c
SHA2563e66b8a36aa91c0ae16723e351c303e7b23d8da79d4acd0e2e8809c271b99fa3
SHA51200b8f23ff168a7ec45d05e27f2549cf8225bae598d5d5b84435c1a7979738326b8b1ac4f8b05dd810381b8b0abe331170ba21cefddf5be26fdb85be6ee58b90c
-
Filesize
436B
MD5e32a210b7ba6ec0ab19753aaabad646e
SHA17b8ab9c5ea6cf75c5b4763c8407dc3e85cf4084f
SHA2569fac5e94d7edfedb9cc70f93741ab50179f0865e3e4ecf46492c2d9fbe3d4ae4
SHA512300463a909d6bf3853b94b0299cb6210bae2fa165ac66f49915f32e476d78e0403d24ec85317224151427e93eccf78e396e65f276a5010b4a8bbe165a3cab86e
-
Filesize
900B
MD53caa2457e8f5f8ed505daa69e539ccdf
SHA11a4d06105f7fe8411d6dc0c07e5104d05ee9e5ea
SHA25619710ffcee267b766d1692bcac9eb9b088cb88079ea1882219451dbe8fced038
SHA512b13a21001ab923e41c6e85ba120eb015b77a3ec8ff0b60c8e6d87ce220a7b10809520544b2b04e6791f169dcb6698b4ebdb9d0295872cb17fdcb885ea056f85e
-
Filesize
312B
MD5f9508edec64a96398d2fc7d8c2fdaf16
SHA18ef35a7ab349c0b6657fcca9c05eb176ae2c33f3
SHA25660a269423c94931e7414891b8a87dc6a37fe77da04398863d4d44e2728b35405
SHA512b3d527d755798dfd05b6af40af4b3660abb19538238151a22f68212e86b9a472b5f3978ba5c9c2a267420450afb1b16c718c362b4f8e4c2b30461ee655d9ac14
-
Filesize
546B
MD589f35704527e2fff091af2e295773050
SHA1fc1d12d9e02adc29b663a26faece48e619cfba03
SHA256865db2946edcbbdca2883d2652b9a904cedb436648e77742afdbc1517da457b7
SHA51282fa5b4c77bc12f873640a5e2a9b7b6a4a0f1b76ad3391b41ea7f0380d82380db4be74c7b9181457e0c5d981f6c5c936fc4370575840cf43e07158f56ded4e03
-
Filesize
288B
MD556969b83a667bb601beeb188021312d6
SHA1791c0f36117d14e314eb13087f15177219abfa75
SHA2569da242d768a7d3bbc066e03eeb17cf6c21d4f16a50f90db05563e207373d8762
SHA51236661ba1d3a81710b361bceb9d249df8393d290fa86b15c4b9ff5415bfb688498448bc89cedc912e2878ffca1227ee4e7de4b8ca241d530cf70dd23e9ca26a45
-
Filesize
258B
MD5dc8d846e69b440ca08ddae0e8c6fdad6
SHA178ff14a8b3dc3bb08f38ed7e9e9bcc85bf3d37a1
SHA256d8906a0876edd3b1eede0aa3321f006bd40c2b43ff7635180b19e1731a0994e7
SHA5129775404d63e48a47891a0b6b1efb0a63999eebf8d0ae4f97f3bde550bfc9fec4565227e7d2bc22367a8179b315cc9252896f57f5402bd2d59ce03878c6b55e8e
-
Filesize
462B
MD5266ca62a79ba272fb0c14900d2504694
SHA11d1875ee39c1fe4f61c672d6cfceebecf2410a53
SHA25679fd50864f24d3f02dbb589f656b81cfb553b72aeddfc12ef70056dfd94a81ea
SHA5123ab848b6499b788da6267d020fb969b020298a47b763b7bbedd3395fc4e7924d9ab9989f4b35008a73be6db8cfc34e27b76f0e307edf13050af52fb853fe6e70
-
Filesize
499B
MD54f28b6462a538870477fe64b2579927b
SHA18a22a6f04cce55bb5171eb7cfb8af1435e21ac15
SHA256f49e282841b83ef02ef54a5d4556afa6e93d194c760e3b53cb7f956f3c626d5d
SHA51274023279307bb3a17f9a3f2a5ebb19201cc094a84be1f17a7eb71a70aae633736fff82ed06dff6af2575a2f406cf6232035d5b6d2eb63cd642c2b2eb4385955c
-
Filesize
172B
MD5ce8c3db0d87718bce7f2759a524661a6
SHA1dab8d9367cdef277887112c60a590319d433fb52
SHA2562fbf78dbfa211c776a7396e932eda919bcd5c9a43263db5a93472d11dbcfea2a
SHA512760d44418acd7d31cc4f0db9a9baaa042afd266884ce02f6da73c63ab21bc50245b30a279c526a5fa699ad32622ccbb05b98189273b7f4714cb0084d65772e2c
-
Filesize
1KB
MD5b08c36ce99a5ed11891ef6fc6d8647e9
SHA1db95af417857221948eb1882e60f98ab2914bf1d
SHA256cc9248a177495f45ec70b86c34fc5746c56730af36ace98ac7eb365dbafda674
SHA51207e62581eace395b0a9699d727761648103180c21155d84ea09140f9e1c9690705c419118545aa67a564334bbde32710225fe3aa92b0b4b4210cb91f0058b1ea
-
Filesize
654B
MD511c6e74f0561678d2cf7fc075a6cc00c
SHA1535ee79ba978554abcb98c566235805e7ea18490
SHA256d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63
SHA51232c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0
-
Filesize
1KB
MD5fcbbff8eeb93ad014bf73143a67cbdce
SHA179cd0f544ba90184d14911c68dc2314f2225a020
SHA2564f3945ae2db9e60f191a1dc16b1e156710f81037869b5515e0c8ed0b31070d01
SHA512f5c8342c814d31d561642a0218011b86adcac40a068acdfe1870fd26c0b63927a4bcb53fedacb1bfd8f3ae6fde75ddd66ff5ed49dced4a39bfce575f51603ef5
-
Filesize
271B
MD5ee25f58a17257fbacf855480709434d2
SHA131c582cf8dbf2fdddf4ad83755952b37b0988e79
SHA256252dd37625f473ba72f9b6aa39c64c2da204ff5575401c026ea11396f5d60a4e
SHA512a01eac998a695af86741910e359e8a3996c8e91e58f6466f67ec3790409b68f51c8ff3105673a6c38cf2df4f06df475b4ecdf1007a3cd7cb363a18147d6fc039
-
Filesize
206B
MD5b7a51ab8ad2d0f4e123affe6fda21eff
SHA1bdf6365345cf97bf75d462e5c8eb8e551333adc9
SHA256225fd82bf4d37cee1db509174fab7b4a40f40fc332c80f99a76ee0b153b859cb
SHA512b0bb41e9f09664eb56b836ed6b706bb52e3cc852661fe08e884eba05f5a2fd3e1210bca7df836d0fa7c76b4639ffb0120f8c5020f4a52a3a496a3bab8c720ff4
-
Filesize
1.1MB
MD50d015cc111d53a019e680b0bed11fcad
SHA13b3fb6eeba0c2ba286a4db5e850697399ccb5e36
SHA2562b7365d9634016b0483009225b959692c290a6b17fad133e42434dc89fdf4150
SHA512c3a7ea551d0151033dde83a3dda1042e8fe26702c84da2b630ecffb739aecb654730bb5f7ec8914189f72ca7d0ecf1352f0ca7effa938bc1d6f0ae56c3358eab
-
Filesize
178B
MD5fcb4f6e970dd35dfdc46c949ea75035d
SHA118b6b7c03786d00ac827f9c1f606acf7b38fa629
SHA2569808ca3b5e73bbedb4811a21bbf051cdb31d60c1d7626d55a4911efac8dd2d7a
SHA512ec40d8f6900cee92ed39bdb988e847025a24c6fd24f2e43c3e1008daa143e920e1fb79fc462ac316c2565ab994ac1738b8f5839b2351660b7fb7dee97a551650
-
Filesize
158B
MD564dd1b68556077b74c300219329bd668
SHA1b0c2cff1e15bc9f61bd5dfb741241abf56061fc4
SHA256193a159cd42cd388865dabcd2c7673f961fed83cf2baae5a7c28d1ea340c3782
SHA512c20df2a9a101df363bbbd269e31a77b41ad4db7789a9f298f4ef083b0bc5a378d47c5871a919ca144fafdf834245f16a912844bd6e0c2a5d78f5148e726f6ae1
-
Filesize
638B
MD581f004429941ef9a70eaa5800f048e82
SHA1a6be1c48bdfe6e066d5237f5ae2e18f7dd03baa3
SHA256f6bcd46262662834d599ca01a827d3e55a1231814c91f2ad93348e08292c51cd
SHA512f4e99a637eddadcbd08d91122f096698da9a0857e084eb37261c64e7383a7009a6922fdf322c6482ec01ceb45e702c23ede58c61f7e2e2b2ede26999db291773
-
Filesize
486B
MD5bc08bc7021a2a62ecb11acc33175a111
SHA1a2152b1b7d50c35703dbd797aab3f5215bc87ff0
SHA256bfe3aa1c4f362ce166117a01670bfa78b9af1ad188150babac8d7c28024c9501
SHA51227fbcf6abad1e673c056038166a578d116e5ca1c3dd29ef00cc641ba889e11171372ecdc9541cd64c40de742a4ae8a26fe31cf275dbd6e45e1de73c0aadcfb66
-
Filesize
959B
MD5826b18cb5b8cc201d1476db197c209b0
SHA1617362d880beb90f889134eec7afed170ce11a8f
SHA256cb413855ebe0557c85f445b12a77140180daa778fdc286f31a286254f86f3a8d
SHA512472042170c406caad8e158cc4571cab9cea1994ae0751c2f37e329fc2a104c1630df002dd0869804e4ac1ddb43973f5520f7bff9620cf9b5a137592161748004
-
Filesize
708B
MD597a49e22c74628a2182bab3b93f8ea4c
SHA1f591c7154d1b32f4da3cb65e2dea449f48eabf8b
SHA2569ffcf5fba79f9869f9d0ef53cf6f194627a4d6ad73155b7ff8dd100d90df2134
SHA5124be2e4dd25dc6e5be635f776ce7ac0349ef3e8dfe0c23b6306d5da7a858adf9b4d5ad9849474bf1f17577b7a5a78f0ea349393a7ca3633c1bec31906fedda2d4
-
Filesize
272B
MD5583877f57251c2718b70357a84788fb7
SHA1fd9721191b8d8e15fd3f0f29c0cc004690a903fc
SHA2561bb8e248c6f64c3ea611bf2575874a5bf9ccec412997a14e191f270107df0096
SHA51245b836e6a0547003fd2051cd98b52ad7c69f4a26e619a1f4feb0f04db2ec0932772c9a6532eae7540a96b81f9baa10c409f22ed5955df448da0dc34c38927116
-
Filesize
297B
MD5310d527c19c52b2f7159fecacf7d5a6b
SHA14e996816584b1b10c0613500714bada95f8b1adf
SHA2567810dce170f8d7dc922f8f1c7e46ac2009ee4da845a7cb74d61e76a6b793c46a
SHA51274413dcc5e27968f24449f86935f4dabafb69bfac23ce9238942c996dfcc64a33fad85abf1163f79b654bd3bcd67856227ae9cb7887dec0605d2fd8cdce11e73
-
Filesize
222B
MD5a6f295a2e58c722b5935cc905e81fd8b
SHA1a2a30408197320a639e3e2f18a57fc8578c97b58
SHA2568bcebca170fc0768cb1afb63f1350d63c3a295b26ca04602e07ec43498b9691c
SHA512839605d7eadcdc470dd4edd117cedd976cb9f36bf0a636d08afecc6378adadf0fccb80beb44de849b6dfec814845cef8ca83ca171b39c1f6d90d55485bd06635
-
Filesize
43B
MD57c582abd8874b9cc60df72d62bd86440
SHA1564e7b01338d08f657f2c02fa8fc5b8dadb92331
SHA256c5e95b783c6ec1b98a40edf8663370c678de43e9b657e09ca1f054618277b329
SHA512444cf67666329ea359e221560a229990013af07d1ed074b2406e903c7ee04cf279953ad0726a96c2ca875216da68369dfdde00f905adf1de9ed93b8582bf8828
-
Filesize
815B
MD568d93b48ed2e14bc85bce5998fbdd32e
SHA102818543af677e567d77c1bbecfebdb8e9c78f11
SHA256e7cee5f8f9537eb54dfb2a82d4e1c0da424a87e6f2496b2aca229235985d12dd
SHA5129eb481346b726d309b3dae485c6ffd09188d9857d879da5de5f91eba200d76e784d00e9aff5c048bab6051a37e9d1c85a6338741eaadd4f97f7ef4f9e766d501
-
Filesize
597B
MD5ca9f3629de630e88d05aeb4cc6c3e0a4
SHA1d46cc0bd216dfeab08e049de63f78949e85cfc5b
SHA256b21468aba099b92cd9d7af93088928b08fa33291a31b14c58227edd6b1388ddd
SHA5125a1c3cd257e78cad4b765cd99aa58e8204cc1192f388f02ce924e87b096607f9799ba79ee09140229b43a3067d8612748d3589207d8bce9d5c3a1b01bd7f16d6
-
Filesize
828KB
MD5d9dac9e1d95e84e6aec084cf2ddb3f3a
SHA1a231a41c7ad994879b15116dcea41fdc09bb5879
SHA2560fbeb71fb1dfe793eace5ed167f035a8f4bcc6b56d0930b6b97481f2b222b1d5
SHA512c4aa115de6f61c7311e8654d40537cd1ce08f0fb7efd0a225a42e06ad000ed420ba905e5cc26a19cb56af951ee1441aa257c073c47911a72fff733c0db1c2f9a